Date
July 9, 2025, 1:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.125855] ================================================================== [ 29.125910] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 29.125962] Write of size 1 at addr fff00000c97e26eb by task kunit_try_catch/188 [ 29.126255] [ 29.126423] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.126688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.126814] Hardware name: linux,dummy-virt (DT) [ 29.126856] Call trace: [ 29.126885] show_stack+0x20/0x38 (C) [ 29.127078] dump_stack_lvl+0x8c/0xd0 [ 29.127128] print_report+0x118/0x5d0 [ 29.127170] kasan_report+0xdc/0x128 [ 29.127212] __asan_report_store1_noabort+0x20/0x30 [ 29.127259] krealloc_more_oob_helper+0x60c/0x678 [ 29.128016] krealloc_more_oob+0x20/0x38 [ 29.128080] kunit_try_run_case+0x170/0x3f0 [ 29.128130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.128183] kthread+0x328/0x630 [ 29.128376] ret_from_fork+0x10/0x20 [ 29.128495] [ 29.128555] Allocated by task 188: [ 29.128586] kasan_save_stack+0x3c/0x68 [ 29.128637] kasan_save_track+0x20/0x40 [ 29.128750] kasan_save_alloc_info+0x40/0x58 [ 29.128786] __kasan_krealloc+0x118/0x178 [ 29.128823] krealloc_noprof+0x128/0x360 [ 29.128861] krealloc_more_oob_helper+0x168/0x678 [ 29.129158] krealloc_more_oob+0x20/0x38 [ 29.129230] kunit_try_run_case+0x170/0x3f0 [ 29.129309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.129352] kthread+0x328/0x630 [ 29.129571] ret_from_fork+0x10/0x20 [ 29.129606] [ 29.129626] The buggy address belongs to the object at fff00000c97e2600 [ 29.129626] which belongs to the cache kmalloc-256 of size 256 [ 29.129822] The buggy address is located 0 bytes to the right of [ 29.129822] allocated 235-byte region [fff00000c97e2600, fff00000c97e26eb) [ 29.130187] [ 29.130280] The buggy address belongs to the physical page: [ 29.130314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1097e2 [ 29.130397] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.130616] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.130681] page_type: f5(slab) [ 29.130779] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.130914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.131013] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.131319] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.131606] head: 0bfffe0000000001 ffffc1ffc325f881 00000000ffffffff 00000000ffffffff [ 29.131878] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.132129] page dumped because: kasan: bad access detected [ 29.132163] [ 29.132182] Memory state around the buggy address: [ 29.132214] fff00000c97e2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.132257] fff00000c97e2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.132297] >fff00000c97e2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.132333] ^ [ 29.132594] fff00000c97e2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.132663] fff00000c97e2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.132700] ================================================================== [ 29.195168] ================================================================== [ 29.195221] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 29.195274] Write of size 1 at addr fff00000c9b020eb by task kunit_try_catch/192 [ 29.199142] [ 29.199696] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.199784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.199811] Hardware name: linux,dummy-virt (DT) [ 29.200729] Call trace: [ 29.202390] show_stack+0x20/0x38 (C) [ 29.202895] dump_stack_lvl+0x8c/0xd0 [ 29.203555] print_report+0x118/0x5d0 [ 29.204166] kasan_report+0xdc/0x128 [ 29.204226] __asan_report_store1_noabort+0x20/0x30 [ 29.204869] krealloc_more_oob_helper+0x60c/0x678 [ 29.205554] krealloc_large_more_oob+0x20/0x38 [ 29.205984] kunit_try_run_case+0x170/0x3f0 [ 29.206539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.207168] kthread+0x328/0x630 [ 29.207458] ret_from_fork+0x10/0x20 [ 29.208289] [ 29.208804] The buggy address belongs to the physical page: [ 29.208877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00 [ 29.209368] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.209488] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.210181] page_type: f8(unknown) [ 