Date
July 3, 2025, 10:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 35.477527] ================================================================== [ 35.484839] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 35.492502] Write of size 1 at addr ffff00009697ecea by task kunit_try_catch/267 [ 35.499989] [ 35.501516] CPU: 4 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 35.501544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.501552] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.501562] Call trace: [ 35.501567] show_stack+0x20/0x38 (C) [ 35.501584] dump_stack_lvl+0x8c/0xd0 [ 35.501602] print_report+0x118/0x608 [ 35.501619] kasan_report+0xdc/0x128 [ 35.501637] __asan_report_store1_noabort+0x20/0x30 [ 35.501654] krealloc_less_oob_helper+0xae4/0xc50 [ 35.501672] krealloc_less_oob+0x20/0x38 [ 35.501688] kunit_try_run_case+0x170/0x3f0 [ 35.501705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.501726] kthread+0x328/0x630 [ 35.501739] ret_from_fork+0x10/0x20 [ 35.501754] [ 35.571979] Allocated by task 267: [ 35.575433] kasan_save_stack+0x3c/0x68 [ 35.579339] kasan_save_track+0x20/0x40 [ 35.583245] kasan_save_alloc_info+0x40/0x58 [ 35.587582] __kasan_krealloc+0x118/0x178 [ 35.591654] krealloc_noprof+0x128/0x360 [ 35.595646] krealloc_less_oob_helper+0x168/0xc50 [ 35.600422] krealloc_less_oob+0x20/0x38 [ 35.604413] kunit_try_run_case+0x170/0x3f0 [ 35.608664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.614231] kthread+0x328/0x630 [ 35.617514] ret_from_fork+0x10/0x20 [ 35.621147] [ 35.622670] The buggy address belongs to the object at ffff00009697ec00 [ 35.622670] which belongs to the cache kmalloc-256 of size 256 [ 35.635325] The buggy address is located 33 bytes to the right of [ 35.635325] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 35.648508] [ 35.650031] The buggy address belongs to the physical page: [ 35.655672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 35.663774] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.671530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.678583] page_type: f5(slab) [ 35.681781] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.689626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.697471] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.705401] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.713331] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 35.721262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.729186] page dumped because: kasan: bad access detected [ 35.734830] [ 35.736362] Memory state around the buggy address: [ 35.741216] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.748524] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.755832] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 35.763141] ^ [ 35.769840] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.777149] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.784453] ================================================================== [ 34.531896] ================================================================== [ 34.543105] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 34.550778] Write of size 1 at addr ffff00009697ecc9 by task kunit_try_catch/267 [ 34.558272] [ 34.559813] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 34.559843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.559851] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.559860] Call trace: [ 34.559867] show_stack+0x20/0x38 (C) [ 34.559884] dump_stack_lvl+0x8c/0xd0 [ 34.559904] print_report+0x118/0x608 [ 34.559924] kasan_report+0xdc/0x128 [ 34.559942] __asan_report_store1_noabort+0x20/0x30 [ 34.559959] krealloc_less_oob_helper+0xa48/0xc50 [ 34.559977] krealloc_less_oob+0x20/0x38 [ 34.559994] kunit_try_run_case+0x170/0x3f0 [ 34.560012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.560033] kthread+0x328/0x630 [ 34.560048] ret_from_fork+0x10/0x20 [ 34.560065] [ 34.630340] Allocated by task 267: [ 34.633799] kasan_save_stack+0x3c/0x68 [ 34.637708] kasan_save_track+0x20/0x40 [ 34.641614] kasan_save_alloc_info+0x40/0x58 [ 34.645949] __kasan_krealloc+0x118/0x178 [ 34.650031] krealloc_noprof+0x128/0x360 [ 34.654026] krealloc_less_oob_helper+0x168/0xc50 [ 34.658808] krealloc_less_oob+0x20/0x38 [ 34.662803] kunit_try_run_case+0x170/0x3f0 [ 34.667053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.672620] kthread+0x328/0x630 [ 34.675912] ret_from_fork+0x10/0x20 [ 34.679551] [ 34.681087] The buggy address belongs to the object at ffff00009697ec00 [ 34.681087] which belongs to the cache kmalloc-256 of size 256 [ 34.693747] The buggy address is located 0 bytes to the right of [ 34.693747] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 34.706852] [ 34.708385] The buggy address belongs to the physical page: [ 34.714036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 34.722147] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.729900] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.736952] page_type: f5(slab) [ 34.740155] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.747998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.755841] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.763771] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.771700] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 34.779628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.787554] page dumped because: kasan: bad access detected [ 34.793197] [ 34.794727] Memory state around the buggy address: [ 34.799586] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.806900] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.814221] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 34.821541] ^ [ 34.827190] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.834514] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.841833] ================================================================== [ 37.308828] ================================================================== [ 37.316142] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 37.323807] Write of size 1 at addr ffff0000861960ea by task kunit_try_catch/271 [ 37.331291] [ 37.332818] CPU: 4 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 37.332848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.332855] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.332865] Call trace: [ 37.332871] show_stack+0x20/0x38 (C) [ 37.332887] dump_stack_lvl+0x8c/0xd0 [ 37.332905] print_report+0x118/0x608 [ 37.332922] kasan_report+0xdc/0x128 [ 37.332939] __asan_report_store1_noabort+0x20/0x30 [ 37.332956] krealloc_less_oob_helper+0xae4/0xc50 [ 37.332974] krealloc_large_less_oob+0x20/0x38 [ 37.332991] kunit_try_run_case+0x170/0x3f0 [ 37.333009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.333028] kthread+0x328/0x630 [ 37.333041] ret_from_fork+0x10/0x20 [ 37.333057] [ 37.403834] The buggy address belongs to the physical page: [ 37.409480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 37.417586] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.425332] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.432384] page_type: f8(unknown) [ 37.435844] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.443689] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.451525] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.459453] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.467383] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 37.475312] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.483241] page dumped because: kasan: bad access detected [ 37.488888] [ 37.490410] Memory state around the buggy address: [ 37.495261] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.502573] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.509882] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 37.517189] ^ [ 37.523888] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.531198] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.538507] ================================================================== [ 34.849245] ================================================================== [ 34.856566] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 34.864238] Write of size 1 at addr ffff00009697ecd0 by task kunit_try_catch/267 [ 34.871740] [ 34.873268] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 34.873297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.873305] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.873316] Call trace: [ 34.873324] show_stack+0x20/0x38 (C) [ 34.873343] dump_stack_lvl+0x8c/0xd0 [ 34.873365] print_report+0x118/0x608 [ 34.873386] kasan_report+0xdc/0x128 [ 34.873405] __asan_report_store1_noabort+0x20/0x30 [ 34.873423] krealloc_less_oob_helper+0xb9c/0xc50 [ 34.873441] krealloc_less_oob+0x20/0x38 [ 34.873459] kunit_try_run_case+0x170/0x3f0 [ 34.873477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.873499] kthread+0x328/0x630 [ 34.873514] ret_from_fork+0x10/0x20 [ 34.873532] [ 34.943836] Allocated by task 267: [ 34.947300] kasan_save_stack+0x3c/0x68 [ 34.951210] kasan_save_track+0x20/0x40 [ 34.955119] kasan_save_alloc_info+0x40/0x58 [ 34.959457] __kasan_krealloc+0x118/0x178 [ 34.963538] krealloc_noprof+0x128/0x360 [ 34.967534] krealloc_less_oob_helper+0x168/0xc50 [ 34.972313] krealloc_less_oob+0x20/0x38 [ 34.976307] kunit_try_run_case+0x170/0x3f0 [ 34.980562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.986135] kthread+0x328/0x630 [ 34.989425] ret_from_fork+0x10/0x20 [ 34.993064] [ 34.994594] The buggy address belongs to the object at ffff00009697ec00 [ 34.994594] which belongs to the cache kmalloc-256 of size 256 [ 35.007258] The buggy address is located 7 bytes to the right of [ 35.007258] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 35.020359] [ 35.021891] The buggy address belongs to the physical page: [ 35.027538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 35.035650] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.043405] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.050459] page_type: f5(slab) [ 35.053664] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.061509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.069354] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.077284] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.085213] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 35.093144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.101069] page dumped because: kasan: bad access detected [ 35.106719] [ 35.108252] Memory state around the buggy address: [ 35.113113] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.120438] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.127753] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 35.135065] ^ [ 35.140981] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.148304] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.155619] ================================================================== [ 36.835388] ================================================================== [ 36.842709] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 36.850383] Write of size 1 at addr ffff0000861960d0 by task kunit_try_catch/271 [ 36.857880] [ 36.859411] CPU: 3 