Date
July 15, 2025, 11:35 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 39.963642] ================================================================== [ 39.970601] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 39.978147] Write of size 1 at addr ffff0008030f84d0 by task kunit_try_catch/239 [ 39.985525] [ 39.987011] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 39.987063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.987079] Hardware name: WinLink E850-96 board (DT) [ 39.987097] Call trace: [ 39.987112] show_stack+0x20/0x38 (C) [ 39.987144] dump_stack_lvl+0x8c/0xd0 [ 39.987178] print_report+0x118/0x5d0 [ 39.987206] kasan_report+0xdc/0x128 [ 39.987231] __asan_report_store1_noabort+0x20/0x30 [ 39.987261] krealloc_less_oob_helper+0xb9c/0xc50 [ 39.987294] krealloc_less_oob+0x20/0x38 [ 39.987325] kunit_try_run_case+0x170/0x3f0 [ 39.987357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.987392] kthread+0x328/0x630 [ 39.987419] ret_from_fork+0x10/0x20 [ 39.987454] [ 40.055576] Allocated by task 239: [ 40.058964] kasan_save_stack+0x3c/0x68 [ 40.062781] kasan_save_track+0x20/0x40 [ 40.066601] kasan_save_alloc_info+0x40/0x58 [ 40.070854] __kasan_krealloc+0x118/0x178 [ 40.074847] krealloc_noprof+0x128/0x360 [ 40.078753] krealloc_less_oob_helper+0x168/0xc50 [ 40.083441] krealloc_less_oob+0x20/0x38 [ 40.087347] kunit_try_run_case+0x170/0x3f0 [ 40.091513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.096982] kthread+0x328/0x630 [ 40.100194] ret_from_fork+0x10/0x20 [ 40.103753] [ 40.105230] The buggy address belongs to the object at ffff0008030f8400 [ 40.105230] which belongs to the cache kmalloc-256 of size 256 [ 40.117730] The buggy address is located 7 bytes to the right of [ 40.117730] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 40.130662] [ 40.132141] The buggy address belongs to the physical page: [ 40.137697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 40.145681] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.153319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.160262] page_type: f5(slab) [ 40.163397] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.171120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.178845] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.186657] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.194470] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 40.202282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.210088] page dumped because: kasan: bad access detected [ 40.215643] [ 40.217119] Memory state around the buggy address: [ 40.221899] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.229103] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.236307] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.243508] ^ [ 40.249327] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.256532] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.263733] ================================================================== [ 40.579009] ================================================================== [ 40.586039] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 40.593591] Write of size 1 at addr ffff0008030f84ea by task kunit_try_catch/239 [ 40.600968] [ 40.602452] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 40.602505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.602521] Hardware name: WinLink E850-96 board (DT) [ 40.602540] Call trace: [ 40.602553] show_stack+0x20/0x38 (C) [ 40.602584] dump_stack_lvl+0x8c/0xd0 [ 40.602616] print_report+0x118/0x5d0 [ 40.602642] kasan_report+0xdc/0x128 [ 40.602667] __asan_report_store1_noabort+0x20/0x30 [ 40.602698] krealloc_less_oob_helper+0xae4/0xc50 [ 40.602730] krealloc_less_oob+0x20/0x38 [ 40.602761] kunit_try_run_case+0x170/0x3f0 [ 40.602789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.602822] kthread+0x328/0x630 [ 40.602848] ret_from_fork+0x10/0x20 [ 40.602877] [ 40.671018] Allocated by task 239: [ 40.674406] kasan_save_stack+0x3c/0x68 [ 40.678223] kasan_save_track+0x20/0x40 [ 40.682044] kasan_save_alloc_info+0x40/0x58 [ 40.686296] __kasan_krealloc+0x118/0x178 [ 40.690289] krealloc_noprof+0x128/0x360 [ 40.694195] krealloc_less_oob_helper+0x168/0xc50 [ 40.698883] krealloc_less_oob+0x20/0x38 [ 40.702789] kunit_try_run_case+0x170/0x3f0 [ 40.706956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.712424] kthread+0x328/0x630 [ 40.715636] ret_from_fork+0x10/0x20 [ 40.719195] [ 40.720671] The buggy address belongs to the object at ffff0008030f8400 [ 40.720671] which belongs to the cache kmalloc-256 of size 256 [ 40.733171] The buggy address is located 33 bytes to the right of [ 40.733171] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 40.746191] [ 40.747669] The buggy address belongs to the physical page: [ 40.753226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 40.761210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.768848] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.775791] page_type: f5(slab) [ 40.778924] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.786650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.794375] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.802186] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.810000] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 40.817811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.825618] page dumped because: kasan: bad access detected [ 40.831174] [ 40.832648] Memory state around the buggy address: [ 40.837427] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.844632] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.851835] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.859037] ^ [ 40.865637] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.872844] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.880043] ================================================================== [ 42.597173] ================================================================== [ 42.604238] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 42.611790] Write of size 1 at addr ffff0008062c60eb by task kunit_try_catch/243 [ 42.619166] [ 42.620650] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.620698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.620712] Hardware name: WinLink E850-96 board (DT) [ 42.620730] Call trace: [ 42.620742] show_stack+0x20/0x38 (C) [ 42.620776] dump_stack_lvl+0x8c/0xd0 [ 42.620808] print_report+0x118/0x5d0 [ 42.620834] kasan_report+0xdc/0x128 [ 42.620864] __asan_report_store1_noabort+0x20/0x30 [ 42.620895] krealloc_less_oob_helper+0xa58/0xc50 [ 42.620927] krealloc_large_less_oob+0x20/0x38 [ 42.620959] kunit_try_run_case+0x170/0x3f0 [ 42.620987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.621020] kthread+0x328/0x630 [ 42.621046] ret_from_fork+0x10/0x20 [ 42.621078] [ 42.689740] The buggy address belongs to the physical page: [ 42.695298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 42.703279] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.710920] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.717863] page_type: f8(unknown) [ 42.721256] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.728980] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.736707] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.744518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.752331] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 42.760143] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.767949] page dumped because: kasan: bad access detected [ 42.773504] [ 42.774980] Memory state around the buggy address: [ 42.779759] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.786963] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.794167] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.801368] ^ [ 42.807969] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.815174] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.822375] ================================================================== [ 42.132586] ================================================================== [ 42.139663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 42.147213] Write of size 1 at addr ffff0008062c60da by task kunit_try_catch/243 [ 42.154590] [ 42.156075] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.156131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.156148] Hardware name: WinLink E850-96 board (DT) [ 42.156166] Call trace: [ 42.156179] show_stack+0x20/0x38 (C) [ 42.156211] dump_stack_lvl+0x8c/0xd0 [ 42.156245] print_report+0x118/0x5d0 [ 42.156273] kasan_report+0xdc/0x128 [ 42.156298] __asan_report_store1_noabort+0x20/0x30 [ 42.156331] krealloc_less_oob_helper+0xa80/0xc50 [ 42.156366] krealloc_large_less_oob+0x20/0x38 [ 42.156397] kunit_try_run_case+0x170/0x3f0 [ 42.156427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.156460] kthread+0x328/0x630 [ 42.156487] ret_from_fork+0x10/0x20 [ 42.156521] [ 42.225164] The buggy address belongs to the physical page: [ 42.230722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 