Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 40.888234] ================================================================== [ 40.895219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 40.902767] Write of size 1 at addr ffff000806cce0da by task kunit_try_catch/246 [ 40.910143] [ 40.911628] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 40.911682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.911697] Hardware name: WinLink E850-96 board (DT) [ 40.911715] Call trace: [ 40.911728] show_stack+0x20/0x38 (C) [ 40.911760] dump_stack_lvl+0x8c/0xd0 [ 40.911795] print_report+0x118/0x5d0 [ 40.911821] kasan_report+0xdc/0x128 [ 40.911848] __asan_report_store1_noabort+0x20/0x30 [ 40.911883] krealloc_less_oob_helper+0xa80/0xc50 [ 40.911917] krealloc_large_less_oob+0x20/0x38 [ 40.911949] kunit_try_run_case+0x170/0x3f0 [ 40.911987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.912019] kthread+0x328/0x630 [ 40.912047] ret_from_fork+0x10/0x20 [ 40.912081] [ 40.980717] The buggy address belongs to the physical page: [ 40.986275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 40.994257] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.001898] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.008840] page_type: f8(unknown) [ 41.012236] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.019957] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.027684] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.035495] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.043308] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 41.051120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.058926] page dumped because: kasan: bad access detected [ 41.064481] [ 41.065957] Memory state around the buggy address: [ 41.070738] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.077939] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.085144] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.092345] ^ [ 41.098425] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.105630] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.112833] ================================================================== [ 41.352722] ================================================================== [ 41.359794] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 41.367342] Write of size 1 at addr ffff000806cce0eb by task kunit_try_catch/246 [ 41.374719] [ 41.376205] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 41.376252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.376267] Hardware name: WinLink E850-96 board (DT) [ 41.376283] Call trace: [ 41.376296] show_stack+0x20/0x38 (C) [ 41.376328] dump_stack_lvl+0x8c/0xd0 [ 41.376360] print_report+0x118/0x5d0 [ 41.376388] kasan_report+0xdc/0x128 [ 41.376415] __asan_report_store1_noabort+0x20/0x30 [ 41.376449] krealloc_less_oob_helper+0xa58/0xc50 [ 41.376483] krealloc_large_less_oob+0x20/0x38 [ 41.376515] kunit_try_run_case+0x170/0x3f0 [ 41.376552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.376586] kthread+0x328/0x630 [ 41.376614] ret_from_fork+0x10/0x20 [ 41.376647] [ 41.445293] The buggy address belongs to the physical page: [ 41.450850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 41.458833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.466473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.473416] page_type: f8(unknown) [ 41.476813] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.484533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.492260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.500071] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.507884] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 41.515696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.523502] page dumped because: kasan: bad access detected [ 41.529057] [ 41.530533] Memory state around the buggy address: [ 41.535313] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.542516] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.549720] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.556922] ^ [ 41.563522] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.570727] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.577928] ================================================================== [ 40.656358] ================================================================== [ 40.663447] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 40.670998] Write of size 1 at addr ffff000806cce0d0 by task kunit_try_catch/246 [ 40.678376] [ 40.679864] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 40.679915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.679931] Hardware name: WinLink E850-96 board (DT) [ 40.679949] Call trace: [ 40.679961] show_stack+0x20/0x38 (C) [ 40.679995] dump_stack_lvl+0x8c/0xd0 [ 40.680026] print_report+0x118/0x5d0 [ 40.680054] kasan_report+0xdc/0x128 [ 40.680083] __asan_report_store1_noabort+0x20/0x30 [ 40.680115] krealloc_less_oob_helper+0xb9c/0xc50 [ 40.680148] krealloc_large_less_oob+0x20/0x38 [ 40.680180] kunit_try_run_case+0x170/0x3f0 [ 40.680216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.680250] kthread+0x328/0x630 [ 40.680278] ret_from_fork+0x10/0x20 [ 40.680311] [ 40.748950] The buggy address belongs to the physical page: [ 40.754506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 40.762490] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.770130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.777073] page_type: f8(unknown) [ 40.780469] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.788190] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.795916] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.803728] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.811541] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 40.819353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.827158] page dumped because: kasan: bad access detected [ 40.832714] [ 40.834189] Memory state around the buggy address: [ 40.838969] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.846172] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.853377] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 40.860578] ^ [ 40.866397] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.873601] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.880803] ================================================================== [ 40.422036] ================================================================== [ 40.431941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 40.439491] Write of size 1 at addr ffff000806cce0c9 by task kunit_try_catch/246 [ 40.446869] [ 40.448354] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 40.448407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.448424] Hardware name: WinLink E850-96 board (DT) [ 40.448443] Call trace: [ 40.448455] show_stack+0x20/0x38 (C) [ 40.448489] dump_stack_lvl+0x8c/0xd0 [ 40.448524] print_report+0x118/0x5d0 [ 40.448554] kasan_report+0xdc/0x128 [ 40.448581] __asan_report_store1_noabort+0x20/0x30 [ 40.448615] krealloc_less_oob_helper+0xa48/0xc50 [ 40.448648] krealloc_large_less_oob+0x20/0x38 [ 40.448681] kunit_try_run_case+0x170/0x3f0 [ 40.448719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.448753] kthread+0x328/0x630 [ 40.448783] ret_from_fork+0x10/0x20 [ 40.448816] [ 40.517443] The buggy address belongs to the physical page: [ 40.522999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 40.530984] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.538623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.545567] page_type: f8(unknown) [ 40.548962] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.556683] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.564409] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.572220] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.580034] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 40.587846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.595651] page dumped because: kasan: bad access detected [ 40.601207] [ 40.602682] Memory state around the buggy address: [ 40.607463] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.614665] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.621872] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 40.629071] ^ [ 40.634630] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.641835] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.649038] ================================================================== [ 41.120364] ================================================================== [ 41.127246] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 41.134793] Write of size 1 at addr ffff000806cce0ea by task kunit_try_catch/246 [ 41.142171] [ 41.143656] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 41.143705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.143721] Hardware name: WinLink E850-96 board (DT) [ 41.143739] Call trace: [ 41.143752] show_stack+0x20/0x38 (C) [ 41.143785] dump_stack_lvl+0x8c/0xd0 [ 41.143817] print_report+0x118/0x5d0 [ 41.143844] kasan_report+0xdc/0x128 [ 41.143871] __asan_report_store1_noabort+0x20/0x30 [ 41.143904] krealloc_less_oob_helper+0xae4/0xc50 [ 41.143937] krealloc_large_less_oob+0x20/0x38 [ 41.143971] kunit_try_run_case+0x170/0x3f0 [ 41.144007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.144037] kthread+0x328/0x630 [ 41.144065] ret_from_fork+0x10/0x20 [ 41.144097] [ 41.212745] The buggy address belongs to the physical page: [ 41.218301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 41.226285] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.233926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.240867] page_type: f8(unknown) [ 41.244264] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.251985] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.259711] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.267523] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.275336] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 41.283148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.290954] page dumped because: kasan: bad access detected [ 41.296509] [ 41.297984] Memory state around the buggy address: [ 41.302766] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.309967] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.317172] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.324373] ^ [ 41.330974] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.338178] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.345380] ==================================================================