29.210416] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.210769] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.211166] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.211763] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.212131] head: 0bfffe0000000002 ffffc1ffc326c001 00000000ffffffff 00000000ffffffff [ 29.212325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.212451] page dumped because: kasan: bad access detected [ 29.213023] [ 29.213046] Memory state around the buggy address: [ 29.213388] fff00000c9b01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.213437] fff00000c9b02000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.213479] >fff00000c9b02080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.213515] ^ [ 29.213961] fff00000c9b02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.214100] fff00000c9b02180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.214140] ================================================================== [ 29.215609] ================================================================== [ 29.215721] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 29.215774] Write of size 1 at addr fff00000c9b020f0 by task kunit_try_catch/192 [ 29.215822] [ 29.215852] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.215983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.216037] Hardware name: linux,dummy-virt (DT) [ 29.216087] Call trace: [ 29.216109] show_stack+0x20/0x38 (C) [ 29.216172] dump_stack_lvl+0x8c/0xd0 [ 29.216230] print_report+0x118/0x5d0 [ 29.216275] kasan_report+0xdc/0x128 [ 29.216328] __asan_report_store1_noabort+0x20/0x30 [ 29.216519] krealloc_more_oob_helper+0x5c0/0x678 [ 29.216615] krealloc_large_more_oob+0x20/0x38 [ 29.216666] kunit_try_run_case+0x170/0x3f0 [ 29.216716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.216770] kthread+0x328/0x630 [ 29.216812] ret_from_fork+0x10/0x20 [ 29.216860] [ 29.216886] The buggy address belongs to the physical page: [ 29.217026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00 [ 29.217102] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.217148] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.217198] page_type: f8(unknown) [ 29.217313] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.217362] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.217411] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.217458] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.217505] head: 0bfffe0000000002 ffffc1ffc326c001 00000000ffffffff 00000000ffffffff [ 29.217628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.217779] page dumped because: kasan: bad access detected [ 29.217809] [ 29.217826] Memory state around the buggy address: [ 29.217855] fff00000c9b01f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.217896] fff00000c9b02000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.217971] >fff00000c9b02080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.218007] ^ [ 29.218045] fff00000c9b02100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.218094] fff00000c9b02180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.218130] ================================================================== [ 29.134822] ================================================================== [ 29.134869] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 29.134919] Write of size 1 at addr fff00000c97e26f0 by task kunit_try_catch/188 [ 29.135206] [ 29.135423] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.135912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.135962] Hardware name: linux,dummy-virt (DT) [ 29.136030] Call trace: [ 29.136146] show_stack+0x20/0x38 (C) [ 29.136285] dump_stack_lvl+0x8c/0xd0 [ 29.136381] print_report+0x118/0x5d0 [ 29.136425] kasan_report+0xdc/0x128 [ 29.136523] __asan_report_store1_noabort+0x20/0x30 [ 29.136571] krealloc_more_oob_helper+0x5c0/0x678 [ 29.136640] krealloc_more_oob+0x20/0x38 [ 29.136854] kunit_try_run_case+0x170/0x3f0 [ 29.136904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.137071] kthread+0x328/0x630 [ 29.137119] ret_from_fork+0x10/0x20 [ 29.137219] [ 29.137313] Allocated by task 188: [ 29.137381] kasan_save_stack+0x3c/0x68 [ 29.137468] kasan_save_track+0x20/0x40 [ 29.137506] kasan_save_alloc_info+0x40/0x58 [ 29.137542] __kasan_krealloc+0x118/0x178 [ 29.137579] krealloc_noprof+0x128/0x360 [ 29.137643] krealloc_more_oob_helper+0x168/0x678 [ 