42.238705] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.246345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.253287] page_type: f8(unknown) [ 42.256681] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.264404] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.272130] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.279942] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.287755] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 42.295567] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.303372] page dumped because: kasan: bad access detected [ 42.308928] [ 42.310405] Memory state around the buggy address: [ 42.315185] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.322388] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.329591] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.336792] ^ [ 42.342872] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.350077] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.357279] ================================================================== [ 40.887399] ================================================================== [ 40.894456] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 40.902006] Write of size 1 at addr ffff0008030f84eb by task kunit_try_catch/239 [ 40.909383] [ 40.910868] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 40.910921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.910936] Hardware name: WinLink E850-96 board (DT) [ 40.910956] Call trace: [ 40.910970] show_stack+0x20/0x38 (C) [ 40.911001] dump_stack_lvl+0x8c/0xd0 [ 40.911036] print_report+0x118/0x5d0 [ 40.911062] kasan_report+0xdc/0x128 [ 40.911088] __asan_report_store1_noabort+0x20/0x30 [ 40.911118] krealloc_less_oob_helper+0xa58/0xc50 [ 40.911151] krealloc_less_oob+0x20/0x38 [ 40.911180] kunit_try_run_case+0x170/0x3f0 [ 40.911208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.911239] kthread+0x328/0x630 [ 40.911262] ret_from_fork+0x10/0x20 [ 40.911293] [ 40.979434] Allocated by task 239: [ 40.982820] kasan_save_stack+0x3c/0x68 [ 40.986639] kasan_save_track+0x20/0x40 [ 40.990458] kasan_save_alloc_info+0x40/0x58 [ 40.994712] __kasan_krealloc+0x118/0x178 [ 40.998705] krealloc_noprof+0x128/0x360 [ 41.002611] krealloc_less_oob_helper+0x168/0xc50 [ 41.007298] krealloc_less_oob+0x20/0x38 [ 41.011204] kunit_try_run_case+0x170/0x3f0 [ 41.015371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.020840] kthread+0x328/0x630 [ 41.024052] ret_from_fork+0x10/0x20 [ 41.027610] [ 41.029088] The buggy address belongs to the object at ffff0008030f8400 [ 41.029088] which belongs to the cache kmalloc-256 of size 256 [ 41.041586] The buggy address is located 34 bytes to the right of [ 41.041586] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 41.054606] [ 41.056086] The buggy address belongs to the physical page: [ 41.061642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 41.069625] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.077264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.084208] page_type: f5(slab) [ 41.087341] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.095064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.102790] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.110602] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.118415] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 41.126227] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.134033] page dumped because: kasan: bad access detected [ 41.139588] [ 41.141063] Memory state around the buggy address: [ 41.145843] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.153046] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.160251] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 41.167452] ^ [ 41.174053] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.181258] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.188459] ================================================================== [ 41.666304] ================================================================== [ 41.676389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 41.683939] Write of size 1 at addr ffff0008062c60c9 by task kunit_try_catch/243 [ 41.691316] [ 41.692804] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 41.692859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.692876] Hardware name: WinLink E850-96 board (DT) [ 41.692896] Call trace: [ 41.692911] show_stack+0x20/0x38 (C) [ 41.692946] dump_stack_lvl+0x8c/0xd0 [ 41.692984] print_report+0x118/0x5d0 [ 41.693013] kasan_report+0xdc/0x128 [ 41.693040] __asan_report_store1_noabort+0x20/0x30 [ 41.693073] krealloc_less_oob_helper+0xa48/0xc50 [ 41.693105] krealloc_large_less_oob+0x20/0x38 [ 41.693136] kunit_try_run_case+0x170/0x3f0 [ 41.693168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.693202] kthread+0x328/0x630 [ 41.693230] ret_from_fork+0x10/0x20 [ 41.693263] [ 41.761893] The buggy address belongs to the physical page: [ 41.767448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 41.775431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.783071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.790012] page_type: f8(unknown) [ 41.793411] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.801130] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.808859] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.816667] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.824481] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 41.832292] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.840100] page dumped because: kasan: bad access detected [ 41.845655] [ 41.847130] Memory state around the buggy address: [ 41.851910] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.859113] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.866317] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.873518] ^ [ 41.879077] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.886282] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.893484] ================================================================== [ 41.901051] ================================================================== [ 41.907898] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 41.915445] Write of size 1 at addr ffff0008062c60d0 by task kunit_try_catch/243 [ 41.922822] [ 41.924308] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 41.924363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.924380] Hardware name: WinLink E850-96 board (DT) [ 41.924399] Call trace: [ 41.924413] show_stack+0x20/0x38 (C) [ 41.924446] dump_stack_lvl+0x8c/0xd0 [ 41.924480] print_report+0x118/0x5d0 [ 41.924508] kasan_report+0xdc/0x128 [ 41.924533] __asan_report_store1_noabort+0x20/0x30 [ 41.924565] krealloc_less_oob_helper+0xb9c/0xc50 [ 41.924598] krealloc_large_less_oob+0x20/0x38 [ 41.924632] kunit_try_run_case+0x170/0x3f0 [ 41.924663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.924695] kthread+0x328/0x630 [ 41.924722] ret_from_fork+0x10/0x20 [ 41.924753] [ 41.993397] The buggy address belongs to the physical page: [ 41.998956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 42.006938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.014578] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.021521] page_type: f8(unknown) [ 42.024914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.032637] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.040364] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.048175] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.055987] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 42.063799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.071605] page dumped because: kasan: bad access detected [ 42.077161] [ 42.078637] Memory state around the buggy address: [ 42.083418] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.090619] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.097824] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.105025] ^ [ 42.110844] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.118049] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.125250] ================================================================== [ 40.271112] ================================================================== [ 40.278150] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 40.285698] Write of size 1 at addr ffff0008030f84da by task kunit_try_catch/239 [ 40.293075] [ 40.294558] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 40.294611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.294628] Hardware name: WinLink E850-96 board (DT) [ 40.294646] Call trace: [ 40.294660] show_stack+0x20/0x38 (C) [ 40.294694] dump_stack_lvl+0x8c/0xd0 [ 40.294729] print_report+0x118/0x5d0 [ 40.294757] kasan_report+0xdc/0x128 [ 40.294782] __asan_report_store1_noabort+0x20/0x30 [ 40.294814] krealloc_less_oob_helper+0xa80/0xc50 [ 40.294846] krealloc_less_oob+0x20/0x38 [ 40.294877] kunit_try_run_case+0x170/0x3f0 [ 40.294908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.294942] kthread+0x328/0x630 [ 40.294970] ret_from_fork+0x10/0x20 [ 40.295003] [ 40.363125] Allocated by task 239: [ 40.366511] kasan_save_stack+0x3c/0x68 [ 40.370329] kasan_save_track+0x20/0x40 [ 40.374148] kasan_save_alloc_info+0x40/0x58 [ 40.378401] __kasan_krealloc+0x118/0x178 [ 40.382394] krealloc_noprof+0x128/0x360 [ 40.386301] krealloc_less_oob_helper+0x168/0xc50 [ 40.390988] krealloc_less_oob+0x20/0x38 [ 40.394894] kunit_try_run_case+0x170/0x3f0 [ 40.399061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.404529] kthread+0x328/0x630 [ 40.407741] ret_from_fork+0x10/0x20 [ 40.411300] [ 40.412777] The buggy address belongs to the object at ffff0008030f8400 [ 40.412777] which belongs to the cache kmalloc-256 of size 256 [ 40.425277] The buggy address is located 17 bytes to the right of [ 40.425277] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 40.438296] [ 40.439776] The buggy address belongs to the physical page: [ 40.445332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 40.453315] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.460955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.467898] page_type: f5(slab) [ 40.471034] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.478755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.486482] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.494292] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.502104] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 40.509917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.517724] page dumped because: kasan: bad access detected [ 40.523277] [ 40.524753] Memory state around the buggy address: [ 40.529534] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.536736] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.543941] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.551142] ^ [ 40.557222] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.564426] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.571628] ================================================================== [ 42.364610] ================================================================== [ 42.371691] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 42.379241] Write of size 1 at addr ffff0008062c60ea by task kunit_try_catch/243 [ 42.386619] [ 42.388102] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.388156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.388171] Hardware name: WinLink E850-96 board (DT) [ 42.388187] Call trace: [ 42.388199] show_stack+0x20/0x38 (C) [ 42.388229] dump_stack_lvl+0x8c/0xd0 [ 42.388262] print_report+0x118/0x5d0 [ 42.388288] kasan_report+0xdc/0x128 [ 42.388314] __asan_report_store1_noabort+0x20/0x30 [ 42.388347] krealloc_less_oob_helper+0xae4/0xc50 [ 42.388380] krealloc_large_less_oob+0x20/0x38 [ 42.388412] kunit_try_run_case+0x170/0x3f0 [ 42.388441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.388474] kthread+0x328/0x630 [ 42.388502] ret_from_fork+0x10/0x20 [ 42.388531] [ 42.457191] The buggy address belongs to the physical page: [ 42.462749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 42.470733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.478371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.485314] page_type: f8(unknown) [ 42.488707] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.496432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.504158] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.511969] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.519783] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 42.527594] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.535400] page dumped because: kasan: bad access detected [ 42.540956] [ 42.542431] Memory state around the buggy address: [ 42.547210] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.554414] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.561619] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.568820] ^ [ 42.575421] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.582625] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.589828] ================================================================== [ 39.653995] ================================================================== [ 39.663312] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 39.670862] Write of size 1 at addr ffff0008030f84c9 by task kunit_try_catch/239 [ 39.678238] [ 39.679725] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 39.679783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.679800] Hardware name: WinLink E850-96 board (DT) [ 39.679820] Call trace: [ 39.679833] show_stack+0x20/0x38 (C) [ 39.679870] dump_stack_lvl+0x8c/0xd0 [ 39.679904] print_report+0x118/0x5d0 [ 39.679931] kasan_report+0xdc/0x128 [ 39.679960] __asan_report_store1_noabort+0x20/0x30 [ 39.679992] krealloc_less_oob_helper+0xa48/0xc50 [ 39.680027] krealloc_less_oob+0x20/0x38 [ 39.680056] kunit_try_run_case+0x170/0x3f0 [ 39.680086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.680121] kthread+0x328/0x630 [ 39.680149] ret_from_fork+0x10/0x20 [ 39.680183] [ 39.748292] Allocated by task 239: [ 39.751677] kasan_save_stack+0x3c/0x68 [ 39.755494] kasan_save_track+0x20/0x40 [ 39.759314] kasan_save_alloc_info+0x40/0x58 [ 39.763567] __kasan_krealloc+0x118/0x178 [ 39.767560] krealloc_noprof+0x128/0x360 [ 39.771466] krealloc_less_oob_helper+0x168/0xc50 [ 39.776154] krealloc_less_oob+0x20/0x38 [ 39.780060] kunit_try_run_case+0x170/0x3f0 [ 39.784226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.789695] kthread+0x328/0x630 [ 39.792907] ret_from_fork+0x10/0x20 [ 39.796466] [ 39.797944] The buggy address belongs to the object at ffff0008030f8400 [ 39.797944] which belongs to the cache kmalloc-256 of size 256 [ 39.810445] The buggy address is located 0 bytes to the right of [ 39.810445] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 39.823375] [ 39.824855] The buggy address belongs to the physical page: [ 39.830412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 39.838394] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.846035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.852976] page_type: f5(slab) [ 39.856114] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.863832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.871561] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.879370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.887183] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 39.894995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.902801] page dumped because: kasan: bad access detected [ 39.908356] [ 39.909832] Memory state around the buggy address: [ 39.914614] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.921818] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.929021] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 39.936220] ^ [ 39.941780] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.948985] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.956187] ==================================================================
[ 30.485506] ================================================================== [ 30.485563] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.485634] Write of size 1 at addr fff00000c792eaea by task kunit_try_catch/190 [ 30.485705] [ 30.485734] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.485960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.486675] Hardware name: linux,dummy-virt (DT) [ 30.486774] Call trace: [ 30.486848] show_stack+0x20/0x38 (C) [ 30.486938] dump_stack_lvl+0x8c/0xd0 [ 30.487035] print_report+0x118/0x5d0 [ 30.487136] kasan_report+0xdc/0x128 [ 30.487235] __asan_report_store1_noabort+0x20/0x30 [ 30.487374] krealloc_less_oob_helper+0xae4/0xc50 [ 30.487424] krealloc_less_oob+0x20/0x38 [ 30.487661] kunit_try_run_case+0x170/0x3f0 [ 30.487728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.487839] kthread+0x328/0x630 [ 30.487937] ret_from_fork+0x10/0x20 [ 30.488200] [ 30.488430] Allocated by task 190: [ 30.488512] kasan_save_stack+0x3c/0x68 [ 30.488598] kasan_save_track+0x20/0x40 [ 30.488712] kasan_save_alloc_info+0x40/0x58 [ 30.488778] __kasan_krealloc+0x118/0x178 [ 30.488813] krealloc_noprof+0x128/0x360 [ 30.489082] krealloc_less_oob_helper+0x168/0xc50 [ 30.489179] krealloc_less_oob+0x20/0x38 [ 30.489242] kunit_try_run_case+0x170/0x3f0 [ 30.489279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.489342] kthread+0x328/0x630 [ 30.489383] ret_from_fork+0x10/0x20 [ 30.489418] [ 30.489448] The buggy address belongs to the object at fff00000c792ea00 [ 30.489448] which belongs to the cache kmalloc-256 of size 256 [ 30.489510] The buggy address is located 33 bytes to the right of [ 30.489510] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.489572] [ 30.489599] The buggy address belongs to the physical page: [ 30.489662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.489763] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.489901] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.489957] page_type: f5(slab) [ 