[ 29.445135] ================================================================== [ 29.445197] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.445256] Write of size 1 at addr fff00000c96882c9 by task kunit_try_catch/189 [ 29.445305] [ 29.445341] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.445528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.445554] Hardware name: linux,dummy-virt (DT) [ 29.445584] Call trace: [ 29.445612] show_stack+0x20/0x38 (C) [ 29.445717] dump_stack_lvl+0x8c/0xd0 [ 29.445854] print_report+0x118/0x5d0 [ 29.445898] kasan_report+0xdc/0x128 [ 29.445939] __asan_report_store1_noabort+0x20/0x30 [ 29.445986] krealloc_less_oob_helper+0xa48/0xc50 [ 29.446034] krealloc_less_oob+0x20/0x38 [ 29.446089] kunit_try_run_case+0x170/0x3f0 [ 29.446136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.446184] kthread+0x328/0x630 [ 29.446225] ret_from_fork+0x10/0x20 [ 29.446272] [ 29.446290] Allocated by task 189: [ 29.446317] kasan_save_stack+0x3c/0x68 [ 29.446368] kasan_save_track+0x20/0x40 [ 29.446408] kasan_save_alloc_info+0x40/0x58 [ 29.446445] __kasan_krealloc+0x118/0x178 [ 29.446560] krealloc_noprof+0x128/0x360 [ 29.446783] krealloc_less_oob_helper+0x168/0xc50 [ 29.447114] krealloc_less_oob+0x20/0x38 [ 29.447158] kunit_try_run_case+0x170/0x3f0 [ 29.447475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.447662] kthread+0x328/0x630 [ 29.447697] ret_from_fork+0x10/0x20 [ 29.447731] [ 29.447750] The buggy address belongs to the object at fff00000c9688200 [ 29.447750] which belongs to the cache kmalloc-256 of size 256 [ 29.448332] The buggy address is located 0 bytes to the right of [ 29.448332] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.448416] [ 29.448438] The buggy address belongs to the physical page: [ 29.448469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.448688] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.448843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.448899] page_type: f5(slab) [ 29.448940] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.448999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.449058] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.449501] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.449628] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.449813] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.450040] page dumped because: kasan: bad access detected [ 29.450117] [ 29.450135] Memory state around the buggy address: [ 29.450202] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.450243] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.450448] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.450626] ^ [ 29.450666] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.450842] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.450916] ================================================================== [ 29.461298] ================================================================== [ 29.461353] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.461408] Write of size 1 at addr fff00000c96882da by task kunit_try_catch/189 [ 29.461456] [ 29.461580] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.461948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.461974] Hardware name: linux,dummy-virt (DT) [ 29.462004] Call trace: [ 29.462026] show_stack+0x20/0x38 (C) [ 29.462085] dump_stack_lvl+0x8c/0xd0 [ 29.462129] print_report+0x118/0x5d0 [ 29.462171] kasan_report+0xdc/0x128 [ 29.462213] __asan_report_store1_noabort+0x20/0x30 [ 29.462267] krealloc_less_oob_helper+0xa80/0xc50 [ 29.462490] krealloc_less_oob+0x20/0x38 [ 29.462707] kunit_try_run_case+0x170/0x3f0 [ 29.462783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.462832] kthread+0x328/0x630 [ 29.462880] ret_from_fork+0x10/0x20 [ 29.463003] [ 29.463040] Allocated by task 189: [ 29.463336] kasan_save_stack+0x3c/0x68 [ 29.463671] kasan_save_track+0x20/0x40 [ 29.464020] kasan_save_alloc_info+0x40/0x58 [ 29.464071] __kasan_krealloc+0x118/0x178 [ 29.464109] krealloc_noprof+0x128/0x360 [ 29.464147] krealloc_less_oob_helper+0x168/0xc50 [ 29.464478] krealloc_less_oob+0x20/0x38 [ 29.464626] kunit_try_run_case+0x170/0x3f0 [ 29.464783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.464870] kthread+0x328/0x630 [ 29.464904] ret_from_fork+0x10/0x20 [ 29.464940] [ 29.464960] The buggy address belongs to the object at fff00000c9688200 [ 29.464960] which belongs to the cache kmalloc-256 of size 256 [ 29.465018] The buggy address is located 17 bytes to the right of [ 29.465018] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.465091] [ 29.465111] The buggy address belongs to the physical page: [ 29.465168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.465219] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.465264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.465315] page_type: f5(slab) [ 29.465352] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.465400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.465447] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.465907] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.466025] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.466096] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.466189] page dumped because: kasan: bad access detected [ 29.466289] [ 29.466307] Memory state around the buggy address: [ 29.466338] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.466387] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.466767] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.466869] ^ [ 29.466922] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.467022] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.467205] ================================================================== [ 29.522835] ================================================================== [ 29.522867] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.522906] Write of size 1 at addr fff00000c9b060eb by task kunit_try_catch/193 [ 29.522955] [ 29.522982] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.523186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.523286] Hardware name: linux,dummy-virt (DT) [ 29.523406] Call trace: [ 29.523460] show_stack+0x20/0x38 (C) [ 29.523505] dump_stack_lvl+0x8c/0xd0 [ 29.523700] print_report+0x118/0x5d0 [ 29.523811] kasan_report+0xdc/0x128 [ 29.523938] __asan_report_store1_noabort+0x20/0x30 [ 29.524148] krealloc_less_oob_helper+0xa58/0xc50 [ 29.524231] krealloc_large_less_oob+0x20/0x38 [ 29.524278] kunit_try_run_case+0x170/0x3f0 [ 29.524325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.524373] kthread+0x328/0x630 [ 29.524414] ret_from_fork+0x10/0x20 [ 29.524460] [ 29.524479] The buggy address belongs to the physical page: [ 29.524508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.524558] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.524602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.524651] page_type: f8(unknown) [ 29.524715] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.524817] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.524877] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.524925] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.524972] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.525020] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.525066] page dumped because: kasan: bad access detected [ 29.525095] [ 29.525156] Memory state around the buggy address: [ 29.525185] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.525227] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.525286] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.525321] ^ [ 29.525358] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.525399] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.525495] ================================================================== [ 29.518292] ================================================================== [ 