Date
July 3, 2025, 10:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 36.352885] ================================================================== [ 36.360200] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 36.367878] Write of size 1 at addr ffff0000861920f0 by task kunit_try_catch/269 [ 36.375370] [ 36.376901] CPU: 3 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 36.376929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.376938] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.376948] Call trace: [ 36.376955] show_stack+0x20/0x38 (C) [ 36.376973] dump_stack_lvl+0x8c/0xd0 [ 36.376992] print_report+0x118/0x608 [ 36.377012] kasan_report+0xdc/0x128 [ 36.377030] __asan_report_store1_noabort+0x20/0x30 [ 36.377048] krealloc_more_oob_helper+0x5c0/0x678 [ 36.377066] krealloc_large_more_oob+0x20/0x38 [ 36.377086] kunit_try_run_case+0x170/0x3f0 [ 36.377105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.377126] kthread+0x328/0x630 [ 36.377140] ret_from_fork+0x10/0x20 [ 36.377158] [ 36.447972] The buggy address belongs to the physical page: [ 36.453623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106190 [ 36.461729] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.469487] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.476545] page_type: f8(unknown) [ 36.480010] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.487857] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.495705] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.503639] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.511573] head: 0bfffe0000000002 fffffdffc2186401 00000000ffffffff 00000000ffffffff [ 36.519504] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.527432] page dumped because: kasan: bad access detected [ 36.533080] [ 36.534610] Memory state around the buggy address: [ 36.539471] ffff000086191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.546787] ffff000086192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.554102] >ffff000086192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 36.561416] ^ [ 36.568383] ffff000086192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.575700] ffff000086192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.583016] ================================================================== [ 33.896092] ================================================================== [ 33.907040] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 33.914710] Write of size 1 at addr ffff0000861896eb by task kunit_try_catch/265 [ 33.922205] [ 33.923745] CPU: 3 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 33.923773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.923780] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.923791] Call trace: [ 33.923797] show_stack+0x20/0x38 (C) [ 33.923815] dump_stack_lvl+0x8c/0xd0 [ 33.923835] print_report+0x118/0x608 [ 33.923855] kasan_report+0xdc/0x128 [ 33.923873] __asan_report_store1_noabort+0x20/0x30 [ 33.923890] krealloc_more_oob_helper+0x60c/0x678 [ 33.923909] krealloc_more_oob+0x20/0x38 [ 33.923928] kunit_try_run_case+0x170/0x3f0 [ 33.923946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.923967] kthread+0x328/0x630 [ 33.923981] ret_from_fork+0x10/0x20 [ 33.923998] [ 33.994280] Allocated by task 265: [ 33.997736] kasan_save_stack+0x3c/0x68 [ 34.001646] kasan_save_track+0x20/0x40 [ 34.005555] kasan_save_alloc_info+0x40/0x58 [ 34.009892] __kasan_krealloc+0x118/0x178 [ 34.013973] krealloc_noprof+0x128/0x360 [ 34.017969] krealloc_more_oob_helper+0x168/0x678 [ 34.022753] krealloc_more_oob+0x20/0x38 [ 34.026747] kunit_try_run_case+0x170/0x3f0 [ 34.030998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.036564] kthread+0x328/0x630 [ 34.039856] ret_from_fork+0x10/0x20 [ 34.043495] [ 34.045032] The buggy address belongs to the object at ffff000086189600 [ 34.045032] which belongs to the cache kmalloc-256 of size 256 [ 34.057695] The buggy address is located 0 bytes to the right of [ 34.057695] allocated 235-byte region [ffff000086189600, ffff0000861896eb) [ 34.070799] [ 34.072334] The buggy address belongs to the physical page: [ 34.077983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106188 [ 34.086093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.093848] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.100910] page_type: f5(slab) [ 34.104113] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.111955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.119799] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.127727] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.135655] head: 