30.489994] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.490041] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.490123] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.490171] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.490325] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.490413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.490503] page dumped because: kasan: bad access detected [ 30.490580] [ 30.490641] Memory state around the buggy address: [ 30.490723] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.490834] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.490907] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.490943] ^ [ 30.490997] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.491042] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.491131] ================================================================== [ 30.514263] ================================================================== [ 30.514319] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.514374] Write of size 1 at addr fff00000c9a5a0c9 by task kunit_try_catch/194 [ 30.514421] [ 30.514536] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.514733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.514814] Hardware name: linux,dummy-virt (DT) [ 30.514878] Call trace: [ 30.514986] show_stack+0x20/0x38 (C) [ 30.515126] dump_stack_lvl+0x8c/0xd0 [ 30.515271] print_report+0x118/0x5d0 [ 30.515398] kasan_report+0xdc/0x128 [ 30.515463] __asan_report_store1_noabort+0x20/0x30 [ 30.515512] krealloc_less_oob_helper+0xa48/0xc50 [ 30.515562] krealloc_large_less_oob+0x20/0x38 [ 30.515610] kunit_try_run_case+0x170/0x3f0 [ 30.515961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.516101] kthread+0x328/0x630 [ 30.516185] ret_from_fork+0x10/0x20 [ 30.516317] [ 30.516375] The buggy address belongs to the physical page: [ 30.516432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.516522] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.516577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.516673] page_type: f8(unknown) [ 30.516762] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.516819] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.516893] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.517204] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.517309] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.517403] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.517459] page dumped because: kasan: bad access detected [ 30.517685] [ 30.517868] Memory state around the buggy address: [ 30.517943] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.518091] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.518170] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.518245] ^ [ 30.518319] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.518366] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.518476] ================================================================== [ 30.475992] ================================================================== [ 30.476081] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.476133] Write of size 1 at addr fff00000c792ead0 by task kunit_try_catch/190 [ 30.476186] [ 30.476320] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.476575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.476604] Hardware name: linux,dummy-virt (DT) [ 30.476633] Call trace: [ 30.476663] show_stack+0x20/0x38 (C) [ 30.476723] dump_stack_lvl+0x8c/0xd0 [ 30.476895] print_report+0x118/0x5d0 [ 30.477003] kasan_report+0xdc/0x128 [ 30.477055] __asan_report_store1_noabort+0x20/0x30 [ 30.477109] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.477291] krealloc_less_oob+0x20/0x38 [ 30.477346] kunit_try_run_case+0x170/0x3f0 [ 30.477390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.477452] kthread+0x328/0x630 [ 30.477493] ret_from_fork+0x10/0x20 [ 30.477662] [ 30.477682] Allocated by task 190: [ 30.477799] kasan_save_stack+0x3c/0x68 [ 30.477852] kasan_save_track+0x20/0x40 [ 30.477921] kasan_save_alloc_info+0x40/0x58 [ 30.477989] __kasan_krealloc+0x118/0x178 [ 30.478026] krealloc_noprof+0x128/0x360 [ 30.478134] krealloc_less_oob_helper+0x168/0xc50 [ 30.478219] krealloc_less_oob+0x20/0x38 [ 30.478343] kunit_try_run_case+0x170/0x3f0 [ 30.478505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.478604] kthread+0x328/0x630 [ 30.478681] ret_from_fork+0x10/0x20 [ 30.478778] [ 30.478799] The buggy address belongs to the object at fff00000c792ea00 [ 30.478799] which belongs to the cache kmalloc-256 of size 256 [ 30.478854] The buggy address is located 7 bytes to the right of [ 30.478854] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.478931] [ 30.478951] The buggy address belongs to the physical page: [ 30.479328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.479477] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.479530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.479647] page_type: f5(slab) [ 30.479784] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.479869] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.479955] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.480064] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.480198] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.480246] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.480304] page dumped because: kasan: bad access detected [ 30.480523] [ 30.480665] Memory state around the buggy address: [ 30.480739] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.480822] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.480863] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.480919] ^ [ 30.480962] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.481005] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.481041] ================================================================== [ 30.525322] ================================================================== [ 30.525356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.525426] Write of size 1 at addr fff00000c9a5a0ea by task kunit_try_catch/194 [ 30.525540] [ 30.525567] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.525659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.525684] Hardware name: linux,dummy-virt (DT) [ 30.525712] Call trace: [ 30.525889] show_stack+0x20/0x38 (C) [ 30.525937] dump_stack_lvl+0x8c/0xd0 [ 30.526107] print_report+0x118/0x5d0 [ 30.526287] kasan_report+0xdc/0x128 [ 30.526407] __asan_report_store1_noabort+0x20/0x30 [ 30.526534] krealloc_less_oob_helper+0xae4/0xc50 [ 30.526664] krealloc_large_less_oob+0x20/0x38 [ 30.526796] kunit_try_run_case+0x170/0x3f0 [ 30.526926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.527064] kthread+0x328/0x630 [ 30.527124] ret_from_fork+0x10/0x20 [ 30.527180] [ 30.527429] The buggy address belongs to the physical page: [ 30.527531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.527674] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.527781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.527925] page_type: f8(unknown) [ 30.527990] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.528076] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.528188] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.528311] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.528360] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.528606] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.528818] page dumped because: kasan: bad access detected [ 30.528918] [ 30.528995] Memory state around the buggy address: [ 30.529128] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.529233] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.529330] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.529379] ^ [ 30.529454] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.529572] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.529609] ================================================================== [ 30.519129] ================================================================== [ 30.519174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.519227] Write of size 1 at addr fff00000c9a5a0d0 by task kunit_try_catch/194 [ 30.519273] [ 30.519309] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.519388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.519413] Hardware name: linux,dummy-virt (DT) [ 30.519459] Call trace: [ 30.519479] show_stack+0x20/0x38 (C) [ 30.519526] dump_stack_lvl+0x8c/0xd0 [ 30.519725] print_report+0x118/0x5d0 [ 30.519790] kasan_report+0xdc/0x128 [ 30.519839] __asan_report_store1_noabort+0x20/0x30 [ 30.519889] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.519938] krealloc_large_less_oob+0x20/0x38 [ 30.519995] kunit_try_run_case+0x170/0x3f0 [ 30.520041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.520092] kthread+0x328/0x630 [ 30.520136] ret_from_fork+0x10/0x20 [ 30.520183] [ 30.520202] The buggy address belongs to the physical page: [ 30.520237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.520288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.520335] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.520383] page_type: f8(unknown) [ 