29.518361] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.518415] Write of size 1 at addr fff00000c9b060da by task kunit_try_catch/193 [ 29.518543] [ 29.518629] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.518708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.518732] Hardware name: linux,dummy-virt (DT) [ 29.518761] Call trace: [ 29.518781] show_stack+0x20/0x38 (C) [ 29.518826] dump_stack_lvl+0x8c/0xd0 [ 29.518870] print_report+0x118/0x5d0 [ 29.518911] kasan_report+0xdc/0x128 [ 29.518952] __asan_report_store1_noabort+0x20/0x30 [ 29.519020] krealloc_less_oob_helper+0xa80/0xc50 [ 29.519079] krealloc_large_less_oob+0x20/0x38 [ 29.519125] kunit_try_run_case+0x170/0x3f0 [ 29.519172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.519220] kthread+0x328/0x630 [ 29.519260] ret_from_fork+0x10/0x20 [ 29.519315] [ 29.519335] The buggy address belongs to the physical page: [ 29.519364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.519414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.519458] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.519510] page_type: f8(unknown) [ 29.519546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.519695] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.519878] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.519924] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.520128] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.520244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.520284] page dumped because: kasan: bad access detected [ 29.520313] [ 29.520330] Memory state around the buggy address: [ 29.520360] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.520400] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.520440] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.520475] ^ [ 29.520547] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.520605] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.520642] ================================================================== [ 29.473897] ================================================================== [ 29.473942] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.473990] Write of size 1 at addr fff00000c96882eb by task kunit_try_catch/189 [ 29.474037] [ 29.474080] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.474159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.474194] Hardware name: linux,dummy-virt (DT) [ 29.474337] Call trace: [ 29.474360] show_stack+0x20/0x38 (C) [ 29.474407] dump_stack_lvl+0x8c/0xd0 [ 29.474450] print_report+0x118/0x5d0 [ 29.474492] kasan_report+0xdc/0x128 [ 29.474533] __asan_report_store1_noabort+0x20/0x30 [ 29.474580] krealloc_less_oob_helper+0xa58/0xc50 [ 29.474627] krealloc_less_oob+0x20/0x38 [ 29.474671] kunit_try_run_case+0x170/0x3f0 [ 29.474718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.474766] kthread+0x328/0x630 [ 29.474806] ret_from_fork+0x10/0x20 [ 29.474858] [ 29.474882] Allocated by task 189: [ 29.474908] kasan_save_stack+0x3c/0x68 [ 29.475305] kasan_save_track+0x20/0x40 [ 29.475530] kasan_save_alloc_info+0x40/0x58 [ 29.475966] __kasan_krealloc+0x118/0x178 [ 29.476011] krealloc_noprof+0x128/0x360 [ 29.476428] krealloc_less_oob_helper+0x168/0xc50 [ 29.476684] krealloc_less_oob+0x20/0x38 [ 29.476725] kunit_try_run_case+0x170/0x3f0 [ 29.476763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.476806] kthread+0x328/0x630 [ 29.476838] ret_from_fork+0x10/0x20 [ 29.476991] [ 29.477016] The buggy address belongs to the object at fff00000c9688200 [ 29.477016] which belongs to the cache kmalloc-256 of size 256 [ 29.477271] The buggy address is located 34 bytes to the right of [ 29.477271] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.477372] [ 29.477399] The buggy address belongs to the physical page: [ 29.477556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.477664] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.477710] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.477772] page_type: f5(slab) [ 29.477905] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.477953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.478003] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.478060] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.478108] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.478254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.478447] page dumped because: kasan: bad access detected [ 29.478481] [ 29.478633] Memory state around the buggy address: [ 29.479017] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.479268] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.479376] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.479426] ^ [ 29.479500] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.479666] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.479703] ================================================================== [ 29.452232] ================================================================== [ 29.452280] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.452328] Write of size 1 at addr fff00000c96882d0 by task kunit_try_catch/189 [ 29.452375] [ 29.452407] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.452487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.452512] Hardware name: linux,dummy-virt (DT) [ 29.452542] Call trace: [ 29.452563] show_stack+0x20/0x38 (C) [ 29.452990] dump_stack_lvl+0x8c/0xd0 [ 29.453064] print_report+0x118/0x5d0 [ 29.453107] kasan_report+0xdc/0x128 [ 29.453149] __asan_report_store1_noabort+0x20/0x30 [ 29.453503] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.453849] krealloc_less_oob+0x20/0x38 [ 29.454037] kunit_try_run_case+0x170/0x3f0 [ 29.454111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.454546] kthread+0x328/0x630 [ 29.454709] ret_from_fork+0x10/0x20 [ 29.455154] [ 29.455325] Allocated by task 189: [ 29.455455] kasan_save_stack+0x3c/0x68 [ 29.455499] kasan_save_track+0x20/0x40 [ 29.455560] kasan_save_alloc_info+0x40/0x58 [ 29.455926] __kasan_krealloc+0x118/0x178 [ 29.455974] krealloc_noprof+0x128/0x360 [ 29.456058] krealloc_less_oob_helper+0x168/0xc50 [ 29.456097] krealloc_less_oob+0x20/0x38 [ 29.456481] kunit_try_run_case+0x170/0x3f0 [ 29.456526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.456565] kthread+0x328/0x630 [ 29.456597] ret_from_fork+0x10/0x20 [ 29.456703] [ 29.456722] The buggy address belongs to the object at fff00000c9688200 [ 29.456722] which belongs to the cache kmalloc-256 of size 256 [ 29.457013] The buggy address is located 7 bytes to the right of [ 29.457013] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.457158] [ 29.457180] The buggy address belongs to the physical page: [ 29.457412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.457524] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.457582] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.457639] page_type: f5(slab) [ 29.457678] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.457860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.457915] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.458094] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.458148] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.458195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.458351] page dumped because: kasan: bad access detected [ 29.458427] [ 29.458446] Memory state around the buggy address: [ 29.458481] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.458623] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.458708] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.458809] ^ [ 29.458906] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.458948] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.459028] ================================================================== [ 29.509897] ================================================================== [ 29.509972] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.510035] Write of size 1 at addr fff00000c9b060c9 by task kunit_try_catch/193 [ 29.510098] [ 29.510136] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.510218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.510244] Hardware name: linux,dummy-virt (DT) [ 29.510275] Call trace: [ 29.510298] show_stack+0x20/0x38 (C) [ 29.510345] dump_stack_lvl+0x8c/0xd0 [ 29.510391] print_report+0x118/0x5d0 [ 29.510433] kasan_report+0xdc/0x128 [ 29.510475] __asan_report_store1_noabort+0x20/0x30 [ 29.510522] krealloc_less_oob_helper+0xa48/0xc50 [ 29.510569] krealloc_large_less_oob+0x20/0x38 [ 29.510616] kunit_try_run_case+0x170/0x3f0 [ 29.510663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.511008] kthread+0x328/0x630 [ 29.511323] ret_from_fork+0x10/0x20 [ 29.511752] [ 29.511920] The buggy address belongs to the physical page: [ 29.511958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.512014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.512072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.512307] page_type: f8(unknown) [ 29.512490] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.512755] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.513018] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.513075] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.513125] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.513193] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.513232] page