0bfffe0000000002 fffffdffc2186201 00000000ffffffff 00000000ffffffff [ 34.143583] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.151507] page dumped because: kasan: bad access detected [ 34.157150] [ 34.158679] Memory state around the buggy address: [ 34.163538] ffff000086189580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.170860] ffff000086189600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.178180] >ffff000086189680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 34.185498] ^ [ 34.192201] ffff000086189700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.199517] ffff000086189780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.206836] ================================================================== [ 36.111747] ================================================================== [ 36.122953] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 36.130631] Write of size 1 at addr ffff0000861920eb by task kunit_try_catch/269 [ 36.138133] [ 36.139675] CPU: 3 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 36.139703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.139712] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.139723] Call trace: [ 36.139729] show_stack+0x20/0x38 (C) [ 36.139746] dump_stack_lvl+0x8c/0xd0 [ 36.139767] print_report+0x118/0x608 [ 36.139787] kasan_report+0xdc/0x128 [ 36.139806] __asan_report_store1_noabort+0x20/0x30 [ 36.139823] krealloc_more_oob_helper+0x60c/0x678 [ 36.139843] krealloc_large_more_oob+0x20/0x38 [ 36.139861] kunit_try_run_case+0x170/0x3f0 [ 36.139880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.139901] kthread+0x328/0x630 [ 36.139917] ret_from_fork+0x10/0x20 [ 36.139934] [ 36.210731] The buggy address belongs to the physical page: [ 36.216378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106190 [ 36.224484] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.232241] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.239300] page_type: f8(unknown) [ 36.242767] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.250614] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.258462] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.266395] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.274328] head: 0bfffe0000000002 fffffdffc2186401 00000000ffffffff 00000000ffffffff [ 36.282261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.290189] page dumped because: kasan: bad access detected [ 36.295834] [ 36.297364] Memory state around the buggy address: [ 36.302227] ffff000086191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.309540] ffff000086192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.316855] >ffff000086192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 36.324167] ^ [ 36.330870] ffff000086192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.338185] ffff000086192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.345497] ================================================================== [ 34.214270] ================================================================== [ 34.221593] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 34.229264] Write of size 1 at addr ffff0000861896f0 by task kunit_try_catch/265 [ 34.236761] [ 34.238295] CPU: 3 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 34.238324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.238333] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.238343] Call trace: [ 34.238350] show_stack+0x20/0x38 (C) [ 34.238369] dump_stack_lvl+0x8c/0xd0 [ 34.238389] print_report+0x118/0x608 [ 34.238408] kasan_report+0xdc/0x128 [ 34.238427] __asan_report_store1_noabort+0x20/0x30 [ 34.238444] krealloc_more_oob_helper+0x5c0/0x678 [ 34.238464] krealloc_more_oob+0x20/0x38 [ 34.238482] kunit_try_run_case+0x170/0x3f0 [ 34.238501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.238522] kthread+0x328/0x630 [ 34.238537] ret_from_fork+0x10/0x20 [ 34.238555] [ 34.308868] Allocated by task 265: [ 34.312326] kasan_save_stack+0x3c/0x68 [ 34.316236] kasan_save_track+0x20/0x40 [ 34.320144] kasan_save_alloc_info+0x40/0x58 [ 34.324481] __kasan_krealloc+0x118/0x178 [ 34.328561] krealloc_noprof+0x128/0x360 [ 34.332556] krealloc_more_oob_helper+0x168/0x678 [ 34.337339] krealloc_more_oob+0x20/0x38 [ 34.341333] kunit_try_run_case+0x170/0x3f0 [ 34.345585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.351155] kthread+0x328/0x630 [ 34.354445] ret_from_fork+0x10/0x20 [ 34.358092] [ 34.359618] The buggy address belongs to the object at ffff000086189600 [ 34.359618] which belongs to the cache kmalloc-256 of size 