29.137802] krealloc_more_oob+0x20/0x38 [ 29.137838] kunit_try_run_case+0x170/0x3f0 [ 29.137876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.137918] kthread+0x328/0x630 [ 29.137949] ret_from_fork+0x10/0x20 [ 29.137983] [ 29.138002] The buggy address belongs to the object at fff00000c97e2600 [ 29.138002] which belongs to the cache kmalloc-256 of size 256 [ 29.138067] The buggy address is located 5 bytes to the right of [ 29.138067] allocated 235-byte region [fff00000c97e2600, fff00000c97e26eb) [ 29.138128] [ 29.138147] The buggy address belongs to the physical page: [ 29.138178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1097e2 [ 29.138227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.138317] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.138498] page_type: f5(slab) [ 29.138803] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.138958] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.139307] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.139811] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.140003] head: 0bfffe0000000001 ffffc1ffc325f881 00000000ffffffff 00000000ffffffff [ 29.140067] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.140107] page dumped because: kasan: bad access detected [ 29.140137] [ 29.140155] Memory state around the buggy address: [ 29.140185] fff00000c97e2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.140225] fff00000c97e2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.140265] >fff00000c97e2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.140301] ^ [ 29.140517] fff00000c97e2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.140622] fff00000c97e2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.140691] ==================================================================
[ 23.733591] ================================================================== [ 23.734880] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 23.735540] Write of size 1 at addr ffff888103d33ceb by task kunit_try_catch/206 [ 23.735966] [ 23.736082] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 23.736137] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.736151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.736174] Call Trace: [ 23.736187] <TASK> [ 23.736207] dump_stack_lvl+0x73/0xb0 [ 23.736240] print_report+0xd1/0x610 [ 23.736265] ? __virt_addr_valid+0x1db/0x2d0 [ 23.736290] ? krealloc_more_oob_helper+0x821/0x930 [ 23.736312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.736337] ? krealloc_more_oob_helper+0x821/0x930 [ 23.736421] kasan_report+0x141/0x180 [ 23.736452] ? krealloc_more_oob_helper+0x821/0x930 [ 23.736480] __asan_report_store1_noabort+0x1b/0x30 [ 23.736504] krealloc_more_oob_helper+0x821/0x930 [ 23.736526] ? __schedule+0x10cc/0x2b60 [ 23.736549] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 23.736574] ? finish_task_switch.isra.0+0x153/0x700 [ 23.736596] ? __switch_to+0x47/0xf80 [ 23.736623] ? __schedule+0x10cc/0x2b60 [ 23.736645] ? __pfx_read_tsc+0x10/0x10 [ 23.736670] krealloc_more_oob+0x1c/0x30 [ 23.736691] kunit_try_run_case+0x1a5/0x480 [ 23.736727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.736747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.736771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.736804] ? __kthread_parkme+0x82/0x180 [ 23.736824] ? preempt_count_sub+0x50/0x80 [ 23.736847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.736868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.736933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.736959] kthread+0x337/0x6f0 [ 23.736978] ? trace_preempt_on+0x20/0xc0 [ 23.737001] ? __pfx_kthread+0x10/0x10 [ 23.737021] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.737043] ? calculate_sigpending+0x7b/0xa0 [ 23.737067] ? __pfx_kthread+0x10/0x10 [ 23.737088] ret_from_fork+0x116/0x1d0 [ 23.737107] ? __pfx_kthread+0x10/0x10 [ 23.737127] ret_from_fork_asm+0x1a/0x30 [ 23.737159] </TASK> [ 23.737171] [ 23.747798] Allocated by task 206: [ 23.748281] kasan_save_stack+0x45/0x70 [ 23.748565] kasan_save_track+0x18/0x40 [ 23.748754] kasan_save_alloc_info+0x3b/0x50 [ 23.749179] __kasan_krealloc+0x190/0x1f0 [ 23.749346] krealloc_noprof+0xf3/0x340 [ 23.749685] krealloc_more_oob_helper+0x1a9/0x930 [ 23.750036] krealloc_more_oob+0x1c/0x30 [ 23.750216] kunit_try_run_case+0x1a5/0x480 [ 