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 36.859439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.859447] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.859457] Call trace: [ 36.859464] show_stack+0x20/0x38 (C) [ 36.859482] dump_stack_lvl+0x8c/0xd0 [ 36.859503] print_report+0x118/0x608 [ 36.859521] kasan_report+0xdc/0x128 [ 36.859539] __asan_report_store1_noabort+0x20/0x30 [ 36.859557] krealloc_less_oob_helper+0xb9c/0xc50 [ 36.859576] krealloc_large_less_oob+0x20/0x38 [ 36.859595] kunit_try_run_case+0x170/0x3f0 [ 36.859613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.859634] kthread+0x328/0x630 [ 36.859649] ret_from_fork+0x10/0x20 [ 36.859666] [ 36.930484] The buggy address belongs to the physical page: [ 36.936138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 36.944249] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.952004] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.959062] page_type: f8(unknown) [ 36.962528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.970373] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.978218] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.986148] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.994079] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 37.002008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.009935] page dumped because: kasan: bad access detected [ 37.015581] [ 37.017107] Memory state around the buggy address: [ 37.021969] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.029293] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.036616] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 37.043937] ^ [ 37.049847] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.057171] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.064493] ================================================================== [ 35.792013] ================================================================== [ 35.799339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 35.807017] Write of size 1 at addr ffff00009697eceb by task kunit_try_catch/267 [ 35.814508] [ 35.816048] CPU: 3 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 35.816076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.816085] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.816096] Call trace: [ 35.816103] show_stack+0x20/0x38 (C) [ 35.816122] dump_stack_lvl+0x8c/0xd0 [ 35.816143] print_report+0x118/0x608 [ 35.816162] kasan_report+0xdc/0x128 [ 35.816181] __asan_report_store1_noabort+0x20/0x30 [ 35.816199] krealloc_less_oob_helper+0xa58/0xc50 [ 35.816217] krealloc_less_oob+0x20/0x38 [ 35.816235] kunit_try_run_case+0x170/0x3f0 [ 35.816255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.816275] kthread+0x328/0x630 [ 35.816290] ret_from_fork+0x10/0x20 [ 35.816307] [ 35.886597] Allocated by task 267: [ 35.890058] kasan_save_stack+0x3c/0x68 [ 35.893968] kasan_save_track+0x20/0x40 [ 35.897879] kasan_save_alloc_info+0x40/0x58 [ 35.902219] __kasan_krealloc+0x118/0x178 [ 35.906302] krealloc_noprof+0x128/0x360 [ 35.910300] krealloc_less_oob_helper+0x168/0xc50 [ 35.915083] krealloc_less_oob+0x20/0x38 [ 35.919080] kunit_try_run_case+0x170/0x3f0 [ 35.923335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.928907] kthread+0x328/0x630 [ 35.932199] ret_from_fork+0x10/0x20 [ 35.935839] [ 35.937370] The buggy address belongs to the object at ffff00009697ec00 [ 35.937370] which belongs to the cache kmalloc-256 of size 256 [ 35.950026] The buggy address is located 34 bytes to the right of [ 35.950026] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 35.963211] [ 35.964739] The buggy address belongs to the physical page: [ 35.970389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 35.978492] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.986252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.993309] page_type: f5(slab) [ 35.996513] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 36.004360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.012206] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 36.020139] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.028072] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 36.036005] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.043934] page dumped because: kasan: bad access detected [ 36.049585] [ 36.051113] Memory state around the buggy address: [ 36.055974] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.063293] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.070611] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 36.077923] ^ [ 36.084630] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.091945] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.099262] ================================================================== [ 36.594768] ================================================================== [ 36.606509] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 36.614186] Write of size 1 at addr ffff0000861960c9 by task kunit_try_catch/271 [ 36.621687] [ 36.623221] CPU: 3 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 36.623249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.623257] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.623270] Call trace: [ 36.623277] show_stack+0x20/0x38 (C) [ 36.623295] dump_stack_lvl+0x8c/0xd0 [ 36.623315] print_report+0x118/0x608 [ 36.623334] kasan_report+0xdc/0x128 [ 36.623353] __asan_report_store1_noabort+0x20/0x30 [ 36.623372] krealloc_less_oob_helper+0xa48/0xc50 [ 36.623392] krealloc_large_less_oob+0x20/0x38 [ 36.623410] kunit_try_run_case+0x170/0x3f0 [ 36.623429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.623450] kthread+0x328/0x630 [ 36.623465] ret_from_fork+0x10/0x20 [ 36.623483] [ 36.694294] The buggy address belongs to the physical page: [ 36.699939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 36.708044] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.715802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.722860] page_type: f8(unknown) [ 36.726330] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.734178] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.742026] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.749959] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.757891] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 36.765824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.773751] page dumped because: kasan: bad access detected [ 36.779396] [ 36.780926] Memory state around the buggy address: [ 36.785785] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.793100] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.800415] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.807727] ^ [ 36.813375] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.820689] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.828002] ================================================================== [ 37.072217] ================================================================== [ 37.079537] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 37.087212] Write of size 1 at addr ffff0000861960da by task kunit_try_catch/271 [ 37.094700] [ 37.096238] CPU: 4 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 37.096268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.096276] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.096286] Call trace: [ 37.096292] show_stack+0x20/0x38 (C) [ 37.096310] dump_stack_lvl+0x8c/0xd0 [ 37.096329] print_report+0x118/0x608 [ 37.096347] kasan_report+0xdc/0x128 [ 37.096365] __asan_report_store1_noabort+0x20/0x30 [ 37.096381] krealloc_less_oob_helper+0xa80/0xc50 [ 37.096399] krealloc_large_less_oob+0x20/0x38 [ 37.096415] kunit_try_run_case+0x170/0x3f0 [ 37.096432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.096454] kthread+0x328/0x630 [ 37.096467] ret_from_fork+0x10/0x20 [ 37.096483] [ 37.167264] The buggy address belongs to the physical page: [ 37.172910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 37.181016] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.188762] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.195813] page_type: f8(unknown) [ 37.199274] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.207108] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.214945] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.222874] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.230804] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 37.238734] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.246651] page dumped because: kasan: bad access detected [ 37.252292] [ 37.253816] Memory state around the buggy address: [ 37.258671] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.265980] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.273289] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 37.280598] ^ [ 37.286767] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.294078] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.301387] ================================================================== [ 37.546341] ================================================================== [ 37.553662] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 37.561332] Write of size 1 at addr ffff0000861960eb by task kunit_try_catch/271 [ 37.568823] [ 37.570351] CPU: 5 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 37.570381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.570389] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.570400] Call trace: [ 37.570406] show_stack+0x20/0x38 (C) [ 37.570423] dump_stack_lvl+0x8c/0xd0 [ 37.570442] print_report+0x118/0x608 [ 37.570460] kasan_report+0xdc/0x128 [ 37.570478] __asan_report_store1_noabort+0x20/0x30 [ 37.570495] krealloc_less_oob_helper+0xa58/0xc50 [ 37.570512] krealloc_large_less_oob+0x20/0x38 [ 37.570530] kunit_try_run_case+0x170/0x3f0 [ 37.570546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.570566] kthread+0x328/0x630 [ 37.570580] ret_from_fork+0x10/0x20 [ 37.570597] [ 37.641384] The buggy address belongs to the physical page: [ 37.647027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 37.655125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.662879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.669933] page_type: f8(unknown) [ 37.673391] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.681230] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.689070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.696993] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.704917] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 37.712842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.720765] page dumped because: kasan: bad access detected [ 37.726406] [ 37.727934] Memory state around the buggy address: [ 37.732784] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.740097] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.747411] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 37.754719] ^ [ 37.761412] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.768727] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.776035] ================================================================== [ 35.163637] ================================================================== [ 