dumped because: kasan: bad access detected [ 29.513262] [ 29.513280] Memory state around the buggy address: [ 29.513312] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.513354] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.513394] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.513430] ^ [ 29.513463] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.513505] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.513541] ================================================================== [ 29.515419] ================================================================== [ 29.515466] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.515517] Write of size 1 at addr fff00000c9b060d0 by task kunit_try_catch/193 [ 29.515564] [ 29.515595] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.515676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.515701] Hardware name: linux,dummy-virt (DT) [ 29.515748] Call trace: [ 29.515782] show_stack+0x20/0x38 (C) [ 29.515838] dump_stack_lvl+0x8c/0xd0 [ 29.516091] print_report+0x118/0x5d0 [ 29.516232] kasan_report+0xdc/0x128 [ 29.516274] __asan_report_store1_noabort+0x20/0x30 [ 29.516321] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.516369] krealloc_large_less_oob+0x20/0x38 [ 29.516415] kunit_try_run_case+0x170/0x3f0 [ 29.516464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.516512] kthread+0x328/0x630 [ 29.516553] ret_from_fork+0x10/0x20 [ 29.516600] [ 29.516620] The buggy address belongs to the physical page: [ 29.516650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.516702] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.516764] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.516888] page_type: f8(unknown) [ 29.516934] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.517056] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.517283] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.517330] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.517378] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.517424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.517462] page dumped because: kasan: bad access detected [ 29.517491] [ 29.517508] Memory state around the buggy address: [ 29.517537] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.517580] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.517627] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.517674] ^ [ 29.517708] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.517749] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.517872] ================================================================== [ 29.467872] ================================================================== [ 29.467941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.467987] Write of size 1 at addr fff00000c96882ea by task kunit_try_catch/189 [ 29.468034] [ 29.468076] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.468155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.468215] Hardware name: linux,dummy-virt (DT) [ 29.468295] Call trace: [ 29.468317] show_stack+0x20/0x38 (C) [ 29.468492] dump_stack_lvl+0x8c/0xd0 [ 29.468542] print_report+0x118/0x5d0 [ 29.468641] kasan_report+0xdc/0x128 [ 29.468732] __asan_report_store1_noabort+0x20/0x30 [ 29.468849] krealloc_less_oob_helper+0xae4/0xc50 [ 29.468944] krealloc_less_oob+0x20/0x38 [ 29.469089] kunit_try_run_case+0x170/0x3f0 [ 29.469232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.469320] kthread+0x328/0x630 [ 29.469448] ret_from_fork+0x10/0x20 [ 29.469523] [ 29.469542] Allocated by task 189: [ 29.469581] kasan_save_stack+0x3c/0x68 [ 29.469626] kasan_save_track+0x20/0x40 [ 29.469663] kasan_save_alloc_info+0x40/0x58 [ 29.469806] __kasan_krealloc+0x118/0x178 [ 29.470077] krealloc_noprof+0x128/0x360 [ 29.470118] krealloc_less_oob_helper+0x168/0xc50 [ 29.470202] krealloc_less_oob+0x20/0x38 [ 29.470239] kunit_try_run_case+0x170/0x3f0 [ 29.470283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.470449] kthread+0x328/0x630 [ 29.470480] ret_from_fork+0x10/0x20 [ 29.470514] [ 29.470533] The buggy address belongs to the object at fff00000c9688200 [ 29.470533] which belongs to the cache kmalloc-256 of size 256 [ 29.470589] The buggy address is located 33 bytes to the right of [ 29.470589] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.470651] [ 29.470716] The buggy address belongs to the physical page: [ 29.470858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.471068] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.471114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.471163] page_type: f5(slab) [ 29.471252] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.471573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.471923] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.471985] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.472036] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.472091] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.472129] page dumped because: kasan: bad access detected [ 29.472368] [ 29.472453] Memory state around the buggy address: [ 29.472492] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.472535] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.472575] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.472611] ^ [ 29.472844] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.472962] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.472999] ================================================================== [ 29.520788] ================================================================== [ 29.520826] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.520870] Write of size 1 at addr fff00000c9b060ea by task kunit_try_catch/193 [ 29.520916] [ 29.520943] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.521085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.521113] Hardware name: linux,dummy-virt (DT) [ 29.521142] Call trace: [ 29.521162] show_stack+0x20/0x38 (C) [ 29.521208] dump_stack_lvl+0x8c/0xd0 [ 29.521263] print_report+0x118/0x5d0 [ 29.521462] kasan_report+0xdc/0x128 [ 29.521505] __asan_report_store1_noabort+0x20/0x30 [ 29.521559] krealloc_less_oob_helper+0xae4/0xc50 [ 29.521638] krealloc_large_less_oob+0x20/0x38 [ 29.521684] kunit_try_run_case+0x170/0x3f0 [ 29.521732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.521779] kthread+0x328/0x630 [ 29.521820] ret_from_fork+0x10/0x20 [ 29.521866] [ 29.521894] The buggy address belongs to the physical page: [ 29.521995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.522071] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.522115] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.522164] page_type: f8(unknown) [ 29.522200] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.522247] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.522294] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.522341] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.522388] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.522434] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.522472] page dumped because: kasan: bad access detected [ 29.522501] [ 29.522518] Memory state around the buggy address: [ 29.522547] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.522597] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.522638] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.522674] ^ [ 29.522710] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.522749] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.522784] ==================================================================
[ 24.142433] ================================================================== [ 24.142760] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 24.143350] Write of size 1 at addr ffff88810587a0eb by task kunit_try_catch/211 [ 24.143718] [ 24.143843] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.143925] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.143938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.143972] Call Trace: [ 24.143991] <TASK> [ 24.144011] dump_stack_lvl+0x73/0xb0 [ 24.144044] print_report+0xd1/0x610 [ 24.144067] ? __virt_addr_valid+0x1db/0x2d0 [ 24.144091] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.144114] ? kasan_addr_to_slab+0x11/0xa0 [ 24.144134] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.144156] kasan_report+0x141/0x180 [ 24.144178] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.144205] __asan_report_store1_noabort+0x1b/0x30 [ 24.144228] krealloc_less_oob_helper+0xd47/0x11d0 [ 24.144252] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.144275] ? finish_task_switch.isra.0+0x153/0x700 [ 24.144298] ? __switch_to+0x47/0xf80 [ 24.144323] ? __schedule+0x10cc/0x2b60 [ 24.144345] ? __pfx_read_tsc+0x10/0x10 [ 24.144369] krealloc_large_less_oob+0x1c/0x30 [ 24.144390] kunit_try_run_case+0x1a5/0x480 [ 24.144413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.144432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.144454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.144477] ? __kthread_parkme+0x82/0x180 [ 24.144497] ? preempt_count_sub+0x50/0x80 [ 