256 [ 34.372272] The buggy address is located 5 bytes to the right of [ 34.372272] allocated 235-byte region [ffff000086189600, ffff0000861896eb) [ 34.385376] [ 34.386905] The buggy address belongs to the physical page: [ 34.392556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106188 [ 34.400667] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.408420] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.415475] page_type: f5(slab) [ 34.418681] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.426531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.434373] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.442311] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.450250] head: 0bfffe0000000002 fffffdffc2186201 00000000ffffffff 00000000ffffffff [ 34.458189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.466123] page dumped because: kasan: bad access detected [ 34.471777] [ 34.473304] Memory state around the buggy address: [ 34.478164] ffff000086189580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.485487] ffff000086189600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.492807] >ffff000086189680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 34.500126] ^ [ 34.507094] ffff000086189700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.514416] ffff000086189780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.521734] ==================================================================
[ 30.843253] ================================================================== [ 30.843304] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.843356] Write of size 1 at addr fff00000c872c4f0 by task kunit_try_catch/188 [ 30.843686] [ 30.843733] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.844128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.844237] Hardware name: linux,dummy-virt (DT) [ 30.844271] Call trace: [ 30.844373] show_stack+0x20/0x38 (C) [ 30.844426] dump_stack_lvl+0x8c/0xd0 [ 30.844483] print_report+0x118/0x608 [ 30.844529] kasan_report+0xdc/0x128 [ 30.844870] __asan_report_store1_noabort+0x20/0x30 [ 30.844934] krealloc_more_oob_helper+0x5c0/0x678 [ 30.844986] krealloc_more_oob+0x20/0x38 [ 30.845067] kunit_try_run_case+0x170/0x3f0 [ 30.845132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.845187] kthread+0x328/0x630 [ 30.845228] ret_from_fork+0x10/0x20 [ 30.845286] [ 30.845306] Allocated by task 188: [ 30.845345] kasan_save_stack+0x3c/0x68 [ 30.845390] kasan_save_track+0x20/0x40 [ 30.845428] kasan_save_alloc_info+0x40/0x58 [ 30.845465] __kasan_krealloc+0x118/0x178 [ 30.845504] krealloc_noprof+0x128/0x360 [ 30.845548] krealloc_more_oob_helper+0x168/0x678 [ 30.845595] krealloc_more_oob+0x20/0x38 [ 30.845632] kunit_try_run_case+0x170/0x3f0 [ 30.845680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.845725] kthread+0x328/0x630 [ 30.845766] ret_from_fork+0x10/0x20 [ 30.845810] [ 30.845829] The buggy address belongs to the object at fff00000c872c400 [ 30.845829] which belongs to the cache kmalloc-256 of size 256 [ 30.845906] The buggy address is located 5 bytes to the right of [ 30.845906] allocated 235-byte region [fff00000c872c400, fff00000c872c4eb) [ 30.845976] [ 30.845995] The buggy address belongs to the physical page: [ 30.846030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 30.846086] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.846131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.846181] page_type: f5(slab) [ 30.846219] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.846279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.846336] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.846385] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.846444] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 30.846520] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.846568] page dumped because: kasan: bad access detected [ 30.846598] [ 30.846615] Memory state around the buggy address: [ 30.846655] fff00000c872c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.846697] fff00000c872c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.846738] >fff00000c872c480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.846774] ^ [ 30.846823] fff00000c872c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.847375] fff00000c872c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.847420] ================================================================== [ 30.831912] ================================================================== [ 30.832036] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.832144] Write