35.170964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 35.178639] Write of size 1 at addr ffff00009697ecda by task kunit_try_catch/267 [ 35.186136] [ 35.187673] CPU: 4 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 35.187702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.187711] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.187721] Call trace: [ 35.187727] show_stack+0x20/0x38 (C) [ 35.187745] dump_stack_lvl+0x8c/0xd0 [ 35.187766] print_report+0x118/0x608 [ 35.187784] kasan_report+0xdc/0x128 [ 35.187802] __asan_report_store1_noabort+0x20/0x30 [ 35.187820] krealloc_less_oob_helper+0xa80/0xc50 [ 35.187837] krealloc_less_oob+0x20/0x38 [ 35.187854] kunit_try_run_case+0x170/0x3f0 [ 35.187872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.187892] kthread+0x328/0x630 [ 35.187906] ret_from_fork+0x10/0x20 [ 35.187923] [ 35.258166] Allocated by task 267: [ 35.261622] kasan_save_stack+0x3c/0x68 [ 35.265519] kasan_save_track+0x20/0x40 [ 35.269424] kasan_save_alloc_info+0x40/0x58 [ 35.273760] __kasan_krealloc+0x118/0x178 [ 35.277842] krealloc_noprof+0x128/0x360 [ 35.281824] krealloc_less_oob_helper+0x168/0xc50 [ 35.286598] krealloc_less_oob+0x20/0x38 [ 35.290581] kunit_try_run_case+0x170/0x3f0 [ 35.294832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.300397] kthread+0x328/0x630 [ 35.303680] ret_from_fork+0x10/0x20 [ 35.307313] [ 35.308836] The buggy address belongs to the object at ffff00009697ec00 [ 35.308836] which belongs to the cache kmalloc-256 of size 256 [ 35.321486] The buggy address is located 17 bytes to the right of [ 35.321486] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 35.334669] [ 35.336202] The buggy address belongs to the physical page: [ 35.341847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 35.349951] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.357705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.364755] page_type: f5(slab) [ 35.367954] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.375799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.383642] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.391572] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.399501] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 35.407430] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.415356] page dumped because: kasan: bad access detected [ 35.421004] [ 35.422526] Memory state around the buggy address: [ 35.427378] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.434691] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.442000] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 35.449307] ^ [ 35.455473] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.462783] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.470092] ==================================================================
[ 30.958434] ================================================================== [ 30.958888] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.958959] Write of size 1 at addr fff00000c9bc60da by task kunit_try_catch/194 [ 30.959095] [ 30.959213] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.959352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.959378] Hardware name: linux,dummy-virt (DT) [ 30.959446] Call trace: [ 30.959716] show_stack+0x20/0x38 (C) [ 30.960229] dump_stack_lvl+0x8c/0xd0 [ 30.960615] print_report+0x118/0x608 [ 30.960738] kasan_report+0xdc/0x128 [ 30.960788] __asan_report_store1_noabort+0x20/0x30 [ 30.960852] krealloc_less_oob_helper+0xa80/0xc50 [ 30.961103] krealloc_large_less_oob+0x20/0x38 [ 30.961244] kunit_try_run_case+0x170/0x3f0 [ 30.961655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.962206] kthread+0x328/0x630 [ 30.962400] ret_from_fork+0x10/0x20 [ 30.963229] [ 30.963511] The buggy address belongs to the physical page: [ 30.963641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc4 [ 30.963814] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.963942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.964091] page_type: f8(unknown) [ 30.964147] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.964215] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.964566] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.964645] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.964949] head: 0bfffe0000000002 ffffc1ffc326f101 00000000ffffffff 00000000ffffffff [ 30.965140] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.965225] page dumped because: kasan: bad access detected [ 30.965359] [ 30.965378] Memory state around the buggy address: [ 30.965410] fff00000c9bc5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.965613] fff00000c9bc6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.965739] >fff00000c9bc6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.966016] ^ [ 30.966227] fff00000c9bc6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.966276] fff00000c9bc6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.966472] ================================================================== [ 30.950379] ================================================================== [ 30.950425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.950478] Write of size 1 at addr fff00000c9bc60d0 by task kunit_try_catch/194 [ 30.950864] [ 30.950979] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.951208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.951236] Hardware name: linux,dummy-virt (DT) [ 30.951270] Call trace: [ 30.951297] show_stack+0x20/0x38 (C) [ 30.951585] dump_stack_lvl+0x8c/0xd0 [ 30.951910] print_report+0x118/0x608 [ 30.951968] kasan_report+0xdc/0x128 [ 30.952176] __asan_report_store1_noabort+0x20/0x30 [ 30.952256] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.952583] krealloc_large_less_oob+0x20/0x38 [ 30.952746] kunit_try_run_case+0x170/0x3f0 [ 30.952923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.953051] kthread+0x328/0x630 [ 30.953124] ret_from_fork+0x10/0x20 [ 30.953511] [ 30.953630] The buggy address belongs to the physical page: [ 30.953707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc4 [ 30.953852] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.954139] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.954379] page_type: f8(unknown) [ 30.954580] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.954745] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.954853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.954974] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.955311] head: 0bfffe0000000002 ffffc1ffc326f101 00000000ffffffff 00000000ffffffff [ 30.955506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.955616] page dumped because: kasan: bad access detected [ 30.955763] [ 30.955881] Memory state around the buggy address: [ 30.955916] fff00000c9bc5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.956194] fff00000c9bc6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.956423] >fff00000c9bc6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.956482] ^ [ 30.956879] fff00000c9bc6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.957104] fff00000c9bc6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.957215] ================================================================== [ 30.973750] ================================================================== [ 30.973797] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.973860] Write of size 1 at addr fff00000c9bc60eb by task kunit_try_catch/194 [ 30.974028] [ 30.974106] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.974474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.974530] Hardware name: linux,dummy-virt (DT) [ 30.974566] Call trace: [ 30.974615] show_stack+0x20/0x38 (C) [ 30.974796] dump_stack_lvl+0x8c/0xd0 [ 30.974874] print_report+0x118/0x608 [ 30.975000] kasan_report+0xdc/0x128 [ 30.975086] __asan_report_store1_noabort+0x20/0x30 [ 30.975141] krealloc_less_oob_helper+0xa58/0xc50 [ 30.975198] krealloc_large_less_oob+0x20/0x38 [ 30.975515] kunit_try_run_case+0x170/0x3f0 [ 30.975645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.975732] kthread+0x328/0x630 [ 30.975777] ret_from_fork+0x10/0x20 [ 30.975975] [ 30.976155] The buggy address belongs to the physical page: [ 30.976205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc4 [ 30.976315] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.976412] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.976568] page_type: f8(unknown) [ 30.976625] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.976677] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.976737] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.977106] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.977270] head: 0bfffe0000000002 ffffc1ffc326f101 00000000ffffffff 00000000ffffffff [ 30.977423] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.977519] page dumped because: kasan: bad access detected [ 30.977615] [ 30.977756] Memory state around the buggy address: [ 30.977887] fff00000c9bc5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.977971] fff00000c9bc6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.978301] >fff00000c9bc6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.978371] ^ [ 30.978474] fff00000c9bc6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.978568] fff00000c9bc6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.978734] ================================================================== [ 30.898401] ================================================================== [ 30.898444] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.898509] Write of size 1 at addr fff00000c872c6eb by task kunit_try_catch/190 [ 30.898559] [ 30.898594] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.898675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.898700] Hardware name: linux,dummy-virt (DT) [ 30.898752] Call trace: [ 30.898781] show_stack+0x20/0x38 (C) [ 30.899670] dump_stack_lvl+0x8c/0xd0 [ 30.899742] print_report+0x118/0x608 [ 30.899814] kasan_report+0xdc/0x128 [ 30.900047] __asan_report_store1_noabort+0x20/0x30 [ 30.900122] krealloc_less_oob_helper+0xa58/0xc50 [ 30.900345] krealloc_less_oob+0x20/0x38 [ 30.900579] kunit_try_run_case+0x170/0x3f0 [ 30.900856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.901125] kthread+0x328/0x630 [ 30.901234] ret_from_fork+0x10/0x20 [ 30.901660] [ 30.901785] Allocated by task 190: [ 30.901977] kasan_save_stack+0x3c/0x68 [ 30.902106] kasan_save_track+0x20/0x40 [ 30.902295] kasan_save_alloc_info+0x40/0x58 [ 30.902335] __kasan_krealloc+0x118/0x178 [ 30.902573] krealloc_noprof+0x128/0x360 [ 30.902880] krealloc_less_oob_helper+0x168/0xc50 [ 30.903137] krealloc_less_oob+0x20/0x38 [ 30.903323] kunit_try_run_case+0x170/0x3f0 [ 30.903385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.903497] kthread+0x328/0x630 [ 30.903600] ret_from_fork+0x10/0x20 [ 30.903945] [ 30.904250] The buggy address belongs to the object at fff00000c872c600 [ 30.904250] which belongs to the cache kmalloc-256 of size 256 [ 30.904381] The buggy address is located 34 bytes to the right of [ 30.904381] allocated 201-byte region [fff00000c872c600, fff00000c872c6c9) [ 30.904513] [ 30.904545] The buggy address