24.144548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.144570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.144596] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.144631] kthread+0x337/0x6f0 [ 24.144650] ? trace_preempt_on+0x20/0xc0 [ 24.144682] ? __pfx_kthread+0x10/0x10 [ 24.144703] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.144724] ? calculate_sigpending+0x7b/0xa0 [ 24.144747] ? __pfx_kthread+0x10/0x10 [ 24.144768] ret_from_fork+0x116/0x1d0 [ 24.144786] ? __pfx_kthread+0x10/0x10 [ 24.144806] ret_from_fork_asm+0x1a/0x30 [ 24.144836] </TASK> [ 24.144847] [ 24.154039] The buggy address belongs to the physical page: [ 24.154364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105878 [ 24.154869] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.155283] flags: 0x200000000000040(head|node=0|zone=2) [ 24.155623] page_type: f8(unknown) [ 24.155855] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.156173] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.156577] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.156959] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.157434] head: 0200000000000002 ffffea0004161e01 00000000ffffffff 00000000ffffffff [ 24.157810] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.158498] page dumped because: kasan: bad access detected [ 24.158805] [ 24.158894] Memory state around the buggy address: [ 24.159157] ffff888105879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.159372] ffff88810587a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.159767] >ffff88810587a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.160243] ^ [ 24.160799] ffff88810587a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.161194] ffff88810587a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.161493] ================================================================== [ 23.952695] ================================================================== [ 23.953171] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 23.953482] Write of size 1 at addr ffff888104a978ea by task kunit_try_catch/207 [ 23.953813] [ 23.953921] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 23.953973] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.953986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.954009] Call Trace: [ 23.954029] <TASK> [ 23.954056] dump_stack_lvl+0x73/0xb0 [ 23.954087] print_report+0xd1/0x610 [ 23.954108] ? __virt_addr_valid+0x1db/0x2d0 [ 23.954132] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.954154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.954178] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.954202] kasan_report+0x141/0x180 [ 23.954222] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.954249] __asan_report_store1_noabort+0x1b/0x30 [ 23.954273] krealloc_less_oob_helper+0xe90/0x11d0 [ 23.954297] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.954320] ? finish_task_switch.isra.0+0x153/0x700 [ 23.954342] ? __switch_to+0x47/0xf80 [ 23.954369] ? __schedule+0x10cc/0x2b60 [ 23.954392] ? __pfx_read_tsc+0x10/0x10 [ 23.954415] krealloc_less_oob+0x1c/0x30 [ 23.954436] kunit_try_run_case+0x1a5/0x480 [ 23.954458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.954478] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.954500] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.954522] ? __kthread_parkme+0x82/0x180 [ 23.954542] ? preempt_count_sub+0x50/0x80 [ 23.954566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.954587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.954611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.954635] kthread+0x337/0x6f0 [ 23.954654] ? trace_preempt_on+0x20/0xc0 [ 23.954758] ? __pfx_kthread+0x10/0x10 [ 23.954778] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.954799] ? calculate_sigpending+0x7b/0xa0 [ 23.954823] ? __pfx_kthread+0x10/0x10 [ 23.954844] ret_from_fork+0x116/0x1d0 [ 23.954863] ? __pfx_kthread+0x10/0x10 [ 23.954883] ret_from_fork_asm+0x1a/0x30 [ 23.954914] </TASK> [ 23.954925] [ 23.961305] Allocated by task 207: [ 23.961500] kasan_save_stack+0x45/0x70 [ 23.961722] kasan_save_track+0x18/0x40 [ 23.961915] kasan_save_alloc_info+0x3b/0x50 [ 23.962132] __kasan_krealloc+0x190/0x1f0 [ 23.962708] krealloc_noprof+0xf3/0x340 [ 23.962894] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.963149] krealloc_less_oob+0x1c/0x30 [ 23.963286] kunit_try_run_case+0x1a5/0x480 [ 23.963424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.963596] kthread+0x337/0x6f0 [ 23.963800] ret_from_fork+0x116/0x1d0 [ 23.964001] ret_from_fork_asm+0x1a/0x30 [ 23.964190] [ 23.964278] The buggy address belongs to the object at ffff888104a97800 [ 23.964278] which belongs to the cache kmalloc-256 of size 256 [ 23.964813] The buggy address is located 33 bytes to the right of [ 23.964813] allocated 201-byte region [ffff888104a97800, ffff888104a978c9) [ 23.965281] [ 23.965347] The buggy address belongs to the physical page: [ 23.965599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a96 [ 23.966167] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.966467] flags: 0x200000000000040(head|node=0|zone=2) [ 23.966687] page_type: f5(slab) [ 23.966883] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.967397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.967714] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.967990] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.968274] head: 0200000000000001 ffffea000412a581 00000000ffffffff 00000000ffffffff [ 23.968594] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.968902] page dumped because: kasan: bad access detected [ 23.969430] [ 23.969515] Memory state around the buggy address: [ 23.969686] ffff888104a97780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.970012] ffff888104a97800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.970223] >ffff888104a97880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.970425] ^ [ 23.970618] ffff888104a97900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.970831] ffff888104a97980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.971036] ================================================================== [ 23.928333] ================================================================== [ 23.928610] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 23.929384] Write of size 1 at addr ffff888104a978da by task kunit_try_catch/207 [ 23.929719] [ 23.929904] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 23.930035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.930058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.930081] Call Trace: [ 23.930101] <TASK> [ 23.930121] dump_stack_lvl+0x73/0xb0 [ 23.930157] print_report+0xd1/0x610 [ 23.930180] ? __virt_addr_valid+0x1db/0x2d0 [ 23.930203] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.930226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.930250] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.930272] kasan_report+0x141/0x180 [ 23.930293] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.930319] __asan_report_store1_noabort+0x1b/0x30 [ 23.930342] krealloc_less_oob_helper+0xec6/0x11d0 [ 23.930366] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.930389] ? finish_task_switch.isra.0+0x153/0x700 [ 23.930410] ? __switch_to+0x47/0xf80 [ 23.930436] ? __schedule+0x10cc/0x2b60 [ 23.930458] ? __pfx_read_tsc+0x10/0x10 [ 23.930482] krealloc_less_oob+0x1c/0x30 [ 23.930502] kunit_try_run_case+0x1a5/0x480 [ 23.930524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.930543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.930565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.930587] ? __kthread_parkme+0x82/0x180 [ 23.930607] ? preempt_count_sub+0x50/0x80 [ 23.930629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.930649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.930687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.930712] kthread+0x337/0x6f0 [ 23.930731] ? trace_preempt_on+0x20/0xc0 [ 23.930763] ? __pfx_kthread+0x10/0x10 [ 23.930783] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.930804] ? calculate_sigpending+0x7b/0xa0 [ 23.930828] ? __pfx_kthread+0x10/0x10 [ 23.930848] ret_from_fork+0x116/0x1d0 [ 23.930867] ? __pfx_kthread+0x10/0x10 [ 23.930886] ret_from_fork_asm+0x1a/0x30 [ 23.930916] </TASK> [ 23.930927] [ 23.940403] Allocated by task 207: [ 23.940561] kasan_save_stack+0x45/0x70 [ 23.941100] kasan_save_track+0x18/0x40 [ 23.941450] kasan_save_alloc_info+0x3b/0x50 [ 23.942142] __kasan_krealloc+0x190/0x1f0 [ 23.942374] krealloc_noprof+0xf3/0x340 [ 23.942722] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.943116] krealloc_less_oob+0x1c/0x30 [ 23.943524] kunit_try_run_case+0x1a5/0x480 [ 23.943951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.944197] kthread+0x337/0x6f0 [ 23.944321] ret_from_fork+0x116/0x1d0 [ 23.944448] ret_from_fork_asm+0x1a/0x30 [ 23.944582] [ 23.944649] The buggy address belongs to the object at ffff888104a97800 [ 23.944649] which belongs to the cache kmalloc-256 of size 256 [ 23.945471] The buggy address is located 17 bytes to the right of [ 23.945471] allocated 201-byte region [ffff888104a97800, ffff888104a978c9) [ 23.945928] [ 23.946053] The buggy address belongs to the physical page: [ 