of size 1 at addr fff00000c872c4eb by task kunit_try_catch/188 [ 30.832370] [ 30.832406] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.832882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.832959] Hardware name: linux,dummy-virt (DT) [ 30.833052] Call trace: [ 30.833152] show_stack+0x20/0x38 (C) [ 30.833290] dump_stack_lvl+0x8c/0xd0 [ 30.833453] print_report+0x118/0x608 [ 30.833504] kasan_report+0xdc/0x128 [ 30.833817] __asan_report_store1_noabort+0x20/0x30 [ 30.833935] krealloc_more_oob_helper+0x60c/0x678 [ 30.834150] krealloc_more_oob+0x20/0x38 [ 30.834327] kunit_try_run_case+0x170/0x3f0 [ 30.834459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.834808] kthread+0x328/0x630 [ 30.834985] ret_from_fork+0x10/0x20 [ 30.835206] [ 30.835319] Allocated by task 188: [ 30.835370] kasan_save_stack+0x3c/0x68 [ 30.835771] kasan_save_track+0x20/0x40 [ 30.836289] kasan_save_alloc_info+0x40/0x58 [ 30.836416] __kasan_krealloc+0x118/0x178 [ 30.836619] krealloc_noprof+0x128/0x360 [ 30.836852] krealloc_more_oob_helper+0x168/0x678 [ 30.836990] krealloc_more_oob+0x20/0x38 [ 30.837100] kunit_try_run_case+0x170/0x3f0 [ 30.837269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.837323] kthread+0x328/0x630 [ 30.837499] ret_from_fork+0x10/0x20 [ 30.837630] [ 30.837802] The buggy address belongs to the object at fff00000c872c400 [ 30.837802] which belongs to the cache kmalloc-256 of size 256 [ 30.837907] The buggy address is located 0 bytes to the right of [ 30.837907] allocated 235-byte region [fff00000c872c400, fff00000c872c4eb) [ 30.838337] [ 30.838392] The buggy address belongs to the physical page: [ 30.838428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 30.838493] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.839060] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.839151] page_type: f5(slab) [ 30.839258] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.839470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.839582] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.839752] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.839962] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 30.840148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.840355] page dumped because: kasan: bad access detected [ 30.840490] [ 30.840582] Memory state around the buggy address: [ 30.840618] fff00000c872c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.840665] fff00000c872c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.840713] >fff00000c872c480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.841027] ^ [ 30.841210] fff00000c872c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.841355] fff00000c872c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.841396] ================================================================== [ 30.928211] ================================================================== [ 30.928372] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.928521] Write of size 1 at addr fff00000c9bc60f0 by task kunit_try_catch/192 [ 30.928681] [ 30.928712] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.928795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.928827] Hardware name: linux,dummy-virt (DT) [ 30.928868] Call trace: [ 30.929038] show_stack+0x20/0x38 (C) [ 30.929260] dump_stack_lvl+0x8c/0xd0 [ 30.929334] print_report+0x118/0x608 [ 30.929382] kasan_report+0xdc/0x128 [ 30.929445] __asan_report_store1_noabort+0x20/0x30 [ 30.929506] krealloc_more_oob_helper+0x5c0/0x678 [ 30.929566] krealloc_large_more_oob+0x20/0x38 [ 30.929617] kunit_try_run_case+0x170/0x3f0 [ 30.929681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.929736] kthread+0x328/0x630 [ 30.929778] ret_from_fork+0x10/0x20 [ 30.929826] [ 30.930097] The buggy address belongs to the physical page: [ 30.930507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc4 [ 30.930742] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.930792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.930948] page_type: f8(unknown) [ 30.931334] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.931584] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.931761] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.932178] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.932322] head: 0bfffe0000000002 ffffc1ffc326f101 00000000ffffffff 00000000ffffffff [ 30.932394] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.932605] page dumped because: kasan: bad access detected [ 30.932704] [ 30.932728] Memory state around the buggy address: [ 