23.750404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.750632] kthread+0x337/0x6f0 [ 23.750788] ret_from_fork+0x116/0x1d0 [ 23.751364] ret_from_fork_asm+0x1a/0x30 [ 23.751517] [ 23.751765] The buggy address belongs to the object at ffff888103d33c00 [ 23.751765] which belongs to the cache kmalloc-256 of size 256 [ 23.752459] The buggy address is located 0 bytes to the right of [ 23.752459] allocated 235-byte region [ffff888103d33c00, ffff888103d33ceb) [ 23.753163] [ 23.753270] The buggy address belongs to the physical page: [ 23.753519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d32 [ 23.753866] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.754439] flags: 0x200000000000040(head|node=0|zone=2) [ 23.754668] page_type: f5(slab) [ 23.755036] raw: 0200000000000040 ffff888100041b40 ffffea0004028a80 dead000000000004 [ 23.755457] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.755850] head: 0200000000000040 ffff888100041b40 ffffea0004028a80 dead000000000004 [ 23.756303] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.756612] head: 0200000000000001 ffffea00040f4c81 00000000ffffffff 00000000ffffffff [ 23.757176] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.757555] page dumped because: kasan: bad access detected [ 23.757808] [ 23.758018] Memory state around the buggy address: [ 23.758482] ffff888103d33b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.758868] ffff888103d33c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.759276] >ffff888103d33c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 23.759569] ^ [ 23.760103] ffff888103d33d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.760421] ffff888103d33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.760763] ================================================================== [ 23.924142] ================================================================== [ 23.924477] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 23.924782] Write of size 1 at addr ffff88810621a0f0 by task kunit_try_catch/210 [ 23.925029] [ 23.925112] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 23.925161] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.925174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.925196] Call Trace: [ 23.925213] <TASK> [ 23.925231] dump_stack_lvl+0x73/0xb0 [ 23.925263] print_report+0xd1/0x610 [ 23.925284] ? __virt_addr_valid+0x1db/0x2d0 [ 23.925308] ? krealloc_more_oob_helper+0x7eb/0x930 [ 23.925331] ? kasan_addr_to_slab+0x11/0xa0 [ 23.925351] ? krealloc_more_oob_helper+0x7eb/0x930 [ 23.925374] kasan_report+0x141/0x180 [ 23.925395] ? krealloc_more_oob_helper+0x7eb/0x930 [ 23.925422] __asan_report_store1_noabort+0x1b/0x30 [ 23.925445] krealloc_more_oob_helper+0x7eb/0x930 [ 23.925466] ? __schedule+0x10cc/0x2b60 [ 23.925489] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 23.925513] ? __kasan_check_write+0x18/0x20 [ 23.925535] ? queued_spin_lock_slowpath+0x116/0xb40 [ 23.925558] ? irqentry_exit+0x2a/0x60 [ 23.925579] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 23.925602] ? trace_hardirqs_on+0x37/0xe0 [ 23.925625] ? __pfx_read_tsc+0x10/0x10 [ 23.925649] krealloc_large_more_oob+0x1c/0x30 [ 23.925671] kunit_try_run_case+0x1a5/0x480 [ 23.925703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.925725] ? queued_spin_lock_slowpath+0x116/0xb40 [ 23.926284] ? __kthread_parkme+0x82/0x180 [ 23.926364] ? preempt_count_sub+0x50/0x80 [ 23.926390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.926413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.926498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.926526] kthread+0x337/0x6f0 [ 23.926546] ? trace_preempt_on+0x20/0xc0 [ 23.926568] ? __pfx_kthread+0x10/0x10 [ 23.926588] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.926609] ? calculate_sigpending+0x7b/0xa0 [ 23.926632] ? __pfx_kthread+0x10/0x10 [ 23.926810] ret_from_fork+0x116/0x1d0 [ 23.926831] ? __pfx_kthread+0x10/0x10 [ 23.926852] ret_from_fork_asm+0x1a/0x30 [ 23.926901] </TASK> [ 23.926915] [ 23.937411] The buggy address belongs to the physical page: [ 23.938012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106218 [ 23.938426] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.938755] flags: 0x200000000000040(head|node=0|zone=2) [ 23.939156] page_type: f8(unknown) [ 