23.946424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a96 [ 23.946746] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.947074] flags: 0x200000000000040(head|node=0|zone=2) [ 23.947288] page_type: f5(slab) [ 23.947408] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.947748] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.948176] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.948470] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.948753] head: 0200000000000001 ffffea000412a581 00000000ffffffff 00000000ffffffff [ 23.949051] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.949311] page dumped because: kasan: bad access detected [ 23.949601] [ 23.949700] Memory state around the buggy address: [ 23.950292] ffff888104a97780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.950587] ffff888104a97800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.950885] >ffff888104a97880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.951138] ^ [ 23.951395] ffff888104a97900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.951823] ffff888104a97980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.952038] ================================================================== [ 23.971501] ================================================================== [ 23.971901] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 23.972273] Write of size 1 at addr ffff888104a978eb by task kunit_try_catch/207 [ 23.972595] [ 23.972713] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 23.972763] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.972775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.972852] Call Trace: [ 23.972875] <TASK> [ 23.972894] dump_stack_lvl+0x73/0xb0 [ 23.972975] print_report+0xd1/0x610 [ 23.972998] ? __virt_addr_valid+0x1db/0x2d0 [ 23.973021] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.973043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.973097] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.973123] kasan_report+0x141/0x180 [ 23.973144] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.973170] __asan_report_store1_noabort+0x1b/0x30 [ 23.973193] krealloc_less_oob_helper+0xd47/0x11d0 [ 23.973219] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.973241] ? finish_task_switch.isra.0+0x153/0x700 [ 23.973265] ? __switch_to+0x47/0xf80 [ 23.973290] ? __schedule+0x10cc/0x2b60 [ 23.973313] ? __pfx_read_tsc+0x10/0x10 [ 23.973337] krealloc_less_oob+0x1c/0x30 [ 23.973357] kunit_try_run_case+0x1a5/0x480 [ 23.973379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.973399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.973421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.973444] ? __kthread_parkme+0x82/0x180 [ 23.973464] ? preempt_count_sub+0x50/0x80 [ 23.973486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.973506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.973530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.973555] kthread+0x337/0x6f0 [ 23.973574] ? trace_preempt_on+0x20/0xc0 [ 23.973597] ? __pfx_kthread+0x10/0x10 [ 23.973617] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.973638] ? calculate_sigpending+0x7b/0xa0 [ 23.973672] ? __pfx_kthread+0x10/0x10 [ 23.973693] ret_from_fork+0x116/0x1d0 [ 23.973711] ? __pfx_kthread+0x10/0x10 [ 23.973732] ret_from_fork_asm+0x1a/0x30 [ 23.973762] </TASK> [ 23.973773] [ 23.981043] Allocated by task 207: [ 23.981220] kasan_save_stack+0x45/0x70 [ 23.981375] kasan_save_track+0x18/0x40 [ 23.981502] kasan_save_alloc_info+0x3b/0x50 [ 23.981643] __kasan_krealloc+0x190/0x1f0 [ 23.981785] krealloc_noprof+0xf3/0x340 [ 23.981932] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.982152] krealloc_less_oob+0x1c/0x30 [ 23.982388] kunit_try_run_case+0x1a5/0x480 [ 23.982585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.982842] kthread+0x337/0x6f0 [ 23.983004] ret_from_fork+0x116/0x1d0 [ 23.983185] ret_from_fork_asm+0x1a/0x30 [ 23.983410] [ 23.983473] The buggy address belongs to the object at ffff888104a97800 [ 23.983473] which belongs to the cache kmalloc-256 of size 256 [ 23.983830] The buggy address is located 34 bytes to the right of [ 23.983830] allocated 201-byte region [ffff888104a97800, ffff888104a978c9) [ 23.984648] [ 23.984836] The buggy address belongs to the physical page: [ 23.988598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a96 [ 23.989140] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.989368] flags: 0x200000000000040(head|node=0|zone=2) [ 23.989545] page_type: f5(slab) [ 23.993134] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.994217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.996043] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.996303] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.996548] head: 0200000000000001 ffffea000412a581 00000000ffffffff 00000000ffffffff [ 23.996886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.997171] page dumped because: kasan: bad access detected [ 23.997390] [ 23.997457] Memory state around the buggy address: [ 23.997649] ffff888104a97780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.998417] ffff888104a97800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.998919] >ffff888104a97880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.999201] ^ [ 23.999393] ffff888104a97900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.999600] ffff888104a97980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.000007] ================================================================== [ 24.122299] ================================================================== [ 24.122847] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 24.123340] Write of size 1 at addr ffff88810587a0ea by task kunit_try_catch/211 [ 24.123808] [ 24.123911] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.123965] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.123978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.124029] Call Trace: [ 24.124049] <TASK> [ 24.124069] dump_stack_lvl+0x73/0xb0 [ 24.124184] print_report+0xd1/0x610 [ 24.124208] ? __virt_addr_valid+0x1db/0x2d0 [ 24.124244] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.124266] ? kasan_addr_to_slab+0x11/0xa0 [ 24.124286] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.124308] kasan_report+0x141/0x180 [ 24.124357] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.124384] __asan_report_store1_noabort+0x1b/0x30 [ 24.124435] krealloc_less_oob_helper+0xe90/0x11d0 [ 24.124459] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.124481] ? finish_task_switch.isra.0+0x153/0x700 [ 24.124503] ? __switch_to+0x47/0xf80 [ 24.124528] ? __schedule+0x10cc/0x2b60 [ 24.124552] ? __pfx_read_tsc+0x10/0x10 [ 24.124575] krealloc_large_less_oob+0x1c/0x30 [ 24.124596] kunit_try_run_case+0x1a5/0x480 [ 24.124619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.124677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.124699] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.124723] ? __kthread_parkme+0x82/0x180 [ 24.124753] ? preempt_count_sub+0x50/0x80 [ 24.124785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.124806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.124831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.124855] kthread+0x337/0x6f0 [ 24.124875] ? trace_preempt_on+0x20/0xc0 [ 24.124898] ? __pfx_kthread+0x10/0x10 [ 24.124936] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.125032] ? calculate_sigpending+0x7b/0xa0 [ 24.125058] ? __pfx_kthread+0x10/0x10 [ 24.125079] ret_from_fork+0x116/0x1d0 [ 24.125118] ? __pfx_kthread+0x10/0x10 [ 24.125147] ret_from_fork_asm+0x1a/0x30 [ 24.125178] </TASK> [ 24.125189] [ 24.134582] The buggy address belongs to the physical page: [ 24.134922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105878 [ 24.135308] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.135760] flags: 0x200000000000040(head|node=0|zone=2) [ 24.136066] page_type: f8(unknown) [ 24.136316] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.136683] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.137298] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.137555] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.138067] head: 0200000000000002 ffffea0004161e01 00000000ffffffff 00000000ffffffff [ 24.138338] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.138556] page dumped because: kasan: bad access detected [ 24.138723] [ 24.138819] Memory state around the buggy address: [ 24.139088] ffff888105879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.139462] ffff88810587a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.140053] >ffff88810587a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.140409] ^ [ 24.140649] ffff88810587a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.140901] ffff88810587a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.141428] ================================================================== [ 23.883346] ================================================================== [ 23.883852] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 23.884216] Write of size 1 at addr ffff888104a978c9 by task kunit_try_catch/207 [ 23.884902] [ 23.885028] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 