30.932761] fff00000c9bc5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.932803] fff00000c9bc6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.932854] >fff00000c9bc6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.932892] ^ [ 30.932930] fff00000c9bc6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.932971] fff00000c9bc6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.933008] ================================================================== [ 30.921521] ================================================================== [ 30.921616] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.921823] Write of size 1 at addr fff00000c9bc60eb by task kunit_try_catch/192 [ 30.921890] [ 30.921926] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.922021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.922233] Hardware name: linux,dummy-virt (DT) [ 30.922582] Call trace: [ 30.922624] show_stack+0x20/0x38 (C) [ 30.922771] dump_stack_lvl+0x8c/0xd0 [ 30.923086] print_report+0x118/0x608 [ 30.923193] kasan_report+0xdc/0x128 [ 30.923280] __asan_report_store1_noabort+0x20/0x30 [ 30.923389] krealloc_more_oob_helper+0x60c/0x678 [ 30.923445] krealloc_large_more_oob+0x20/0x38 [ 30.923607] kunit_try_run_case+0x170/0x3f0 [ 30.923700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.923763] kthread+0x328/0x630 [ 30.923805] ret_from_fork+0x10/0x20 [ 30.923862] [ 30.924245] The buggy address belongs to the physical page: [ 30.924298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc4 [ 30.924442] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.924496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.924623] page_type: f8(unknown) [ 30.924675] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.924727] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.924919] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.925219] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.925317] head: 0bfffe0000000002 ffffc1ffc326f101 00000000ffffffff 00000000ffffffff [ 30.925439] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.925531] page dumped because: kasan: bad access detected [ 30.925667] [ 30.925776] Memory state around the buggy address: [ 30.925830] fff00000c9bc5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.926096] fff00000c9bc6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.926275] >fff00000c9bc6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.926527] ^ [ 30.926594] fff00000c9bc6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.926663] fff00000c9bc6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.926703] ==================================================================
[ 22.754526] ================================================================== [ 22.754819] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 22.755097] Write of size 1 at addr ffff888100a900f0 by task kunit_try_catch/205 [ 22.755321] [ 22.755401] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.755444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.755466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.755486] Call Trace: [ 22.755497] <TASK> [ 22.755510] dump_stack_lvl+0x73/0xb0 [ 22.755536] print_report+0xd1/0x650 [ 22.755556] ? __virt_addr_valid+0x1db/0x2d0 [ 22.755578] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.755599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.755624] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.755646] kasan_report+0x141/0x180 [ 22.755667] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.755694] __asan_report_store1_noabort+0x1b/0x30 [ 22.755717] krealloc_more_oob_helper+0x7eb/0x930 [ 22.755738] ? __schedule+0x10cc/0x2b60 [ 22.755765] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 22.755789] ? __kasan_check_write+0x18/0x20 [ 22.755811] ? queued_spin_lock_slowpath+0x116/0xb40 [ 22.755831] ? irqentry_exit+0x2a/0x60 [ 22.755851] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 22.755873] ? trace_hardirqs_on+0x37/0xe0 [ 22.755894] ? __pfx_read_tsc+0x10/0x10 [ 22.755917] krealloc_more_oob+0x1c/0x30 [ 22.755938] kunit_try_run_case+0x1a5/0x480 [ 22.755961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.755985] ? queued_spin_lock_slowpath+0x116/0xb40 [ 22.756006] ? __kthread_parkme+0x82/0x180 [ 22.756025] ? preempt_count_sub+0x50/0x80 [ 22.756047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.756071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.756093] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.756116] kthread+0x337/0x6f0 [ 22.756135] ? trace_preempt_on+0x20/0xc0 [ 22.756156] ? __pfx_kthread+0x10/0x10 [ 