23.939329] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.939644] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.940183] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.940583] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.941171] head: 0200000000000002 ffffea0004188601 00000000ffffffff 00000000ffffffff [ 23.941467] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.942019] page dumped because: kasan: bad access detected [ 23.942210] [ 23.942453] Memory state around the buggy address: [ 23.942654] ffff888106219f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.943205] ffff88810621a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.943579] >ffff88810621a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 23.943983] ^ [ 23.944363] ffff88810621a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.944726] ffff88810621a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.945214] ================================================================== [ 23.762017] ================================================================== [ 23.762335] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 23.762741] Write of size 1 at addr ffff888103d33cf0 by task kunit_try_catch/206 [ 23.763177] [ 23.763288] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 23.763336] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.763349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.763370] Call Trace: [ 23.763383] <TASK> [ 23.763401] dump_stack_lvl+0x73/0xb0 [ 23.763431] print_report+0xd1/0x610 [ 23.763452] ? __virt_addr_valid+0x1db/0x2d0 [ 23.763476] ? krealloc_more_oob_helper+0x7eb/0x930 [ 23.763498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.763523] ? krealloc_more_oob_helper+0x7eb/0x930 [ 23.763546] kasan_report+0x141/0x180 [ 23.763567] ? krealloc_more_oob_helper+0x7eb/0x930 [ 23.763594] __asan_report_store1_noabort+0x1b/0x30 [ 23.763617] krealloc_more_oob_helper+0x7eb/0x930 [ 23.763639] ? __schedule+0x10cc/0x2b60 [ 23.763662] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 23.763684] ? finish_task_switch.isra.0+0x153/0x700 [ 23.763719] ? __switch_to+0x47/0xf80 [ 23.763745] ? __schedule+0x10cc/0x2b60 [ 23.763766] ? __pfx_read_tsc+0x10/0x10 [ 23.763801] krealloc_more_oob+0x1c/0x30 [ 23.763827] kunit_try_run_case+0x1a5/0x480 [ 23.763849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.763868] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.763891] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.763914] ? __kthread_parkme+0x82/0x180 [ 23.763934] ? preempt_count_sub+0x50/0x80 [ 23.764032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.764054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.764079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.764103] kthread+0x337/0x6f0 [ 23.764122] ? trace_preempt_on+0x20/0xc0 [ 23.764145] ? __pfx_kthread+0x10/0x10 [ 23.764165] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.764187] ? calculate_sigpending+0x7b/0xa0 [ 23.764210] ? __pfx_kthread+0x10/0x10 [ 23.764231] ret_from_fork+0x116/0x1d0 [ 23.764250] ? __pfx_kthread+0x10/0x10 [ 23.764270] ret_from_fork_asm+0x1a/0x30 [ 23.764300] </TASK> [ 23.764311] [ 23.772151] Allocated by task 206: [ 23.772311] kasan_save_stack+0x45/0x70 [ 23.772490] kasan_save_track+0x18/0x40 [ 23.772651] kasan_save_alloc_info+0x3b/0x50 [ 23.772936] __kasan_krealloc+0x190/0x1f0 [ 23.773110] krealloc_noprof+0xf3/0x340 [ 23.773294] krealloc_more_oob_helper+0x1a9/0x930 [ 23.773478] krealloc_more_oob+0x1c/0x30 [ 23.773656] kunit_try_run_case+0x1a5/0x480 [ 23.773866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.774127] kthread+0x337/0x6f0 [ 23.774242] ret_from_fork+0x116/0x1d0 [ 23.774365] ret_from_fork_asm+0x1a/0x30 [ 23.774495] [ 23.774560] The buggy address belongs to the object at ffff888103d33c00 [ 23.774560] which belongs to the cache kmalloc-256 of size 256 [ 23.775079] The buggy address is located 5 bytes to the right of [ 23.775079] allocated 235-byte region [ffff888103d33c00, ffff888103d33ceb) [ 23.775606] [ 23.775672] The buggy address belongs to the physical page: [ 23.776087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d32 [ 23.776503] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.776784] flags: 0x200000000000040(head|node=0|zone=2) [ 23.776955] page_type: f5(slab) [ 23.777069] raw: 0200000000000040 ffff888100041b40 ffffea0004028a80 dead000000000004 [ 23.777467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.777827] head: 