belongs to the physical page: [ 30.904633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 30.904691] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.904983] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.905226] page_type: f5(slab) [ 30.905396] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.905501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.905633] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.905701] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.905825] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 30.906188] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.906258] page dumped because: kasan: bad access detected [ 30.906289] [ 30.907053] Memory state around the buggy address: [ 30.907116] fff00000c872c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.907170] fff00000c872c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.907237] >fff00000c872c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.907312] ^ [ 30.907888] fff00000c872c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.908187] fff00000c872c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.908234] ================================================================== [ 30.872366] ================================================================== [ 30.872540] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.872696] Write of size 1 at addr fff00000c872c6d0 by task kunit_try_catch/190 [ 30.872945] [ 30.872983] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.873320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.873425] Hardware name: linux,dummy-virt (DT) [ 30.873564] Call trace: [ 30.873623] show_stack+0x20/0x38 (C) [ 30.873977] dump_stack_lvl+0x8c/0xd0 [ 30.874111] print_report+0x118/0x608 [ 30.874344] kasan_report+0xdc/0x128 [ 30.874561] __asan_report_store1_noabort+0x20/0x30 [ 30.874628] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.874797] krealloc_less_oob+0x20/0x38 [ 30.875001] kunit_try_run_case+0x170/0x3f0 [ 30.875219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.875482] kthread+0x328/0x630 [ 30.875576] ret_from_fork+0x10/0x20 [ 30.876108] [ 30.876143] Allocated by task 190: [ 30.876316] kasan_save_stack+0x3c/0x68 [ 30.876627] kasan_save_track+0x20/0x40 [ 30.876679] kasan_save_alloc_info+0x40/0x58 [ 30.877018] __kasan_krealloc+0x118/0x178 [ 30.877090] krealloc_noprof+0x128/0x360 [ 30.877285] krealloc_less_oob_helper+0x168/0xc50 [ 30.877511] krealloc_less_oob+0x20/0x38 [ 30.877699] kunit_try_run_case+0x170/0x3f0 [ 30.877784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.877988] kthread+0x328/0x630 [ 30.878071] ret_from_fork+0x10/0x20 [ 30.878488] [ 30.878534] The buggy address belongs to the object at fff00000c872c600 [ 30.878534] which belongs to the cache kmalloc-256 of size 256 [ 30.878615] The buggy address is located 7 bytes to the right of [ 30.878615] allocated 201-byte region [fff00000c872c600, fff00000c872c6c9) [ 30.878998] [ 30.879051] The buggy address belongs to the physical page: [ 30.879156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 30.879249] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.879343] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.879463] page_type: f5(slab) [ 30.880127] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.880282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.880337] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.880573] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.880629] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 30.880678] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.880861] page dumped because: kasan: bad access detected [ 30.881005] [ 30.881104] Memory state around the buggy address: [ 30.881529] fff00000c872c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.881617] fff00000c872c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.881735] >fff00000c872c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.882019] ^ [ 30.882196] fff00000c872c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.882249] fff00000c872c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.882287] ================================================================== [ 30.863635] ================================================================== [ 30.863699] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.863760] Write of size 1 at addr fff00000c872c6c9 by task kunit_try_catch/190 [ 30.864057] [ 30.864239] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.864345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.864419] Hardware name: linux,dummy-virt (DT) [ 30.864591] Call trace: [ 30.864615] show_stack+0x20/0x38 (C) [ 30.864804] dump_stack_lvl+0x8c/0xd0 [ 30.865094] print_report+0x118/0x608 [ 30.865302] kasan_report+0xdc/0x128 [ 30.865465] __asan_report_store1_noabort+0x20/0x30 [ 30.865631] krealloc_less_oob_helper+0xa48/0xc50 [ 30.865905] krealloc_less_oob+0x20/0x38 [ 30.866092] kunit_try_run_case+0x170/0x3f0 [ 30.866220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.866306] kthread+0x328/0x630 [ 30.866365] ret_from_fork+0x10/0x20 [ 30.866414] [ 30.866432] Allocated by task 190: [ 30.866469] kasan_save_stack+0x3c/0x68 [ 30.866514] kasan_save_track+0x20/0x40 [ 30.866573] kasan_save_alloc_info+0x40/0x58 [ 30.866611] __kasan_krealloc+0x118/0x178 [ 30.866659] krealloc_noprof+0x128/0x360 [ 30.866713] krealloc_less_oob_helper+0x168/0xc50 [ 30.866762] krealloc_less_oob+0x20/0x38 [ 30.866799] kunit_try_run_case+0x170/0x3f0 [ 30.866856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.866908] kthread+0x328/0x630 [ 30.866941] ret_from_fork+0x10/0x20 [ 30.866998] [ 30.867018] The buggy address belongs to the object at fff00000c872c600 [ 30.867018] which belongs to the cache kmalloc-256 of size 256 [ 30.867080] The buggy address is located 0 bytes to the right of [ 30.867080] allocated 201-byte region [fff00000c872c600, fff00000c872c6c9) [ 30.867148] [ 30.867168] The buggy address belongs to the physical page: [ 30.867200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 30.867251] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.867307] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.867367] page_type: f5(slab) [ 30.867407] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.867458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.867514] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.867570] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.867629] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 30.867685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.867733] page dumped because: kasan: bad access detected [ 30.867770] [ 30.867787] Memory state around the buggy address: [ 30.867827] fff00000c872c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.868143] fff00000c872c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.868402] >fff00000c872c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.868448] ^ [ 30.868847] fff00000c872c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.869422] fff00000c872c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.869722] ================================================================== [ 30.893295] ================================================================== [ 30.893441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.893499] Write of size 1 at addr fff00000c872c6ea by task kunit_try_catch/190 [ 30.893654] [ 30.893854] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.893943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.894129] Hardware name: linux,dummy-virt (DT) [ 30.894419] Call trace: [ 30.894454] show_stack+0x20/0x38 (C) [ 30.894516] dump_stack_lvl+0x8c/0xd0 [ 30.894649] print_report+0x118/0x608 [ 30.894735] kasan_report+0xdc/0x128 [ 30.895054] __asan_report_store1_noabort+0x20/0x30 [ 30.895253] krealloc_less_oob_helper+0xae4/0xc50 [ 30.895365] krealloc_less_oob+0x20/0x38 [ 30.895432] kunit_try_run_case+0x170/0x3f0 [ 30.895551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.895665] kthread+0x328/0x630 [ 30.895774] ret_from_fork+0x10/0x20 [ 30.895825] [ 30.895980] Allocated by task 190: [ 30.896175] kasan_save_stack+0x3c/0x68 [ 30.896287] kasan_save_track+0x20/0x40 [ 30.896423] kasan_save_alloc_info+0x40/0x58 [ 30.896477] __kasan_krealloc+0x118/0x178 [ 30.896638] krealloc_noprof+0x128/0x360 [ 30.896691] krealloc_less_oob_helper+0x168/0xc50 [ 30.896732] krealloc_less_oob+0x20/0x38 [ 30.896769] kunit_try_run_case+0x170/0x3f0 [ 30.896807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.896912] kthread+0x328/0x630 [ 30.896961] ret_from_fork+0x10/0x20 [ 30.897012] [ 30.897031] The buggy address belongs to the object at fff00000c872c600 [ 30.897031] which belongs to the cache kmalloc-256 of size 256 [ 30.897098] The buggy address is located 33 bytes to the right of [ 30.897098] allocated 201-byte region [fff00000c872c600, fff00000c872c6c9) [ 30.897163] [ 30.897181] The buggy address belongs to the physical page: [ 30.897219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 30.897280] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.897334] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.897392] page_type: f5(slab) [ 30.897430] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.897493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.897544] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.897615] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.897672] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 30.897730] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.897774] page dumped because: kasan: bad access detected [ 30.897803] [ 30.897821] Memory state around the buggy address: [ 30.897866] fff00000c872c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.897916] fff00000c872c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.897982] >fff00000c872c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.898033] ^ [ 30.898069] fff00000c872c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.898111] fff00000c872c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.898163] ================================================================== [ 30.967160] ================================================================== [ 30.967217] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.967270] Write of size 1 at addr fff00000c9bc60ea by task kunit_try_catch/194 [ 30.967318] [ 30.967348] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.967430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.967468] Hardware name: linux,dummy-virt (DT) [ 30.967500] Call trace: [ 30.967521] show_stack+0x20/0x38 (C) [ 30.967569] dump_stack_lvl+0x8c/0xd0 [ 30.967628] print_report+0x118/0x608 [ 30.967675] kasan_report+0xdc/0x128 [ 30.967720] __asan_report_store1_noabort+0x20/0x30 [ 30.967778] krealloc_less_oob_helper+0xae4/0xc50 [ 30.967828] krealloc_large_less_oob+0x20/0x38 [ 30.967888] kunit_try_run_case+0x170/0x3f0 [ 30.967937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.968012] kthread+0x328/0x630 [ 30.968055] ret_from_fork+0x10/0x20 [ 30.968101] [ 30.968120] The buggy address belongs to the physical page: [ 30.968150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc4 [ 