22.756176] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.756202] ? calculate_sigpending+0x7b/0xa0 [ 22.756225] ? __pfx_kthread+0x10/0x10 [ 22.756246] ret_from_fork+0x116/0x1d0 [ 22.756264] ? __pfx_kthread+0x10/0x10 [ 22.756284] ret_from_fork_asm+0x1a/0x30 [ 22.756314] </TASK> [ 22.756324] [ 22.764297] Allocated by task 205: [ 22.764481] kasan_save_stack+0x45/0x70 [ 22.764679] kasan_save_track+0x18/0x40 [ 22.764863] kasan_save_alloc_info+0x3b/0x50 [ 22.765065] __kasan_krealloc+0x190/0x1f0 [ 22.765495] krealloc_noprof+0xf3/0x340 [ 22.765694] krealloc_more_oob_helper+0x1a9/0x930 [ 22.765911] krealloc_more_oob+0x1c/0x30 [ 22.766079] kunit_try_run_case+0x1a5/0x480 [ 22.766343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.766573] kthread+0x337/0x6f0 [ 22.766688] ret_from_fork+0x116/0x1d0 [ 22.766865] ret_from_fork_asm+0x1a/0x30 [ 22.767049] [ 22.767120] The buggy address belongs to the object at ffff888100a90000 [ 22.767120] which belongs to the cache kmalloc-256 of size 256 [ 22.767550] The buggy address is located 5 bytes to the right of [ 22.767550] allocated 235-byte region [ffff888100a90000, ffff888100a900eb) [ 22.768039] [ 22.768198] The buggy address belongs to the physical page: [ 22.768448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a90 [ 22.768797] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.769044] ksm flags: 0x200000000000040(head|node=0|zone=2) [ 22.769452] page_type: f5(slab) [ 22.769638] raw: 0200000000000040 ffff888100041b40 ffffea000402a380 dead000000000003 [ 22.769973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.770403] head: 0200000000000040 ffff888100041b40 ffffea000402a380 dead000000000003 [ 22.770735] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.771038] head: 0200000000000001 ffffea000402a401 00000000ffffffff 00000000ffffffff [ 22.771414] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.771734] page dumped because: kasan: bad access detected [ 22.771954] [ 22.772037] Memory state around the buggy address: [ 22.772318] ffff888100a8ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.772607] ffff888100a90000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.772881] >ffff888100a90080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.773336] ^ [ 22.773623] ffff888100a90100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.773910] ffff888100a90180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.774255] ================================================================== [ 22.919811] ================================================================== [ 22.920279] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 22.920536] Write of size 1 at addr ffff888105eae0eb by task kunit_try_catch/209 [ 22.922018] [ 22.922201] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.922253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.922266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.922288] Call Trace: [ 22.922301] <TASK> [ 22.922318] dump_stack_lvl+0x73/0xb0 [ 22.922348] print_report+0xd1/0x650 [ 22.922394] ? __virt_addr_valid+0x1db/0x2d0 [ 22.922433] ? krealloc_more_oob_helper+0x821/0x930 [ 22.922475] ? kasan_addr_to_slab+0x11/0xa0 [ 22.922499] ? krealloc_more_oob_helper+0x821/0x930 [ 22.922656] kasan_report+0x141/0x180 [ 22.922684] ? krealloc_more_oob_helper+0x821/0x930 [ 22.922713] __asan_report_store1_noabort+0x1b/0x30 [ 22.922736] krealloc_more_oob_helper+0x821/0x930 [ 22.922758] ? __schedule+0x10cc/0x2b60 [ 22.922784] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 22.922807] ? finish_task_switch.isra.0+0x153/0x700 [ 22.922830] ? __switch_to+0x47/0xf50 [ 22.922856] ? __schedule+0x10cc/0x2b60 [ 22.922880] ? __pfx_read_tsc+0x10/0x10 [ 22.922920] krealloc_large_more_oob+0x1c/0x30 [ 22.922942] kunit_try_run_case+0x1a5/0x480 [ 22.922990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.923013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.923034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.923058] ? __kthread_parkme+0x82/0x180 [ 22.923079] ? preempt_count_sub+0x50/0x80 [ 22.923101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.923125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.923148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.923172] kthread+0x337/0x6f0 [ 22.923192] ? trace_preempt_on+0x20/0xc0 [ 22.923215] ? __pfx_kthread+0x10/0x10 [ 22.923236] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.923259] ? calculate_sigpending+0x7b/0xa0 [ 22.923282] ? __pfx_kthread+0x10/0x10 [ 22.923303] ret_from_fork+0x116/0x1d0 [ 22.923322] ? __pfx_kthread+0x10/0x10 [ 22.923343] ret_from_fork_asm+0x1a/0x30 [ 