23.885083] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.885096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.885118] Call Trace: [ 23.885131] <TASK> [ 23.885150] dump_stack_lvl+0x73/0xb0 [ 23.885181] print_report+0xd1/0x610 [ 23.885203] ? __virt_addr_valid+0x1db/0x2d0 [ 23.885228] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.885267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.885303] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.885327] kasan_report+0x141/0x180 [ 23.885348] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.885374] __asan_report_store1_noabort+0x1b/0x30 [ 23.885397] krealloc_less_oob_helper+0xd70/0x11d0 [ 23.885421] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.885444] ? finish_task_switch.isra.0+0x153/0x700 [ 23.885466] ? __switch_to+0x47/0xf80 [ 23.885492] ? __schedule+0x10cc/0x2b60 [ 23.885515] ? __pfx_read_tsc+0x10/0x10 [ 23.885538] krealloc_less_oob+0x1c/0x30 [ 23.885558] kunit_try_run_case+0x1a5/0x480 [ 23.885581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.885600] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.885622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.885644] ? __kthread_parkme+0x82/0x180 [ 23.885676] ? preempt_count_sub+0x50/0x80 [ 23.885698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.885718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.885743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.885989] kthread+0x337/0x6f0 [ 23.886010] ? trace_preempt_on+0x20/0xc0 [ 23.886033] ? __pfx_kthread+0x10/0x10 [ 23.886060] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.886081] ? calculate_sigpending+0x7b/0xa0 [ 23.886105] ? __pfx_kthread+0x10/0x10 [ 23.886125] ret_from_fork+0x116/0x1d0 [ 23.886144] ? __pfx_kthread+0x10/0x10 [ 23.886164] ret_from_fork_asm+0x1a/0x30 [ 23.886194] </TASK> [ 23.886206] [ 23.895571] Allocated by task 207: [ 23.895764] kasan_save_stack+0x45/0x70 [ 23.895920] kasan_save_track+0x18/0x40 [ 23.896102] kasan_save_alloc_info+0x3b/0x50 [ 23.896322] __kasan_krealloc+0x190/0x1f0 [ 23.896513] krealloc_noprof+0xf3/0x340 [ 23.896649] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.896929] krealloc_less_oob+0x1c/0x30 [ 23.897129] kunit_try_run_case+0x1a5/0x480 [ 23.897391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.897580] kthread+0x337/0x6f0 [ 23.897706] ret_from_fork+0x116/0x1d0 [ 23.897877] ret_from_fork_asm+0x1a/0x30 [ 23.898075] [ 23.898164] The buggy address belongs to the object at ffff888104a97800 [ 23.898164] which belongs to the cache kmalloc-256 of size 256 [ 23.898684] The buggy address is located 0 bytes to the right of [ 23.898684] allocated 201-byte region [ffff888104a97800, ffff888104a978c9) [ 23.899251] [ 23.899318] The buggy address belongs to the physical page: [ 23.899486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a96 [ 23.899897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.900348] flags: 0x200000000000040(head|node=0|zone=2) [ 23.900597] page_type: f5(slab) [ 23.900727] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.901100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.901433] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.901667] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.902006] head: 0200000000000001 ffffea000412a581 00000000ffffffff 00000000ffffffff [ 23.902808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.903058] page dumped because: kasan: bad access detected [ 23.903223] [ 23.903287] Memory state around the buggy address: [ 23.903444] ffff888104a97780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.903785] ffff888104a97800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.904099] >ffff888104a97880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.904351] ^ [ 23.904540] ffff888104a97900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.905135] ffff888104a97980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.905431] ================================================================== [ 24.082795] ================================================================== [ 24.083396] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 24.083744] Write of size 1 at addr ffff88810587a0d0 by task kunit_try_catch/211 [ 24.084148] [ 24.084276] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.084358] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.084371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.084394] Call Trace: [ 24.084407] <TASK> [ 24.084438] dump_stack_lvl+0x73/0xb0 [ 24.084471] print_report+0xd1/0x610 [ 24.084520] ? __virt_addr_valid+0x1db/0x2d0 [ 24.084544] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.084566] ? kasan_addr_to_slab+0x11/0xa0 [ 24.084596] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.084619] kasan_report+0x141/0x180 [ 24.084639] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.084674] __asan_report_store1_noabort+0x1b/0x30 [ 24.084698] krealloc_less_oob_helper+0xe23/0x11d0 [ 24.084723] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.084745] ? finish_task_switch.isra.0+0x153/0x700 [ 24.084793] ? __switch_to+0x47/0xf80 [ 24.084819] ? __schedule+0x10cc/0x2b60 [ 24.084842] ? __pfx_read_tsc+0x10/0x10 [ 24.084876] krealloc_large_less_oob+0x1c/0x30 [ 24.084898] kunit_try_run_case+0x1a5/0x480 [ 24.084938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.084967] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.084989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.085046] ? __kthread_parkme+0x82/0x180 [ 24.085066] ? preempt_count_sub+0x50/0x80 [ 24.085088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.085108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.085133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.085158] kthread+0x337/0x6f0 [ 24.085177] ? trace_preempt_on+0x20/0xc0 [ 24.085200] ? __pfx_kthread+0x10/0x10 [ 24.085220] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.085241] ? calculate_sigpending+0x7b/0xa0 [ 24.085264] ? __pfx_kthread+0x10/0x10 [ 24.085284] ret_from_fork+0x116/0x1d0 [ 24.085302] ? __pfx_kthread+0x10/0x10 [ 24.085322] ret_from_fork_asm+0x1a/0x30 [ 24.085353] </TASK> [ 24.085364] [ 24.094428] The buggy address belongs to the physical page: [ 24.094751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105878 [ 24.095176] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.095544] flags: 0x200000000000040(head|node=0|zone=2) [ 24.095874] page_type: f8(unknown) [ 24.096153] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.096524] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.097023] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.097714] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.098174] head: 0200000000000002 ffffea0004161e01 00000000ffffffff 00000000ffffffff [ 24.098569] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.098975] page dumped because: kasan: bad access detected [ 24.099206] [ 24.099269] Memory state around the buggy address: [ 24.099745] ffff888105879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.100203] ffff88810587a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.100550] >ffff88810587a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.100885] ^ [ 24.101057] ffff88810587a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.101485] ffff88810587a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.102033] ================================================================== [ 24.060880] ================================================================== [ 24.061803] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 24.062601] Write of size 1 at addr ffff88810587a0c9 by task kunit_try_catch/211 [ 24.063113] [ 24.063234] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.063290] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.063304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.063327] Call Trace: [ 24.063342] <TASK> [ 24.063361] dump_stack_lvl+0x73/0xb0 [ 24.063397] print_report+0xd1/0x610 [ 24.063421] ? __virt_addr_valid+0x1db/0x2d0 [ 24.063444] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.063468] ? kasan_addr_to_slab+0x11/0xa0 [ 24.063488] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.063511] kasan_report+0x141/0x180 [ 24.063531] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.063558] __asan_report_store1_noabort+0x1b/0x30 [ 24.063581] krealloc_less_oob_helper+0xd70/0x11d0 [ 24.063605] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.063628] ? finish_task_switch.isra.0+0x153/0x700 [ 24.063650] ? __switch_to+0x47/0xf80 [ 24.063687] ? __schedule+0x10cc/0x2b60 [ 24.063710] ? __pfx_read_tsc+0x10/0x10 [ 24.063735] krealloc_large_less_oob+0x1c/0x30 [ 24.063769] kunit_try_run_case+0x1a5/0x480 [ 24.063793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.063813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.063835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.063857] ? __kthread_parkme+0x82/0x180 [ 24.063877] ? preempt_count_sub+0x50/0x80 [ 24.063899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.063919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.063944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.064035] kthread+0x337/0x6f0 [ 24.064056] ? trace_preempt_on+0x20/0xc0 [ 24.064080] ? __pfx_kthread+0x10/0x10 [ 