30.968201] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.968246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.968296] page_type: f8(unknown) [ 30.969105] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.969171] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.969646] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.969844] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.969916] head: 0bfffe0000000002 ffffc1ffc326f101 00000000ffffffff 00000000ffffffff [ 30.970310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.970370] page dumped because: kasan: bad access detected [ 30.970474] [ 30.970493] Memory state around the buggy address: [ 30.970544] fff00000c9bc5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.970883] fff00000c9bc6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.970983] >fff00000c9bc6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.971387] ^ [ 30.971453] fff00000c9bc6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.971817] fff00000c9bc6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.971991] ================================================================== [ 30.884683] ================================================================== [ 30.884741] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.884960] Write of size 1 at addr fff00000c872c6da by task kunit_try_catch/190 [ 30.885083] [ 30.885245] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.885345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.885491] Hardware name: linux,dummy-virt (DT) [ 30.885635] Call trace: [ 30.885767] show_stack+0x20/0x38 (C) [ 30.885825] dump_stack_lvl+0x8c/0xd0 [ 30.885885] print_report+0x118/0x608 [ 30.885932] kasan_report+0xdc/0x128 [ 30.885985] __asan_report_store1_noabort+0x20/0x30 [ 30.886046] krealloc_less_oob_helper+0xa80/0xc50 [ 30.886104] krealloc_less_oob+0x20/0x38 [ 30.886152] kunit_try_run_case+0x170/0x3f0 [ 30.886201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.886264] kthread+0x328/0x630 [ 30.886306] ret_from_fork+0x10/0x20 [ 30.886353] [ 30.886371] Allocated by task 190: [ 30.886399] kasan_save_stack+0x3c/0x68 [ 30.886441] kasan_save_track+0x20/0x40 [ 30.886488] kasan_save_alloc_info+0x40/0x58 [ 30.886526] __kasan_krealloc+0x118/0x178 [ 30.886574] krealloc_noprof+0x128/0x360 [ 30.886611] krealloc_less_oob_helper+0x168/0xc50 [ 30.886657] krealloc_less_oob+0x20/0x38 [ 30.886709] kunit_try_run_case+0x170/0x3f0 [ 30.886747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.886806] kthread+0x328/0x630 [ 30.887517] ret_from_fork+0x10/0x20 [ 30.887569] [ 30.887589] The buggy address belongs to the object at fff00000c872c600 [ 30.887589] which belongs to the cache kmalloc-256 of size 256 [ 30.887678] The buggy address is located 17 bytes to the right of [ 30.887678] allocated 201-byte region [fff00000c872c600, fff00000c872c6c9) [ 30.887937] [ 30.888272] The buggy address belongs to the physical page: [ 30.888361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 30.888579] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.888750] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.888962] page_type: f5(slab) [ 30.889093] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.889357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.889611] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.889666] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.889829] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 30.890084] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.890236] page dumped because: kasan: bad access detected [ 30.890670] [ 30.890852] Memory state around the buggy address: [ 30.891051] fff00000c872c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.891148] fff00000c872c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.891250] >fff00000c872c680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.891379] ^ [ 30.891417] fff00000c872c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.891894] fff00000c872c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.892036] ================================================================== [ 30.946120] ================================================================== [ 30.946183] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.946246] Write of size 1 at addr fff00000c9bc60c9 by task kunit_try_catch/194 [ 30.946593] [ 30.946732] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.946826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.946864] Hardware name: linux,dummy-virt (DT) [ 30.946899] Call trace: [ 30.946921] show_stack+0x20/0x38 (C) [ 30.946972] dump_stack_lvl+0x8c/0xd0 [ 30.947021] print_report+0x118/0x608 [ 30.947069] kasan_report+0xdc/0x128 [ 30.947136] __asan_report_store1_noabort+0x20/0x30 [ 30.947186] krealloc_less_oob_helper+0xa48/0xc50 [ 30.947235] krealloc_large_less_oob+0x20/0x38 [ 30.947284] kunit_try_run_case+0x170/0x3f0 [ 30.947333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.947387] kthread+0x328/0x630 [ 30.947428] ret_from_fork+0x10/0x20 [ 30.947475] [ 30.947495] The buggy address belongs to the physical page: [ 30.947528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc4 [ 30.947580] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.947627] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.947679] page_type: f8(unknown) [ 30.947744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.947796] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.947858] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.947910] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.947959] head: 0bfffe0000000002 ffffc1ffc326f101 00000000ffffffff 00000000ffffffff [ 30.948017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.948064] page dumped because: kasan: bad access detected [ 30.948103] [ 30.948121] Memory state around the buggy address: [ 30.948161] fff00000c9bc5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.948203] fff00000c9bc6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.948244] >fff00000c9bc6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.948281] ^ [ 30.949085] fff00000c9bc6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.949228] fff00000c9bc6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.949313] ==================================================================
[ 22.778638] ================================================================== [ 22.779128] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 22.780779] Write of size 1 at addr ffff8881055a0ec9 by task kunit_try_catch/207 [ 22.781895] [ 22.782021] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.782070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.782083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.782104] Call Trace: [ 22.782117] <TASK> [ 22.782200] dump_stack_lvl+0x73/0xb0 [ 22.782234] print_report+0xd1/0x650 [ 22.782257] ? __virt_addr_valid+0x1db/0x2d0 [ 22.782280] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.782302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.782327] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.782350] kasan_report+0x141/0x180 [ 22.782372] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.782399] __asan_report_store1_noabort+0x1b/0x30 [ 22.782422] krealloc_less_oob_helper+0xd70/0x11d0 [ 22.782448] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.782482] ? finish_task_switch.isra.0+0x153/0x700 [ 22.782503] ? __switch_to+0x47/0xf50 [ 22.782531] ? __schedule+0x10cc/0x2b60 [ 22.782556] ? __pfx_read_tsc+0x10/0x10 [ 22.782581] krealloc_less_oob+0x1c/0x30 [ 22.782603] kunit_try_run_case+0x1a5/0x480 [ 22.782628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.782651] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.782671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.782696] ? __kthread_parkme+0x82/0x180 [ 22.782716] ? preempt_count_sub+0x50/0x80 [ 22.782738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.782763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.782786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.782810] kthread+0x337/0x6f0 [ 22.782829] ? trace_preempt_on+0x20/0xc0 [ 22.782852] ? __pfx_kthread+0x10/0x10 [ 22.782873] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.782896] ? calculate_sigpending+0x7b/0xa0 [ 22.782919] ? __pfx_kthread+0x10/0x10 [ 22.782940] ret_from_fork+0x116/0x1d0 [ 22.782959] ? __pfx_kthread+0x10/0x10 [ 22.782979] ret_from_fork_asm+0x1a/0x30 [ 22.783010] </TASK> [ 22.783021] [ 22.790385] Allocated by task 207: [ 22.790570] kasan_save_stack+0x45/0x70 [ 22.790768] kasan_save_track+0x18/0x40 [ 22.790953] kasan_save_alloc_info+0x3b/0x50 [ 22.791251] __kasan_krealloc+0x190/0x1f0 [ 22.791430] krealloc_noprof+0xf3/0x340 [ 22.791616] krealloc_less_oob_helper+0x1aa/0x11d0 [ 22.791770] krealloc_less_oob+0x1c/0x30 [ 22.791901] kunit_try_run_case+0x1a5/0x480 [ 22.792040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.792360] kthread+0x337/0x6f0 [ 22.792542] ret_from_fork+0x116/0x1d0 [ 22.792725] ret_from_fork_asm+0x1a/0x30 [ 22.792914] [ 22.793008] The buggy address belongs to the object at ffff8881055a0e00 [ 22.793008] which belongs to the cache kmalloc-256 of size 256 [ 22.793621] The buggy address is located 0 bytes to the right of [ 22.793621] allocated 201-byte region [ffff8881055a0e00, ffff8881055a0ec9) [ 22.794025] [ 22.794115] The buggy address belongs to the physical page: [ 22.794445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055a0 [ 22.794813] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.795104] flags: 0x200000000000040(head|node=0|zone=2) [ 22.795535] page_type: f5(slab) [ 22.795686] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.795973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.796295] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.796570] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.796913] head: 0200000000000001 ffffea0004156801 00000000ffffffff 00000000ffffffff [ 22.797336] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.797667] page dumped because: kasan: bad access detected [ 22.797882] [ 22.797972] Memory state around the buggy address: [ 22.798244] ffff8881055a0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.798484] ffff8881055a0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.798692] >ffff8881055a0e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.798969] ^ [ 22.799303] ffff8881055a0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.799632] ffff8881055a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.799934] ================================================================== [ 22.853585] ================================================================== [ 22.853889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 22.854140] Write of size 1 at addr ffff8881055a0eea by task kunit_try_catch/207 [ 22.855492] [ 22.855616] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.855664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.855677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.855697] Call Trace: [ 22.855710] <TASK> [ 22.855725] dump_stack_lvl+0x73/0xb0 [ 22.855752] print_report+0xd1/0x650 [ 22.855774] ? __virt_addr_valid+0x1db/0x2d0 [ 