22.923374] </TASK> [ 22.923385] [ 22.937587] The buggy address belongs to the physical page: [ 22.937832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eac [ 22.938072] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.938772] flags: 0x200000000000040(head|node=0|zone=2) [ 22.939345] page_type: f8(unknown) [ 22.939686] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.940357] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.940822] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.941055] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.941320] head: 0200000000000002 ffffea000417ab01 00000000ffffffff 00000000ffffffff [ 22.942096] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.942700] page dumped because: kasan: bad access detected [ 22.942878] [ 22.942944] Memory state around the buggy address: [ 22.943094] ffff888105eadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.943745] ffff888105eae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.944472] >ffff888105eae080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 22.945086] ^ [ 22.945733] ffff888105eae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.946083] ffff888105eae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.946666] ================================================================== [ 22.947034] ================================================================== [ 22.947304] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 22.948039] Write of size 1 at addr ffff888105eae0f0 by task kunit_try_catch/209 [ 22.948406] [ 22.948723] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.948775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.948787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.948808] Call Trace: [ 22.948823] <TASK> [ 22.948840] dump_stack_lvl+0x73/0xb0 [ 22.948868] print_report+0xd1/0x650 [ 22.948890] ? __virt_addr_valid+0x1db/0x2d0 [ 22.948928] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.948950] ? kasan_addr_to_slab+0x11/0xa0 [ 22.948986] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.949009] kasan_report+0x141/0x180 [ 22.949031] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.949058] __asan_report_store1_noabort+0x1b/0x30 [ 22.949091] krealloc_more_oob_helper+0x7eb/0x930 [ 22.949112] ? __schedule+0x10cc/0x2b60 [ 22.949137] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 22.949180] ? finish_task_switch.isra.0+0x153/0x700 [ 22.949594] ? __switch_to+0x47/0xf50 [ 22.949622] ? __schedule+0x10cc/0x2b60 [ 22.949646] ? __pfx_read_tsc+0x10/0x10 [ 22.949682] krealloc_large_more_oob+0x1c/0x30 [ 22.949704] kunit_try_run_case+0x1a5/0x480 [ 22.949731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.949754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.949775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.949800] ? __kthread_parkme+0x82/0x180 [ 22.949819] ? preempt_count_sub+0x50/0x80 [ 22.949846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.949870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.949894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.949917] kthread+0x337/0x6f0 [ 22.949936] ? trace_preempt_on+0x20/0xc0 [ 22.949959] ? __pfx_kthread+0x10/0x10 [ 22.949979] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.950002] ? calculate_sigpending+0x7b/0xa0 [ 22.950025] ? __pfx_kthread+0x10/0x10 [ 22.950046] ret_from_fork+0x116/0x1d0 [ 22.950065] ? __pfx_kthread+0x10/0x10 [ 22.950085] ret_from_fork_asm+0x1a/0x30 [ 22.950116] </TASK> [ 22.950127] [ 22.959934] The buggy address belongs to the physical page: [ 22.960552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eac [ 22.961016] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.961640] flags: 0x200000000000040(head|node=0|zone=2) [ 22.962094] page_type: f8(unknown) [ 22.962721] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.963429] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.964022] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.964903] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.965739] head: 0200000000000002 ffffea000417ab01 00000000ffffffff 00000000ffffffff [ 22.966392] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.967053] page dumped because: kasan: bad access detected [ 22.967483] [ 22.967579] Memory state around the buggy address: [ 22.967794] ffff888105eadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.968078] ffff888105eae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.968736] >ffff888105eae080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 22.969357] ^ [ 