0200000000000040 ffff888100041b40 ffffea0004028a80 dead000000000004 [ 23.778172] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.778494] head: 0200000000000001 ffffea00040f4c81 00000000ffffffff 00000000ffffffff [ 23.779025] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.779310] page dumped because: kasan: bad access detected [ 23.779494] [ 23.779559] Memory state around the buggy address: [ 23.779790] ffff888103d33b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.780146] ffff888103d33c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.780353] >ffff888103d33c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 23.780819] ^ [ 23.781213] ffff888103d33d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.781491] ffff888103d33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.781707] ================================================================== [ 23.901166] ================================================================== [ 23.901610] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 23.902003] Write of size 1 at addr ffff88810621a0eb by task kunit_try_catch/210 [ 23.902282] [ 23.902375] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 23.902428] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.902441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.902463] Call Trace: [ 23.902477] <TASK> [ 23.902497] dump_stack_lvl+0x73/0xb0 [ 23.902530] print_report+0xd1/0x610 [ 23.902553] ? __virt_addr_valid+0x1db/0x2d0 [ 23.902577] ? krealloc_more_oob_helper+0x821/0x930 [ 23.902600] ? kasan_addr_to_slab+0x11/0xa0 [ 23.902619] ? krealloc_more_oob_helper+0x821/0x930 [ 23.902642] kasan_report+0x141/0x180 [ 23.902664] ? krealloc_more_oob_helper+0x821/0x930 [ 23.902705] __asan_report_store1_noabort+0x1b/0x30 [ 23.902730] krealloc_more_oob_helper+0x821/0x930 [ 23.902752] ? __schedule+0x10cc/0x2b60 [ 23.902776] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 23.903187] ? __kasan_check_write+0x18/0x20 [ 23.903213] ? queued_spin_lock_slowpath+0x116/0xb40 [ 23.903237] ? irqentry_exit+0x2a/0x60 [ 23.903260] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 23.903284] ? trace_hardirqs_on+0x37/0xe0 [ 23.903308] ? __pfx_read_tsc+0x10/0x10 [ 23.903333] krealloc_large_more_oob+0x1c/0x30 [ 23.903356] kunit_try_run_case+0x1a5/0x480 [ 23.903379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.903400] ? queued_spin_lock_slowpath+0x116/0xb40 [ 23.903423] ? __kthread_parkme+0x82/0x180 [ 23.903444] ? preempt_count_sub+0x50/0x80 [ 23.903468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.903489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.903514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.903538] kthread+0x337/0x6f0 [ 23.903558] ? trace_preempt_on+0x20/0xc0 [ 23.903580] ? __pfx_kthread+0x10/0x10 [ 23.903600] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.903621] ? calculate_sigpending+0x7b/0xa0 [ 23.903645] ? __pfx_kthread+0x10/0x10 [ 23.903666] ret_from_fork+0x116/0x1d0 [ 23.903685] ? __pfx_kthread+0x10/0x10 [ 23.903719] ret_from_fork_asm+0x1a/0x30 [ 23.903750] </TASK> [ 23.903762] [ 23.911469] The buggy address belongs to the physical page: [ 23.911738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106218 [ 23.912169] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.912502] flags: 0x200000000000040(head|node=0|zone=2) [ 23.912682] page_type: f8(unknown) [ 23.912944] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.913284] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.913583] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.914117] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.914356] head: 0200000000000002 ffffea0004188601 00000000ffffffff 00000000ffffffff [ 23.915811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.916991] page dumped because: kasan: bad access detected [ 23.917375] [ 23.918678] Memory state around the buggy address: [ 23.918877] ffff888106219f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.920468] ffff88810621a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.921345] >ffff88810621a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 23.921853] ^ [ 23.922999] ffff88810621a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.923242] ffff88810621a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.923495] ==================================================================