22.855796] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.855819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.855844] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.855866] kasan_report+0x141/0x180 [ 22.855888] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.855915] __asan_report_store1_noabort+0x1b/0x30 [ 22.855938] krealloc_less_oob_helper+0xe90/0x11d0 [ 22.855963] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.855986] ? finish_task_switch.isra.0+0x153/0x700 [ 22.856006] ? __switch_to+0x47/0xf50 [ 22.856031] ? __schedule+0x10cc/0x2b60 [ 22.856058] ? __pfx_read_tsc+0x10/0x10 [ 22.856086] krealloc_less_oob+0x1c/0x30 [ 22.856107] kunit_try_run_case+0x1a5/0x480 [ 22.856131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.856154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.856175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.856212] ? __kthread_parkme+0x82/0x180 [ 22.856231] ? preempt_count_sub+0x50/0x80 [ 22.856254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.856279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.856303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.856327] kthread+0x337/0x6f0 [ 22.856346] ? trace_preempt_on+0x20/0xc0 [ 22.856368] ? __pfx_kthread+0x10/0x10 [ 22.856388] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.856411] ? calculate_sigpending+0x7b/0xa0 [ 22.856434] ? __pfx_kthread+0x10/0x10 [ 22.856465] ret_from_fork+0x116/0x1d0 [ 22.856484] ? __pfx_kthread+0x10/0x10 [ 22.856504] ret_from_fork_asm+0x1a/0x30 [ 22.856535] </TASK> [ 22.856546] [ 22.870389] Allocated by task 207: [ 22.870530] kasan_save_stack+0x45/0x70 [ 22.870674] kasan_save_track+0x18/0x40 [ 22.870798] kasan_save_alloc_info+0x3b/0x50 [ 22.870933] __kasan_krealloc+0x190/0x1f0 [ 22.871061] krealloc_noprof+0xf3/0x340 [ 22.871254] krealloc_less_oob_helper+0x1aa/0x11d0 [ 22.872101] krealloc_less_oob+0x1c/0x30 [ 22.872683] kunit_try_run_case+0x1a5/0x480 [ 22.873215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.873965] kthread+0x337/0x6f0 [ 22.874540] ret_from_fork+0x116/0x1d0 [ 22.874990] ret_from_fork_asm+0x1a/0x30 [ 22.875500] [ 22.875717] The buggy address belongs to the object at ffff8881055a0e00 [ 22.875717] which belongs to the cache kmalloc-256 of size 256 [ 22.877138] The buggy address is located 33 bytes to the right of [ 22.877138] allocated 201-byte region [ffff8881055a0e00, ffff8881055a0ec9) [ 22.877781] [ 22.877862] The buggy address belongs to the physical page: [ 22.878033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055a0 [ 22.878285] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.878783] flags: 0x200000000000040(head|node=0|zone=2) [ 22.879426] page_type: f5(slab) [ 22.879616] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.880064] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.880646] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.881076] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.881596] head: 0200000000000001 ffffea0004156801 00000000ffffffff 00000000ffffffff [ 22.882028] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.882490] page dumped because: kasan: bad access detected [ 22.882842] [ 22.882941] Memory state around the buggy address: [ 22.883149] ffff8881055a0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.883815] ffff8881055a0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.884215] >ffff8881055a0e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.884739] ^ [ 22.885005] ffff8881055a0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.885391] ffff8881055a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.886002] ================================================================== [ 22.887167] ================================================================== [ 22.887809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 22.888877] Write of size 1 at addr ffff8881055a0eeb by task kunit_try_catch/207 [ 22.889653] [ 22.889936] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.890124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.890139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.890211] Call Trace: [ 22.890230] <TASK> [ 22.890246] dump_stack_lvl+0x73/0xb0 [ 22.890275] print_report+0xd1/0x650 [ 22.890298] ? __virt_addr_valid+0x1db/0x2d0 [ 22.890320] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.890343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.890368] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.890391] kasan_report+0x141/0x180 [ 22.890412] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.890439] __asan_report_store1_noabort+0x1b/0x30 [ 22.890473] krealloc_less_oob_helper+0xd47/0x11d0 [ 22.890498] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.890522] ? finish_task_switch.isra.0+0x153/0x700 [ 22.890542] ? __switch_to+0x47/0xf50 [ 22.890568] ? __schedule+0x10cc/0x2b60 [ 22.890594] ? __pfx_read_tsc+0x10/0x10 [ 22.890619] krealloc_less_oob+0x1c/0x30 [ 22.890641] kunit_try_run_case+0x1a5/0x480 [ 22.890666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.890689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.890710] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.890735] ? __kthread_parkme+0x82/0x180 [ 22.890755] ? preempt_count_sub+0x50/0x80 [ 22.890778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.890802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.890825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.890849] kthread+0x337/0x6f0 [ 22.890869] ? trace_preempt_on+0x20/0xc0 [ 22.890891] ? __pfx_kthread+0x10/0x10 [ 22.890912] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.890935] ? calculate_sigpending+0x7b/0xa0 [ 22.890959] ? __pfx_kthread+0x10/0x10 [ 22.890980] ret_from_fork+0x116/0x1d0 [ 22.890999] ? __pfx_kthread+0x10/0x10 [ 22.891019] ret_from_fork_asm+0x1a/0x30 [ 22.891050] </TASK> [ 22.891060] [ 22.902270] Allocated by task 207: [ 22.902605] kasan_save_stack+0x45/0x70 [ 22.902806] kasan_save_track+0x18/0x40 [ 22.902983] kasan_save_alloc_info+0x3b/0x50 [ 22.903179] __kasan_krealloc+0x190/0x1f0 [ 22.903351] krealloc_noprof+0xf3/0x340 [ 22.903531] krealloc_less_oob_helper+0x1aa/0x11d0 [ 22.903750] krealloc_less_oob+0x1c/0x30 [ 22.903931] kunit_try_run_case+0x1a5/0x480 [ 22.904119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.904888] kthread+0x337/0x6f0 [ 22.905046] ret_from_fork+0x116/0x1d0 [ 22.905227] ret_from_fork_asm+0x1a/0x30 [ 22.905712] [ 22.905813] The buggy address belongs to the object at ffff8881055a0e00 [ 22.905813] which belongs to the cache kmalloc-256 of size 256 [ 22.906855] The buggy address is located 34 bytes to the right of [ 22.906855] allocated 201-byte region [ffff8881055a0e00, ffff8881055a0ec9) [ 22.907720] [ 22.907902] The buggy address belongs to the physical page: [ 22.908122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055a0 [ 22.908745] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.909106] flags: 0x200000000000040(head|node=0|zone=2) [ 22.909453] page_type: f5(slab) [ 22.909766] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.910270] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.910714] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.911098] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.911504] head: 0200000000000001 ffffea0004156801 00000000ffffffff 00000000ffffffff [ 22.911833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.912142] page dumped because: kasan: bad access detected [ 22.912806] [ 22.912902] Memory state around the buggy address: [ 22.913069] ffff8881055a0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.913592] ffff8881055a0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.913879] >ffff8881055a0e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.914136] ^ [ 22.914400] ffff8881055a0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.914708] ffff8881055a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.914988] ================================================================== [ 22.974710] ================================================================== [ 22.975082] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 22.975475] Write of size 1 at addr ffff8881057460c9 by task kunit_try_catch/211 [ 22.976588] [ 22.976896] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.976949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.977068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.977090] Call Trace: [ 22.977104] <TASK> [ 22.977121] dump_stack_lvl+0x73/0xb0 [ 22.977154] print_report+0xd1/0x650 [ 22.977176] ? __virt_addr_valid+0x1db/0x2d0 [ 22.977221] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.977244] ? kasan_addr_to_slab+0x11/0xa0 [ 22.977268] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.977290] kasan_report+0x141/0x180 [ 22.977312] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.977339] __asan_report_store1_noabort+0x1b/0x30 [ 22.977363] krealloc_less_oob_helper+0xd70/0x11d0 [ 22.977388] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.977410] ? finish_task_switch.isra.0+0x153/0x700 [ 22.977432] ? __switch_to+0x47/0xf50 [ 22.977476] ? __schedule+0x10cc/0x2b60 [ 22.977502] ? __pfx_read_tsc+0x10/0x10 [ 22.977533] krealloc_large_less_oob+0x1c/0x30 [ 22.977556] kunit_try_run_case+0x1a5/0x480 [ 22.977582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.977604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.977625] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.977650] ? __kthread_parkme+0x82/0x180 [ 22.977670] ? preempt_count_sub+0x50/0x80 [ 22.977692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.977715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.977738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.977762] kthread+0x337/0x6f0 [ 22.977781] ? trace_preempt_on+0x20/0xc0 [ 22.977804] ? __pfx_kthread+0x10/0x10 [ 22.977825] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.977851] ? calculate_sigpending+0x7b/0xa0 [ 22.977875] ? __pfx_kthread+0x10/0x10 [ 22.977896] ret_from_fork+0x116/0x1d0 [ 22.977915] ? __pfx_kthread+0x10/0x10 [ 22.977935] ret_from_fork_asm+0x1a/0x30 [ 22.977967] </TASK> [ 22.977978] [ 22.994543] The buggy address belongs to the physical page: [ 22.994723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105744 [ 22.995737] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.996536] flags: 0x200000000000040(head|node=0|zone=2) [ 22.997196] page_type: f8(unknown) [ 22.997683] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.998364] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.998605] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.998827] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.999066] head: 0200000000000002 ffffea000415d101 00000000ffffffff 00000000ffffffff [ 22.999476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.999793] page dumped because: kasan: bad access detected [ 23.000447] [ 23.000568] Memory state around the buggy address: [ 23.001065] ffff888105745f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.001531] ffff888105746000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.001777] >ffff888105746080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.002096] ^ [ 