22.969868] ffff888105eae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.970655] ffff888105eae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.971163] ================================================================== [ 22.733518] ================================================================== [ 22.734041] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 22.734508] Write of size 1 at addr ffff888100a900eb by task kunit_try_catch/205 [ 22.734814] [ 22.734918] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.734965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.734977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.734998] Call Trace: [ 22.735012] <TASK> [ 22.735028] dump_stack_lvl+0x73/0xb0 [ 22.735058] print_report+0xd1/0x650 [ 22.735080] ? __virt_addr_valid+0x1db/0x2d0 [ 22.735106] ? krealloc_more_oob_helper+0x821/0x930 [ 22.735128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.735244] ? krealloc_more_oob_helper+0x821/0x930 [ 22.735267] kasan_report+0x141/0x180 [ 22.735289] ? krealloc_more_oob_helper+0x821/0x930 [ 22.735317] __asan_report_store1_noabort+0x1b/0x30 [ 22.735340] krealloc_more_oob_helper+0x821/0x930 [ 22.735361] ? __schedule+0x10cc/0x2b60 [ 22.735390] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 22.735415] ? __kasan_check_write+0x18/0x20 [ 22.735437] ? queued_spin_lock_slowpath+0x116/0xb40 [ 22.735467] ? irqentry_exit+0x2a/0x60 [ 22.735488] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 22.735510] ? trace_hardirqs_on+0x37/0xe0 [ 22.735531] ? __pfx_read_tsc+0x10/0x10 [ 22.735556] krealloc_more_oob+0x1c/0x30 [ 22.735576] kunit_try_run_case+0x1a5/0x480 [ 22.735602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.735627] ? queued_spin_lock_slowpath+0x116/0xb40 [ 22.735647] ? __kthread_parkme+0x82/0x180 [ 22.735667] ? preempt_count_sub+0x50/0x80 [ 22.735690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.735714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.735737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.735761] kthread+0x337/0x6f0 [ 22.735781] ? trace_preempt_on+0x20/0xc0 [ 22.735803] ? __pfx_kthread+0x10/0x10 [ 22.735823] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.735848] ? calculate_sigpending+0x7b/0xa0 [ 22.735872] ? __pfx_kthread+0x10/0x10 [ 22.735894] ret_from_fork+0x116/0x1d0 [ 22.735912] ? __pfx_kthread+0x10/0x10 [ 22.735933] ret_from_fork_asm+0x1a/0x30 [ 22.735963] </TASK> [ 22.735974] [ 22.743959] Allocated by task 205: [ 22.744114] kasan_save_stack+0x45/0x70 [ 22.744343] kasan_save_track+0x18/0x40 [ 22.744485] kasan_save_alloc_info+0x3b/0x50 [ 22.744645] __kasan_krealloc+0x190/0x1f0 [ 22.744832] krealloc_noprof+0xf3/0x340 [ 22.745023] krealloc_more_oob_helper+0x1a9/0x930 [ 22.745404] krealloc_more_oob+0x1c/0x30 [ 22.745617] kunit_try_run_case+0x1a5/0x480 [ 22.745797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.746004] kthread+0x337/0x6f0 [ 22.746118] ret_from_fork+0x116/0x1d0 [ 22.746424] ret_from_fork_asm+0x1a/0x30 [ 22.746633] [ 22.746725] The buggy address belongs to the object at ffff888100a90000 [ 22.746725] which belongs to the cache kmalloc-256 of size 256 [ 22.747287] The buggy address is located 0 bytes to the right of [ 22.747287] allocated 235-byte region [ffff888100a90000, ffff888100a900eb) [ 22.747799] [ 22.747888] The buggy address belongs to the physical page: [ 22.748100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a90 [ 22.748497] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.748720] ksm flags: 0x200000000000040(head|node=0|zone=2) [ 22.748899] page_type: f5(slab) [ 22.749013] raw: 0200000000000040 ffff888100041b40 ffffea000402a380 dead000000000003 [ 22.749469] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.749807] head: 0200000000000040 ffff888100041b40 ffffea000402a380 dead000000000003 [ 22.750255] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.750556] head: 0200000000000001 ffffea000402a401 00000000ffffffff 00000000ffffffff [ 22.750783] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.751073] page dumped because: kasan: bad access detected [ 22.751398] [ 22.751503] Memory state around the buggy address: [ 22.751729] ffff888100a8ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.752039] ffff888100a90000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.752396] >ffff888100a90080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.752653] ^ [ 22.752940] ffff888100a90100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.753365] ffff888100a90180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.753640] ==================================================================