24.064100] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.064121] ? calculate_sigpending+0x7b/0xa0 [ 24.064144] ? __pfx_kthread+0x10/0x10 [ 24.064165] ret_from_fork+0x116/0x1d0 [ 24.064184] ? __pfx_kthread+0x10/0x10 [ 24.064204] ret_from_fork_asm+0x1a/0x30 [ 24.064234] </TASK> [ 24.064245] [ 24.074317] The buggy address belongs to the physical page: [ 24.074603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105878 [ 24.075210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.075557] flags: 0x200000000000040(head|node=0|zone=2) [ 24.075864] page_type: f8(unknown) [ 24.076112] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.076519] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.076840] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.077627] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.078129] head: 0200000000000002 ffffea0004161e01 00000000ffffffff 00000000ffffffff [ 24.078434] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.078741] page dumped because: kasan: bad access detected [ 24.079045] [ 24.079223] Memory state around the buggy address: [ 24.079473] ffff888105879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.079811] ffff88810587a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.080216] >ffff88810587a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.080586] ^ [ 24.080886] ffff88810587a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.081241] ffff88810587a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.081601] ================================================================== [ 23.905967] ================================================================== [ 23.906883] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 23.907779] Write of size 1 at addr ffff888104a978d0 by task kunit_try_catch/207 [ 23.908346] [ 23.908444] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 23.908497] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.908510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.908532] Call Trace: [ 23.908546] <TASK> [ 23.908564] dump_stack_lvl+0x73/0xb0 [ 23.908598] print_report+0xd1/0x610 [ 23.908620] ? __virt_addr_valid+0x1db/0x2d0 [ 23.908643] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.908677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.908702] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.908724] kasan_report+0x141/0x180 [ 23.908745] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.908771] __asan_report_store1_noabort+0x1b/0x30 [ 23.908794] krealloc_less_oob_helper+0xe23/0x11d0 [ 23.908818] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.908841] ? finish_task_switch.isra.0+0x153/0x700 [ 23.908863] ? __switch_to+0x47/0xf80 [ 23.908888] ? __schedule+0x10cc/0x2b60 [ 23.908910] ? __pfx_read_tsc+0x10/0x10 [ 23.908935] krealloc_less_oob+0x1c/0x30 [ 23.909007] kunit_try_run_case+0x1a5/0x480 [ 23.909029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.909049] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.909072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.909094] ? __kthread_parkme+0x82/0x180 [ 23.909114] ? preempt_count_sub+0x50/0x80 [ 23.909136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.909157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.909181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.909205] kthread+0x337/0x6f0 [ 23.909224] ? trace_preempt_on+0x20/0xc0 [ 23.909248] ? __pfx_kthread+0x10/0x10 [ 23.909270] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.909292] ? calculate_sigpending+0x7b/0xa0 [ 23.909317] ? __pfx_kthread+0x10/0x10 [ 23.909338] ret_from_fork+0x116/0x1d0 [ 23.909357] ? __pfx_kthread+0x10/0x10 [ 23.909377] ret_from_fork_asm+0x1a/0x30 [ 23.909407] </TASK> [ 23.909418] [ 23.917218] Allocated by task 207: [ 23.917368] kasan_save_stack+0x45/0x70 [ 23.917654] kasan_save_track+0x18/0x40 [ 23.918001] kasan_save_alloc_info+0x3b/0x50 [ 23.918521] __kasan_krealloc+0x190/0x1f0 [ 23.918732] krealloc_noprof+0xf3/0x340 [ 23.918938] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.919227] krealloc_less_oob+0x1c/0x30 [ 23.919365] kunit_try_run_case+0x1a5/0x480 [ 23.919503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.919741] kthread+0x337/0x6f0 [ 23.919924] ret_from_fork+0x116/0x1d0 [ 23.920108] ret_from_fork_asm+0x1a/0x30 [ 23.920342] [ 23.920481] The buggy address belongs to the object at ffff888104a97800 [ 23.920481] which belongs to the cache kmalloc-256 of size 256 [ 23.920897] The buggy address is located 7 bytes to the right of [ 23.920897] allocated 201-byte region [ffff888104a97800, ffff888104a978c9) [ 23.921347] [ 23.921437] The buggy address belongs to the physical page: [ 23.921692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a96 [ 23.922088] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.922412] flags: 0x200000000000040(head|node=0|zone=2) [ 23.922582] page_type: f5(slab) [ 23.922710] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.923133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.923478] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 23.923829] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.924467] head: 0200000000000001 ffffea000412a581 00000000ffffffff 00000000ffffffff [ 23.924860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.925083] page dumped because: kasan: bad access detected [ 23.925246] [ 23.925308] Memory state around the buggy address: [ 23.925597] ffff888104a97780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.925924] ffff888104a97800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.926180] >ffff888104a97880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.926473] ^ [ 23.926646] ffff888104a97900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.927259] ffff888104a97980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.927571] ================================================================== [ 24.102724] ================================================================== [ 24.103129] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 24.103505] Write of size 1 at addr ffff88810587a0da by task kunit_try_catch/211 [ 24.103870] [ 24.104032] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.104169] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.104183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.104206] Call Trace: [ 24.104225] <TASK> [ 24.104256] dump_stack_lvl+0x73/0xb0 [ 24.104289] print_report+0xd1/0x610 [ 24.104339] ? __virt_addr_valid+0x1db/0x2d0 [ 24.104362] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 24.104384] ? kasan_addr_to_slab+0x11/0xa0 [ 24.104415] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 24.104437] kasan_report+0x141/0x180 [ 24.104458] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 24.104485] __asan_report_store1_noabort+0x1b/0x30 [ 24.104534] krealloc_less_oob_helper+0xec6/0x11d0 [ 24.104558] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.104581] ? finish_task_switch.isra.0+0x153/0x700 [ 24.104613] ? __switch_to+0x47/0xf80 [ 24.104638] ? __schedule+0x10cc/0x2b60 [ 24.104696] ? __pfx_read_tsc+0x10/0x10 [ 24.104720] krealloc_large_less_oob+0x1c/0x30 [ 24.104742] kunit_try_run_case+0x1a5/0x480 [ 24.104789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.104809] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.104830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.104882] ? __kthread_parkme+0x82/0x180 [ 24.104902] ? preempt_count_sub+0x50/0x80 [ 24.104923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.104996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.105052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.105077] kthread+0x337/0x6f0 [ 24.105097] ? trace_preempt_on+0x20/0xc0 [ 24.105131] ? __pfx_kthread+0x10/0x10 [ 24.105151] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.105172] ? calculate_sigpending+0x7b/0xa0 [ 24.105196] ? __pfx_kthread+0x10/0x10 [ 24.105216] ret_from_fork+0x116/0x1d0 [ 24.105234] ? __pfx_kthread+0x10/0x10 [ 24.105254] ret_from_fork_asm+0x1a/0x30 [ 24.105301] </TASK> [ 24.105311] [ 24.114523] The buggy address belongs to the physical page: [ 24.115026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105878 [ 24.115339] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.115553] flags: 0x200000000000040(head|node=0|zone=2) [ 24.115881] page_type: f8(unknown) [ 24.116245] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.116722] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.117000] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.117574] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.118002] head: 0200000000000002 ffffea0004161e01 00000000ffffffff 00000000ffffffff [ 24.118250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.118572] page dumped because: kasan: bad access detected [ 24.119229] [ 24.119344] Memory state around the buggy address: [ 24.119616] ffff888105879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.119893] ffff88810587a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.120165] >ffff88810587a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.120578] ^ [ 24.121076] ffff88810587a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.121395] ffff88810587a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.121736] ==================================================================