23.002572] ffff888105746100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.002947] ffff888105746180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.003499] ================================================================== [ 23.040710] ================================================================== [ 23.041212] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 23.041669] Write of size 1 at addr ffff8881057460ea by task kunit_try_catch/211 [ 23.041971] [ 23.042099] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.042200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.042215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.042235] Call Trace: [ 23.042248] <TASK> [ 23.042262] dump_stack_lvl+0x73/0xb0 [ 23.042289] print_report+0xd1/0x650 [ 23.042310] ? __virt_addr_valid+0x1db/0x2d0 [ 23.042333] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.042355] ? kasan_addr_to_slab+0x11/0xa0 [ 23.042379] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.042402] kasan_report+0x141/0x180 [ 23.042423] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.042450] __asan_report_store1_noabort+0x1b/0x30 [ 23.042487] krealloc_less_oob_helper+0xe90/0x11d0 [ 23.042512] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.042535] ? finish_task_switch.isra.0+0x153/0x700 [ 23.042555] ? __switch_to+0x47/0xf50 [ 23.042586] ? __schedule+0x10cc/0x2b60 [ 23.042610] ? __pfx_read_tsc+0x10/0x10 [ 23.042639] krealloc_large_less_oob+0x1c/0x30 [ 23.042661] kunit_try_run_case+0x1a5/0x480 [ 23.042685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.042707] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.042727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.042775] ? __kthread_parkme+0x82/0x180 [ 23.042795] ? preempt_count_sub+0x50/0x80 [ 23.042817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.042841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.042879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.042916] kthread+0x337/0x6f0 [ 23.042949] ? trace_preempt_on+0x20/0xc0 [ 23.042971] ? __pfx_kthread+0x10/0x10 [ 23.042991] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.043014] ? calculate_sigpending+0x7b/0xa0 [ 23.043037] ? __pfx_kthread+0x10/0x10 [ 23.043059] ret_from_fork+0x116/0x1d0 [ 23.043078] ? __pfx_kthread+0x10/0x10 [ 23.043099] ret_from_fork_asm+0x1a/0x30 [ 23.043129] </TASK> [ 23.043140] [ 23.051821] The buggy address belongs to the physical page: [ 23.052588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105744 [ 23.052830] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.053126] flags: 0x200000000000040(head|node=0|zone=2) [ 23.053415] page_type: f8(unknown) [ 23.053601] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.053943] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.054310] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.054720] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.055054] head: 0200000000000002 ffffea000415d101 00000000ffffffff 00000000ffffffff [ 23.055479] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.055799] page dumped because: kasan: bad access detected [ 23.055972] [ 23.056042] Memory state around the buggy address: [ 23.056418] ffff888105745f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.056930] ffff888105746000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.057283] >ffff888105746080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.057744] ^ [ 23.058055] ffff888105746100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.058489] ffff888105746180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.058732] ================================================================== [ 22.801892] ================================================================== [ 22.802500] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 22.802746] Write of size 1 at addr ffff8881055a0ed0 by task kunit_try_catch/207 [ 22.802963] [ 22.803042] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.803086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.803098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.803117] Call Trace: [ 22.803130] <TASK> [ 22.803810] dump_stack_lvl+0x73/0xb0 [ 22.803852] print_report+0xd1/0x650 [ 22.803876] ? __virt_addr_valid+0x1db/0x2d0 [ 22.803898] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 22.803921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.803948] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 22.803972] kasan_report+0x141/0x180 [ 22.803994] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 22.804021] __asan_report_store1_noabort+0x1b/0x30 [ 22.804045] krealloc_less_oob_helper+0xe23/0x11d0 [ 22.804070] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.804094] ? finish_task_switch.isra.0+0x153/0x700 [ 22.804115] ? __switch_to+0x47/0xf50 [ 22.804149] ? __schedule+0x10cc/0x2b60 [ 22.804174] ? __pfx_read_tsc+0x10/0x10 [ 22.804199] krealloc_less_oob+0x1c/0x30 [ 22.804220] kunit_try_run_case+0x1a5/0x480 [ 22.804244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.804267] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.804287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.804312] ? __kthread_parkme+0x82/0x180 [ 22.804332] ? preempt_count_sub+0x50/0x80 [ 22.804354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.804378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.804402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.804425] kthread+0x337/0x6f0 [ 22.804446] ? trace_preempt_on+0x20/0xc0 [ 22.804480] ? __pfx_kthread+0x10/0x10 [ 22.804545] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.804569] ? calculate_sigpending+0x7b/0xa0 [ 22.804593] ? __pfx_kthread+0x10/0x10 [ 22.804615] ret_from_fork+0x116/0x1d0 [ 22.804635] ? __pfx_kthread+0x10/0x10 [ 22.804656] ret_from_fork_asm+0x1a/0x30 [ 22.804688] </TASK> [ 22.804700] [ 22.812869] Allocated by task 207: [ 22.813029] kasan_save_stack+0x45/0x70 [ 22.813228] kasan_save_track+0x18/0x40 [ 22.813505] kasan_save_alloc_info+0x3b/0x50 [ 22.813716] __kasan_krealloc+0x190/0x1f0 [ 22.813917] krealloc_noprof+0xf3/0x340 [ 22.814105] krealloc_less_oob_helper+0x1aa/0x11d0 [ 22.814412] krealloc_less_oob+0x1c/0x30 [ 22.814788] kunit_try_run_case+0x1a5/0x480 [ 22.814946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.815145] kthread+0x337/0x6f0 [ 22.815325] ret_from_fork+0x116/0x1d0 [ 22.815594] ret_from_fork_asm+0x1a/0x30 [ 22.815736] [ 22.815800] The buggy address belongs to the object at ffff8881055a0e00 [ 22.815800] which belongs to the cache kmalloc-256 of size 256 [ 22.816359] The buggy address is located 7 bytes to the right of [ 22.816359] allocated 201-byte region [ffff8881055a0e00, ffff8881055a0ec9) [ 22.816992] [ 22.817086] The buggy address belongs to the physical page: [ 22.817328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055a0 [ 22.817574] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.818312] flags: 0x200000000000040(head|node=0|zone=2) [ 22.818565] page_type: f5(slab) [ 22.818683] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.818935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.819736] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.820562] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.821370] head: 0200000000000001 ffffea0004156801 00000000ffffffff 00000000ffffffff [ 22.821858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.822369] page dumped because: kasan: bad access detected [ 22.822759] [ 22.822849] Memory state around the buggy address: [ 22.823053] ffff8881055a0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.823612] ffff8881055a0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.823916] >ffff8881055a0e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.824551] ^ [ 22.824958] ffff8881055a0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.825606] ffff8881055a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.825903] ================================================================== [ 23.023109] ================================================================== [ 23.023443] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 23.023872] Write of size 1 at addr ffff8881057460da by task kunit_try_catch/211 [ 23.024286] [ 23.024374] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.024440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.024453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.024484] Call Trace: [ 23.024498] <TASK> [ 23.024513] dump_stack_lvl+0x73/0xb0 [ 23.024538] print_report+0xd1/0x650 [ 23.024559] ? __virt_addr_valid+0x1db/0x2d0 [ 23.024581] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.024624] ? kasan_addr_to_slab+0x11/0xa0 [ 23.024648] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.024670] kasan_report+0x141/0x180 [ 23.024691] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.024718] __asan_report_store1_noabort+0x1b/0x30 [ 23.024742] krealloc_less_oob_helper+0xec6/0x11d0 [ 23.024785] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.024808] ? finish_task_switch.isra.0+0x153/0x700 [ 23.024829] ? __switch_to+0x47/0xf50 [ 23.024859] ? __schedule+0x10cc/0x2b60 [ 23.024884] ? __pfx_read_tsc+0x10/0x10 [ 23.024913] krealloc_large_less_oob+0x1c/0x30 [ 23.024936] kunit_try_run_case+0x1a5/0x480 [ 23.024960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.024983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.025020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.025045] ? __kthread_parkme+0x82/0x180 [ 23.025064] ? preempt_count_sub+0x50/0x80 [ 23.025103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.025127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.025194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.025219] kthread+0x337/0x6f0 [ 23.025239] ? trace_preempt_on+0x20/0xc0 [ 23.025261] ? __pfx_kthread+0x10/0x10 [ 23.025281] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.025304] ? calculate_sigpending+0x7b/0xa0 [ 23.025328] ? __pfx_kthread+0x10/0x10 [ 23.025349] ret_from_fork+0x116/0x1d0 [ 23.025369] ? __pfx_kthread+0x10/0x10 [ 23.025389] ret_from_fork_asm+0x1a/0x30 [ 23.025419] </TASK> [ 23.025430] [ 23.033725] The buggy address belongs to the physical page: [ 23.033928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105744 [ 23.034541] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.034916] flags: 0x200000000000040(head|node=0|zone=2) [ 23.035262] page_type: f8(unknown) [ 23.035469] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.035804] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.036159] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.036504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.036772] head: 0200000000000002 ffffea000415d101 00000000ffffffff 00000000ffffffff [ 23.037103] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.037667] page dumped because: kasan: bad access detected [ 23.037850] [ 23.037916] Memory state around the buggy address: [ 23.038065] ffff888105745f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.038586] ffff888105746000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.038929] >ffff888105746080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.039491] ^ [ 23.039794] ffff888105746100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.040102] ffff888105746180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.040365] ================================================================== [ 23.004414] ================================================================== [ 23.005674] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 23.006078] Write of size 1 at addr ffff8881057460d0 by task kunit_try_catch/211 [ 23.007013] [ 23.007224] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.007371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.007385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.007405] Call Trace: [ 23.007418] <TASK> [ 23.007432] dump_stack_lvl+0x73/0xb0 [ 23.007475] print_report+0xd1/0x650 [ 23.007497] ? __virt_addr_valid+0x1db/0x2d0 [ 23.007520] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.007542] ? kasan_addr_to_slab+0x11/0xa0 [ 23.007565] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.007588] kasan_report+0x141/0x180 [ 23.007609] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.007636] __asan_report_store1_noabort+0x1b/0x30 [ 23.007660] krealloc_less_oob_helper+0xe23/0x11d0 [ 23.007684] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.007707] ? finish_task_switch.isra.0+0x153/0x700 [ 23.007728] ? __switch_to+0x47/0xf50 [ 23.007758] ? __schedule+0x10cc/0x2b60 [ 23.007783] ? __pfx_read_tsc+0x10/0x10 [ 23.007812] krealloc_large_less_oob+0x1c/0x30 [ 23.007833] kunit_try_run_case+0x1a5/0x480 [ 23.007858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.007880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.007900] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.007925] ? __kthread_parkme+0x82/0x180 [ 23.007944] ? preempt_count_sub+0x50/0x80 [ 23.007966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.007990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.008012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.008036] kthread+0x337/0x6f0 [ 23.008054] ? trace_preempt_on+0x20/0xc0 [ 23.008076] ? __pfx_kthread+0x10/0x10 [ 23.008096] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.008118] ? calculate_sigpending+0x7b/0xa0 [ 23.008142] ? __pfx_kthread+0x10/0x10 [ 23.008163] ret_from_fork+0x116/0x1d0 [ 23.008182] ? __pfx_kthread+0x10/0x10 [ 23.008203] ret_from_fork_asm+0x1a/0x30 [ 23.008233] </TASK> [ 23.008245] [ 23.016151] The buggy address belongs to the physical page: [ 23.016529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105744 [ 23.016900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.017438] flags: 0x200000000000040(head|node=0|zone=2) [ 23.017729] page_type: f8(unknown) [ 23.017890] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.018106] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.018342] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.018927] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.019339] head: 0200000000000002 ffffea000415d101 00000000ffffffff 00000000ffffffff [ 23.019691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.019990] page dumped because: kasan: bad access detected [ 23.020195] [ 23.020286] Memory state around the buggy address: [ 23.020512] ffff888105745f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.020821] ffff888105746000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.021154] >ffff888105746080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.021451] ^ [ 23.021714] ffff888105746100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.022112] ffff888105746180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.022704] ================================================================== [ 23.059106] ================================================================== [ 23.059371] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 23.059725] Write of size 1 at addr ffff8881057460eb by task kunit_try_catch/211 [ 23.059966] [ 23.060041] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.060082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.060094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.060113] Call Trace: [ 23.060128] <TASK> [ 23.060143] dump_stack_lvl+0x73/0xb0 [ 23.060168] print_report+0xd1/0x650 [ 23.060189] ? __virt_addr_valid+0x1db/0x2d0 [ 23.060211] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.060233] ? kasan_addr_to_slab+0x11/0xa0 [ 23.060257] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.060279] kasan_report+0x141/0x180 [ 23.060300] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.060328] __asan_report_store1_noabort+0x1b/0x30 [ 23.060351] krealloc_less_oob_helper+0xd47/0x11d0 [ 23.060375] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.060398] ? finish_task_switch.isra.0+0x153/0x700 [ 23.060419] ? __switch_to+0x47/0xf50 [ 23.060449] ? __schedule+0x10cc/0x2b60 [ 23.060584] ? __pfx_read_tsc+0x10/0x10 [ 23.060614] krealloc_large_less_oob+0x1c/0x30 [ 23.060637] kunit_try_run_case+0x1a5/0x480 [ 23.060662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.060684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.060705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.060729] ? __kthread_parkme+0x82/0x180 [ 23.060749] ? preempt_count_sub+0x50/0x80 [ 23.060771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.060795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.060818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.060841] kthread+0x337/0x6f0 [ 23.060860] ? trace_preempt_on+0x20/0xc0 [ 23.060882] ? __pfx_kthread+0x10/0x10 [ 23.060902] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.060925] ? calculate_sigpending+0x7b/0xa0 [ 23.060949] ? __pfx_kthread+0x10/0x10 [ 23.060970] ret_from_fork+0x116/0x1d0 [ 23.060989] ? __pfx_kthread+0x10/0x10 [ 23.061009] ret_from_fork_asm+0x1a/0x30 [ 23.061039] </TASK> [ 23.061049] [ 23.070038] The buggy address belongs to the physical page: [ 23.070360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105744 [ 23.070845] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.071173] flags: 0x200000000000040(head|node=0|zone=2) [ 23.071503] page_type: f8(unknown) [ 23.071648] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.071983] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.072329] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.072569] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.072975] head: 0200000000000002 ffffea000415d101 00000000ffffffff 00000000ffffffff [ 23.073438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.073773] page dumped because: kasan: bad access detected [ 23.074017] [ 23.074083] Memory state around the buggy address: [ 23.074224] ffff888105745f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.074425] ffff888105746000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.074765] >ffff888105746080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.075076] ^ [ 23.075563] ffff888105746100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.076103] ffff888105746180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.076526] ================================================================== [ 22.827038] ================================================================== [ 22.827671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 22.828136] Write of size 1 at addr ffff8881055a0eda by task kunit_try_catch/207 [ 22.828744] [ 22.828853] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.828898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.828911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.828930] Call Trace: [ 22.828945] <TASK> [ 22.828960] dump_stack_lvl+0x73/0xb0 [ 22.828989] print_report+0xd1/0x650 [ 22.829010] ? __virt_addr_valid+0x1db/0x2d0 [ 22.829033] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 22.829055] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.829080] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 22.829103] kasan_report+0x141/0x180 [ 22.829125] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 22.829154] __asan_report_store1_noabort+0x1b/0x30 [ 22.829178] krealloc_less_oob_helper+0xec6/0x11d0 [ 22.829359] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.829385] ? finish_task_switch.isra.0+0x153/0x700 [ 22.829421] ? __switch_to+0x47/0xf50 [ 22.829447] ? __schedule+0x10cc/0x2b60 [ 22.829484] ? __pfx_read_tsc+0x10/0x10 [ 22.829509] krealloc_less_oob+0x1c/0x30 [ 22.829531] kunit_try_run_case+0x1a5/0x480 [ 22.829556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.829579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.829601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.829626] ? __kthread_parkme+0x82/0x180 [ 22.829645] ? preempt_count_sub+0x50/0x80 [ 22.829667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.829691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.829714] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.829738] kthread+0x337/0x6f0 [ 22.829758] ? trace_preempt_on+0x20/0xc0 [ 22.829779] ? __pfx_kthread+0x10/0x10 [ 22.829799] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.829822] ? calculate_sigpending+0x7b/0xa0 [ 22.829854] ? __pfx_kthread+0x10/0x10 [ 22.829876] ret_from_fork+0x116/0x1d0 [ 22.829894] ? __pfx_kthread+0x10/0x10 [ 22.829915] ret_from_fork_asm+0x1a/0x30 [ 22.829946] </TASK> [ 22.829956] [ 22.840036] Allocated by task 207: [ 22.840498] kasan_save_stack+0x45/0x70 [ 22.840710] kasan_save_track+0x18/0x40 [ 22.840924] kasan_save_alloc_info+0x3b/0x50 [ 22.841111] __kasan_krealloc+0x190/0x1f0 [ 22.841580] krealloc_noprof+0xf3/0x340 [ 22.841866] krealloc_less_oob_helper+0x1aa/0x11d0 [ 22.842049] krealloc_less_oob+0x1c/0x30 [ 22.842262] kunit_try_run_case+0x1a5/0x480 [ 22.842688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.843102] kthread+0x337/0x6f0 [ 22.843262] ret_from_fork+0x116/0x1d0 [ 22.843477] ret_from_fork_asm+0x1a/0x30 [ 22.843882] [ 22.844087] The buggy address belongs to the object at ffff8881055a0e00 [ 22.844087] which belongs to the cache kmalloc-256 of size 256 [ 22.844858] The buggy address is located 17 bytes to the right of [ 22.844858] allocated 201-byte region [ffff8881055a0e00, ffff8881055a0ec9) [ 22.845467] [ 22.845561] The buggy address belongs to the physical page: [ 22.845782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055a0 [ 22.846127] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.846641] flags: 0x200000000000040(head|node=0|zone=2) [ 22.846962] page_type: f5(slab) [ 22.847113] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.847757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.848121] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 22.848558] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.849104] head: 0200000000000001 ffffea0004156801 00000000ffffffff 00000000ffffffff [ 22.849565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.849893] page dumped because: kasan: bad access detected [ 22.850112] [ 22.850417] Memory state around the buggy address: [ 22.850654] ffff8881055a0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.850941] ffff8881055a0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.851402] >ffff8881055a0e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.851801] ^ [ 22.852341] ffff8881055a0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.852629] ffff8881055a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.853047] ==================================================================