30.520420] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.520766] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.520826] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.520978] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.521036] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.521094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.521170] page dumped because: kasan: bad access detected [ 30.521201] [ 30.521218] Memory state around the buggy address: [ 30.521264] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.521322] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.521420] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.521475] ^ [ 30.521511] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.521611] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.521704] ================================================================== [ 30.522364] ================================================================== [ 30.522408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.522508] Write of size 1 at addr fff00000c9a5a0da by task kunit_try_catch/194 [ 30.522574] [ 30.522631] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.522711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.522762] Hardware name: linux,dummy-virt (DT) [ 30.522809] Call trace: [ 30.522873] show_stack+0x20/0x38 (C) [ 30.522939] dump_stack_lvl+0x8c/0xd0 [ 30.523004] print_report+0x118/0x5d0 [ 30.523068] kasan_report+0xdc/0x128 [ 30.523139] __asan_report_store1_noabort+0x20/0x30 [ 30.523188] krealloc_less_oob_helper+0xa80/0xc50 [ 30.523237] krealloc_large_less_oob+0x20/0x38 [ 30.523284] kunit_try_run_case+0x170/0x3f0 [ 30.523503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.523565] kthread+0x328/0x630 [ 30.523689] ret_from_fork+0x10/0x20 [ 30.523755] [ 30.523804] The buggy address belongs to the physical page: [ 30.523876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.523928] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.523972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.524019] page_type: f8(unknown) [ 30.524055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.524140] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.524207] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.524262] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.524337] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.524671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.524788] page dumped because: kasan: bad access detected [ 30.524836] [ 30.524875] Memory state around the buggy address: [ 30.524923] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.524965] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.525042] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.525079] ^ [ 30.525113] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.525181] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.525245] ================================================================== [ 30.470901] ================================================================== [ 30.470960] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.471030] Write of size 1 at addr fff00000c792eac9 by task kunit_try_catch/190 [ 30.471158] [ 30.471192] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.471274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.471299] Hardware name: linux,dummy-virt (DT) [ 30.471329] Call trace: [ 30.471350] show_stack+0x20/0x38 (C) [ 30.471397] dump_stack_lvl+0x8c/0xd0 [ 30.471485] print_report+0x118/0x5d0 [ 30.471528] kasan_report+0xdc/0x128 [ 30.471572] __asan_report_store1_noabort+0x20/0x30 [ 30.471622] krealloc_less_oob_helper+0xa48/0xc50 [ 30.471853] krealloc_less_oob+0x20/0x38 [ 30.472001] kunit_try_run_case+0x170/0x3f0 [ 30.472058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.472151] kthread+0x328/0x630 [ 30.472279] ret_from_fork+0x10/0x20 [ 30.472409] [ 30.472532] Allocated by task 190: [ 30.472603] kasan_save_stack+0x3c/0x68 [ 30.472656] kasan_save_track+0x20/0x40 [ 30.472694] kasan_save_alloc_info+0x40/0x58 [ 30.472730] __kasan_krealloc+0x118/0x178 [ 30.472765] krealloc_noprof+0x128/0x360 [ 30.472814] krealloc_less_oob_helper+0x168/0xc50 [ 30.472863] krealloc_less_oob+0x20/0x38 [ 30.472900] kunit_try_run_case+0x170/0x3f0 [ 30.472935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.472977] kthread+0x328/0x630 [ 30.473021] ret_from_fork+0x10/0x20 [ 30.473065] [ 30.473084] The buggy address belongs to the object at fff00000c792ea00 [ 30.473084] which belongs to the cache kmalloc-256 of size 256 [ 30.473148] The buggy address is located 0 bytes to the right of [ 30.473148] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.473209] [ 30.473228] The buggy address belongs to the physical page: [ 30.473260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.473333] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.473405] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.473467] page_type: f5(slab) [ 30.473505] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.473552] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.473599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.473646] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.473719] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.474079] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.474210] page dumped because: kasan: bad access detected [ 30.474309] [ 30.474460] Memory state around the buggy address: [ 30.474590] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.474659] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.474727] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.474832] ^ [ 30.475046] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475092] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475132] ================================================================== [ 30.492491] ================================================================== [ 30.492545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.492595] Write of size 1 at addr fff00000c792eaeb by task kunit_try_catch/190 [ 30.492642] [ 30.492679] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.492760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.492785] Hardware name: linux,dummy-virt (DT) [ 30.492982] Call trace: [ 30.493044] show_stack+0x20/0x38 (C) [ 30.493098] dump_stack_lvl+0x8c/0xd0 [ 30.493145] print_report+0x118/0x5d0 [ 30.493198] kasan_report+0xdc/0x128 [ 30.493242] __asan_report_store1_noabort+0x20/0x30 [ 30.493290] krealloc_less_oob_helper+0xa58/0xc50 [ 30.493339] krealloc_less_oob+0x20/0x38 [ 30.493385] kunit_try_run_case+0x170/0x3f0 [ 30.493462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.493514] kthread+0x328/0x630 [ 30.493554] ret_from_fork+0x10/0x20 [ 30.493611] [ 30.493676] Allocated by task 190: [ 30.493704] kasan_save_stack+0x3c/0x68 [ 30.494022] kasan_save_track+0x20/0x40 [ 30.494136] kasan_save_alloc_info+0x40/0x58 [ 30.494176] __kasan_krealloc+0x118/0x178 [ 30.494211] krealloc_noprof+0x128/0x360 [ 30.494275] krealloc_less_oob_helper+0x168/0xc50 [ 30.494316] krealloc_less_oob+0x20/0x38 [ 30.494352] kunit_try_run_case+0x170/0x3f0 [ 30.494626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.494745] kthread+0x328/0x630 [ 30.494816] ret_from_fork+0x10/0x20 [ 30.494918] [ 30.494987] The buggy address belongs to the object at fff00000c792ea00 [ 30.494987] which belongs to the cache kmalloc-256 of size 256 [ 30.495043] The buggy address is located 34 bytes to the right of [ 30.495043] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.495368] [ 30.495501] The buggy address belongs to the physical page: [ 30.495646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.495715] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.495759] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.496082] page_type: f5(slab) [ 30.496172] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.496269] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.496363] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.496415] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.496478] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.496534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.496573] page dumped because: kasan: bad access detected [ 30.496605] [ 30.496622] Memory state around the buggy address: [ 30.496652] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.496692] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.496733] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.496768] ^ [ 30.496812] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.496868] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.496913] ================================================================== [ 30.481732] ================================================================== [ 30.481777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.481896] Write of size 1 at addr fff00000c792eada by task kunit_try_catch/190 [ 30.482045] [ 30.482081] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.482272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.482319] Hardware name: linux,dummy-virt (DT) [ 30.482349] Call trace: [ 30.482369] show_stack+0x20/0x38 (C) [ 30.482419] dump_stack_lvl+0x8c/0xd0 [ 30.482482] print_report+0x118/0x5d0 [ 30.482525] kasan_report+0xdc/0x128 [ 30.482585] __asan_report_store1_noabort+0x20/0x30 [ 30.482660] krealloc_less_oob_helper+0xa80/0xc50 [ 30.482715] krealloc_less_oob+0x20/0x38 [ 30.482782] kunit_try_run_case+0x170/0x3f0 [ 30.482846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.482909] kthread+0x328/0x630 [ 30.482950] ret_from_fork+0x10/0x20 [ 30.482997] [ 30.483015] Allocated by task 190: [ 30.483064] kasan_save_stack+0x3c/0x68 [ 30.483105] kasan_save_track+0x20/0x40 [ 30.483187] kasan_save_alloc_info+0x40/0x58 [ 30.483318] __kasan_krealloc+0x118/0x178 [ 30.483373] krealloc_noprof+0x128/0x360 [ 30.483472] krealloc_less_oob_helper+0x168/0xc50 [ 30.483552] krealloc_less_oob+0x20/0x38 [ 30.483608] kunit_try_run_case+0x170/0x3f0 [ 30.483645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.483750] kthread+0x328/0x630 [ 30.483808] ret_from_fork+0x10/0x20 [ 30.483843] [ 30.483892] The buggy address belongs to the object at fff00000c792ea00 [ 30.483892] which belongs to the cache kmalloc-256 of size 256 [ 30.483948] The buggy address is located 17 bytes to the right of [ 30.483948] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.484009] [ 30.484027] The buggy address belongs to the physical page: [ 30.484076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.484178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.484223] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.484298] page_type: f5(slab) [ 30.484366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.484415] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.484561] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.484704] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.484758] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.484823] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.484919] page dumped because: kasan: bad access detected [ 30.484956] [ 30.484974] Memory state around the buggy address: [ 30.485031] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485117] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.485196] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.485232] ^ [ 30.485267] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485306] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485342] ================================================================== [ 30.530847] ================================================================== [ 30.530897] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.531238] Write of size 1 at addr fff00000c9a5a0eb by task kunit_try_catch/194 [ 30.531350] [ 30.531384] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.531519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.531545] Hardware name: linux,dummy-virt (DT) [ 30.531574] Call trace: [ 30.531612] show_stack+0x20/0x38 (C) [ 30.531675] dump_stack_lvl+0x8c/0xd0 [ 30.531740] print_report+0x118/0x5d0 [ 30.531784] kasan_report+0xdc/0x128 [ 30.531831] __asan_report_store1_noabort+0x20/0x30 [ 30.531899] krealloc_less_oob_helper+0xa58/0xc50 [ 30.531949] krealloc_large_less_oob+0x20/0x38 [ 30.531997] kunit_try_run_case+0x170/0x3f0 [ 30.532042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.532092] kthread+0x328/0x630 [ 30.532143] ret_from_fork+0x10/0x20 [ 30.532190] [ 30.532208] The buggy address belongs to the physical page: [ 30.532237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.532287] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.532331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.532378] page_type: f8(unknown) [ 30.532413] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.532471] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.532518] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.532564] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.532611] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.532657] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.532694] page dumped because: kasan: bad access detected [ 30.532723] [ 30.532751] Memory state around the buggy address: [ 30.532780] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.532820] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.532860] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.532895] ^ [ 30.532930] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.532969] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.533005] ==================================================================
[ 23.972352] ================================================================== [ 23.972871] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 23.973230] Write of size 1 at addr ffff8881049420eb by task kunit_try_catch/210 [ 23.973567] [ 23.973709] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.973758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.973771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.973792] Call Trace: [ 23.973805] <TASK> [ 23.973821] dump_stack_lvl+0x73/0xb0 [ 23.973855] print_report+0xd1/0x610 [ 23.973881] ? __virt_addr_valid+0x1db/0x2d0 [ 23.973910] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.973938] ? kasan_addr_to_slab+0x11/0xa0 [ 23.973963] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.973991] kasan_report+0x141/0x180 [ 23.974018] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.974053] __asan_report_store1_noabort+0x1b/0x30 [ 23.974081] krealloc_less_oob_helper+0xd47/0x11d0 [ 23.974112] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.974141] ? finish_task_switch.isra.0+0x153/0x700 [ 23.974167] ? __switch_to+0x47/0xf80 [ 23.974199] ? __schedule+0x10cc/0x2b60 [ 23.974228] ? __pfx_read_tsc+0x10/0x10 [ 23.974259] krealloc_large_less_oob+0x1c/0x30 [ 23.974286] kunit_try_run_case+0x1a5/0x480 [ 23.974315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.974341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.974368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.974395] ? __kthread_parkme+0x82/0x180 [ 23.974421] ? preempt_count_sub+0x50/0x80 [ 23.974449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.974481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.974512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.974553] kthread+0x337/0x6f0 [ 23.974577] ? trace_preempt_on+0x20/0xc0 [ 23.974605] ? __pfx_kthread+0x10/0x10 [ 23.974631] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.974672] ? calculate_sigpending+0x7b/0xa0 [ 23.974701] ? __pfx_kthread+0x10/0x10 [ 23.974729] ret_from_fork+0x116/0x1d0 [ 23.974752] ? __pfx_kthread+0x10/0x10 [ 23.974777] ret_from_fork_asm+0x1a/0x30 [ 23.974818] </TASK> [ 23.974830] [ 23.982038] The buggy address belongs to the physical page: [ 23.982301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104940 [ 23.982776] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.983039] flags: 0x200000000000040(head|node=0|zone=2) [ 23.983220] page_type: f8(unknown) [ 23.983393] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.983927] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.984288] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.984597] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.984949] head: 0200000000000002 ffffea0004125001 00000000ffffffff 00000000ffffffff [ 23.985281] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.985535] page dumped because: kasan: bad access detected [ 23.985705] [ 23.985772] Memory state around the buggy address: [ 23.985926] ffff888104941f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.986199] ffff888104942000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.986514] >ffff888104942080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.986878] ^ [ 23.987145] ffff888104942100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.987361] ffff888104942180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.987703] ================================================================== [ 23.838669] ================================================================== [ 23.838906] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 23.839325] Write of size 1 at addr ffff8881009a90eb by task kunit_try_catch/206 [ 23.839998] [ 23.840110] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.840156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.840167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.840186] Call Trace: [ 23.840202] <TASK> [ 23.840215] dump_stack_lvl+0x73/0xb0 [ 23.840244] print_report+0xd1/0x610 [ 23.840266] ? __virt_addr_valid+0x1db/0x2d0 [ 23.840288] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.840311] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.840336] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.840359] kasan_report+0x141/0x180 [ 23.840380] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 23.840408] __asan_report_store1_noabort+0x1b/0x30 [ 23.840432] krealloc_less_oob_helper+0xd47/0x11d0 [ 23.840457] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.840480] ? finish_task_switch.isra.0+0x153/0x700 [ 23.840501] ? __switch_to+0x47/0xf80 [ 23.840540] ? __schedule+0x10cc/0x2b60 [ 23.840561] ? __pfx_read_tsc+0x10/0x10 [ 23.840586] krealloc_less_oob+0x1c/0x30 [ 23.840607] kunit_try_run_case+0x1a5/0x480 [ 23.840629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.840650] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.840672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.840693] ? __kthread_parkme+0x82/0x180 [ 23.840713] ? preempt_count_sub+0x50/0x80 [ 23.840735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.840757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.840783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.840808] kthread+0x337/0x6f0 [ 23.840827] ? trace_preempt_on+0x20/0xc0 [ 23.840850] ? __pfx_kthread+0x10/0x10 [ 23.840870] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.840985] ? calculate_sigpending+0x7b/0xa0 [ 23.841010] ? __pfx_kthread+0x10/0x10 [ 23.841032] ret_from_fork+0x116/0x1d0 [ 23.841051] ? __pfx_kthread+0x10/0x10 [ 23.841071] ret_from_fork_asm+0x1a/0x30 [ 23.841104] </TASK> [ 23.841114] [ 23.848241] Allocated by task 206: [ 23.848407] kasan_save_stack+0x45/0x70 [ 23.848586] kasan_save_track+0x18/0x40 [ 23.848740] kasan_save_alloc_info+0x3b/0x50 [ 23.848883] __kasan_krealloc+0x190/0x1f0 [ 23.849016] krealloc_noprof+0xf3/0x340 [ 23.849147] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.849373] krealloc_less_oob+0x1c/0x30 [ 23.849571] kunit_try_run_case+0x1a5/0x480 [ 23.849857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.850151] kthread+0x337/0x6f0 [ 23.850266] ret_from_fork+0x116/0x1d0 [ 23.850391] ret_from_fork_asm+0x1a/0x30 [ 23.850539] [ 23.850602] The buggy address belongs to the object at ffff8881009a9000 [ 23.850602] which belongs to the cache kmalloc-256 of size 256 [ 23.851102] The buggy address is located 34 bytes to the right of [ 23.851102] allocated 201-byte region [ffff8881009a9000, ffff8881009a90c9) [ 23.851656] [ 23.851744] The buggy address belongs to the physical page: [ 23.852156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8 [ 23.852402] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.852771] anon flags: 0x200000000000040(head|node=0|zone=2) [ 23.852960] page_type: f5(slab) [ 23.853119] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.853455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.854002] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.854404] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.854772] head: 0200000000000001 ffffea0004026a01 00000000ffffffff 00000000ffffffff [ 23.855136] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.855360] page dumped because: kasan: bad access detected [ 23.855548] [ 23.855669] Memory state around the buggy address: [ 23.855883] ffff8881009a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.856195] ffff8881009a9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.856508] >ffff8881009a9080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.856944] ^ [ 23.857145] ffff8881009a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.857354] ffff8881009a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.857571] ================================================================== [ 23.922898] ================================================================== [ 23.923154] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 23.923394] Write of size 1 at addr ffff8881049420d0 by task kunit_try_catch/210 [ 23.923727] [ 23.923840] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.923887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.923900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.923921] Call Trace: [ 23.923934] <TASK> [ 23.923949] dump_stack_lvl+0x73/0xb0 [ 23.923979] print_report+0xd1/0x610 [ 23.924006] ? __virt_addr_valid+0x1db/0x2d0 [ 23.924033] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.924060] ? kasan_addr_to_slab+0x11/0xa0 [ 23.924085] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.924113] kasan_report+0x141/0x180 [ 23.924140] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.924175] __asan_report_store1_noabort+0x1b/0x30 [ 23.924203] krealloc_less_oob_helper+0xe23/0x11d0 [ 23.924234] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.924262] ? finish_task_switch.isra.0+0x153/0x700 [ 23.924417] ? __switch_to+0x47/0xf80 [ 23.924453] ? __schedule+0x10cc/0x2b60 [ 23.924480] ? __pfx_read_tsc+0x10/0x10 [ 23.924510] krealloc_large_less_oob+0x1c/0x30 [ 23.924551] kunit_try_run_case+0x1a5/0x480 [ 23.924579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.924605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.924632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.924659] ? __kthread_parkme+0x82/0x180 [ 23.924684] ? preempt_count_sub+0x50/0x80 [ 23.924713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.924740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.924771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.924802] kthread+0x337/0x6f0 [ 23.924826] ? trace_preempt_on+0x20/0xc0 [ 23.924853] ? __pfx_kthread+0x10/0x10 [ 23.924879] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.924908] ? calculate_sigpending+0x7b/0xa0 [ 23.924936] ? __pfx_kthread+0x10/0x10 [ 23.924963] ret_from_fork+0x116/0x1d0 [ 23.924987] ? __pfx_kthread+0x10/0x10 [ 23.925012] ret_from_fork_asm+0x1a/0x30 [ 23.925105] </TASK> [ 23.925117] [ 23.932955] The buggy address belongs to the physical page: [ 23.933192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104940 [ 23.933497] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.933917] flags: 0x200000000000040(head|node=0|zone=2) [ 23.934168] page_type: f8(unknown) [ 23.934321] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.934734] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.935129] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.935456] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.935851] head: 0200000000000002 ffffea0004125001 00000000ffffffff 00000000ffffffff [ 23.936135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.936469] page dumped because: kasan: bad access detected [ 23.936715] [ 23.936792] Memory state around the buggy address: [ 23.936945] ffff888104941f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.937261] ffff888104942000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.937725] >ffff888104942080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.938020] ^ [ 23.938253] ffff888104942100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.938558] ffff888104942180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.938924] ================================================================== [ 23.729045] ================================================================== [ 23.729567] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 23.729906] Write of size 1 at addr ffff8881009a90c9 by task kunit_try_catch/206 [ 23.730498] [ 23.730658] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.730711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.730723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.730745] Call Trace: [ 23.730757] <TASK> [ 23.730989] dump_stack_lvl+0x73/0xb0 [ 23.731064] print_report+0xd1/0x610 [ 23.731089] ? __virt_addr_valid+0x1db/0x2d0 [ 23.731115] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.731147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.731173] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.731197] kasan_report+0x141/0x180 [ 23.731219] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.731247] __asan_report_store1_noabort+0x1b/0x30 [ 23.731271] krealloc_less_oob_helper+0xd70/0x11d0 [ 23.731296] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.731320] ? finish_task_switch.isra.0+0x153/0x700 [ 23.731342] ? __switch_to+0x47/0xf80 [ 23.731369] ? __schedule+0x10cc/0x2b60 [ 23.731392] ? __pfx_read_tsc+0x10/0x10 [ 23.731417] krealloc_less_oob+0x1c/0x30 [ 23.731438] kunit_try_run_case+0x1a5/0x480 [ 23.731462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.731482] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.731505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.731536] ? __kthread_parkme+0x82/0x180 [ 23.731560] ? preempt_count_sub+0x50/0x80 [ 23.731651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.731675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.731702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.731728] kthread+0x337/0x6f0 [ 23.731747] ? trace_preempt_on+0x20/0xc0 [ 23.731772] ? __pfx_kthread+0x10/0x10 [ 23.731793] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.731818] ? calculate_sigpending+0x7b/0xa0 [ 23.731842] ? __pfx_kthread+0x10/0x10 [ 23.731863] ret_from_fork+0x116/0x1d0 [ 23.731883] ? __pfx_kthread+0x10/0x10 [ 23.731903] ret_from_fork_asm+0x1a/0x30 [ 23.731936] </TASK> [ 23.731947] [ 23.742253] Allocated by task 206: [ 23.742703] kasan_save_stack+0x45/0x70 [ 23.743219] kasan_save_track+0x18/0x40 [ 23.743669] kasan_save_alloc_info+0x3b/0x50 [ 23.744162] __kasan_krealloc+0x190/0x1f0 [ 23.744562] krealloc_noprof+0xf3/0x340 [ 23.745002] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.745555] krealloc_less_oob+0x1c/0x30 [ 23.745955] kunit_try_run_case+0x1a5/0x480 [ 23.746376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.746944] kthread+0x337/0x6f0 [ 23.747287] ret_from_fork+0x116/0x1d0 [ 23.747734] ret_from_fork_asm+0x1a/0x30 [ 23.748146] [ 23.748340] The buggy address belongs to the object at ffff8881009a9000 [ 23.748340] which belongs to the cache kmalloc-256 of size 256 [ 23.749397] The buggy address is located 0 bytes to the right of [ 23.749397] allocated 201-byte region [ffff8881009a9000, ffff8881009a90c9) [ 23.750047] [ 23.750204] The buggy address belongs to the physical page: [ 23.750774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8 [ 23.751614] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.752335] anon flags: 0x200000000000040(head|node=0|zone=2) [ 23.752981] page_type: f5(slab) [ 23.753280] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.753507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.753974] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.754772] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.755549] head: 0200000000000001 ffffea0004026a01 00000000ffffffff 00000000ffffffff [ 23.756307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.757098] page dumped because: kasan: bad access detected [ 23.757698] [ 23.757775] Memory state around the buggy address: [ 23.757923] ffff8881009a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.758159] ffff8881009a9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.758887] >ffff8881009a9080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.759667] ^ [ 23.760218] ffff8881009a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.761073] ffff8881009a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.761742] ================================================================== [ 23.790541] ================================================================== [ 23.791068] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 23.791434] Write of size 1 at addr ffff8881009a90da by task kunit_try_catch/206 [ 23.791800] [ 23.792023] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.792073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.792084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.792104] Call Trace: [ 23.792117] <TASK> [ 23.792131] dump_stack_lvl+0x73/0xb0 [ 23.792158] print_report+0xd1/0x610 [ 23.792181] ? __virt_addr_valid+0x1db/0x2d0 [ 23.792202] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.792225] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.792250] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.792273] kasan_report+0x141/0x180 [ 23.792295] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.792323] __asan_report_store1_noabort+0x1b/0x30 [ 23.792347] krealloc_less_oob_helper+0xec6/0x11d0 [ 23.792373] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.792396] ? finish_task_switch.isra.0+0x153/0x700 [ 23.792417] ? __switch_to+0x47/0xf80 [ 23.792442] ? __schedule+0x10cc/0x2b60 [ 23.792464] ? __pfx_read_tsc+0x10/0x10 [ 23.792487] krealloc_less_oob+0x1c/0x30 [ 23.792508] kunit_try_run_case+0x1a5/0x480 [ 23.792543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.792564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.792789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.792827] ? __kthread_parkme+0x82/0x180 [ 23.792848] ? preempt_count_sub+0x50/0x80 [ 23.792871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.792894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.792920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.792946] kthread+0x337/0x6f0 [ 23.792965] ? trace_preempt_on+0x20/0xc0 [ 23.792988] ? __pfx_kthread+0x10/0x10 [ 23.793008] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.793032] ? calculate_sigpending+0x7b/0xa0 [ 23.793055] ? __pfx_kthread+0x10/0x10 [ 23.793076] ret_from_fork+0x116/0x1d0 [ 23.793095] ? __pfx_kthread+0x10/0x10 [ 23.793115] ret_from_fork_asm+0x1a/0x30 [ 23.793147] </TASK> [ 23.793157] [ 23.801086] Allocated by task 206: [ 23.801209] kasan_save_stack+0x45/0x70 [ 23.801386] kasan_save_track+0x18/0x40 [ 23.801592] kasan_save_alloc_info+0x3b/0x50 [ 23.801793] __kasan_krealloc+0x190/0x1f0 [ 23.801997] krealloc_noprof+0xf3/0x340 [ 23.802329] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.802494] krealloc_less_oob+0x1c/0x30 [ 23.802640] kunit_try_run_case+0x1a5/0x480 [ 23.802836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.803113] kthread+0x337/0x6f0 [ 23.803382] ret_from_fork+0x116/0x1d0 [ 23.803511] ret_from_fork_asm+0x1a/0x30 [ 23.803901] [ 23.804010] The buggy address belongs to the object at ffff8881009a9000 [ 23.804010] which belongs to the cache kmalloc-256 of size 256 [ 23.804545] The buggy address is located 17 bytes to the right of [ 23.804545] allocated 201-byte region [ffff8881009a9000, ffff8881009a90c9) [ 23.805093] [ 23.805205] The buggy address belongs to the physical page: [ 23.805420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8 [ 23.805928] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.806196] anon flags: 0x200000000000040(head|node=0|zone=2) [ 23.806380] page_type: f5(slab) [ 23.806550] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.807134] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.807611] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.807841] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.808334] head: 0200000000000001 ffffea0004026a01 00000000ffffffff 00000000ffffffff [ 23.808770] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.809237] page dumped because: kasan: bad access detected [ 23.809442] [ 23.809513] Memory state around the buggy address: [ 23.810010] ffff8881009a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.810282] ffff8881009a9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.810575] >ffff8881009a9080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.811020] ^ [ 23.811207] ffff8881009a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.811529] ffff8881009a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.812020] ================================================================== [ 23.812430] ================================================================== [ 23.812791] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 23.813184] Write of size 1 at addr ffff8881009a90ea by task kunit_try_catch/206 [ 23.813542] [ 23.813692] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.813738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.813750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.813769] Call Trace: [ 23.814319] <TASK> [ 23.814346] dump_stack_lvl+0x73/0xb0 [ 23.814437] print_report+0xd1/0x610 [ 23.814476] ? __virt_addr_valid+0x1db/0x2d0 [ 23.814501] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.814535] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.814562] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.814740] kasan_report+0x141/0x180 [ 23.814767] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.814795] __asan_report_store1_noabort+0x1b/0x30 [ 23.814819] krealloc_less_oob_helper+0xe90/0x11d0 [ 23.814847] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.814873] ? finish_task_switch.isra.0+0x153/0x700 [ 23.814897] ? __switch_to+0x47/0xf80 [ 23.814923] ? __schedule+0x10cc/0x2b60 [ 23.814945] ? __pfx_read_tsc+0x10/0x10 [ 23.814970] krealloc_less_oob+0x1c/0x30 [ 23.814992] kunit_try_run_case+0x1a5/0x480 [ 23.815015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.815036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.815057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.815080] ? __kthread_parkme+0x82/0x180 [ 23.815100] ? preempt_count_sub+0x50/0x80 [ 23.815123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.815146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.815172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.815198] kthread+0x337/0x6f0 [ 23.815217] ? trace_preempt_on+0x20/0xc0 [ 23.815240] ? __pfx_kthread+0x10/0x10 [ 23.815260] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.815284] ? calculate_sigpending+0x7b/0xa0 [ 23.815307] ? __pfx_kthread+0x10/0x10 [ 23.815328] ret_from_fork+0x116/0x1d0 [ 23.815347] ? __pfx_kthread+0x10/0x10 [ 23.815367] ret_from_fork_asm+0x1a/0x30 [ 23.815398] </TASK> [ 23.815409] [ 23.828859] Allocated by task 206: [ 23.829017] kasan_save_stack+0x45/0x70 [ 23.829196] kasan_save_track+0x18/0x40 [ 23.829359] kasan_save_alloc_info+0x3b/0x50 [ 23.829570] __kasan_krealloc+0x190/0x1f0 [ 23.829786] krealloc_noprof+0xf3/0x340 [ 23.829958] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.830174] krealloc_less_oob+0x1c/0x30 [ 23.830347] kunit_try_run_case+0x1a5/0x480 [ 23.830543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.830750] kthread+0x337/0x6f0 [ 23.830862] ret_from_fork+0x116/0x1d0 [ 23.830985] ret_from_fork_asm+0x1a/0x30 [ 23.831144] [ 23.831230] The buggy address belongs to the object at ffff8881009a9000 [ 23.831230] which belongs to the cache kmalloc-256 of size 256 [ 23.831824] The buggy address is located 33 bytes to the right of [ 23.831824] allocated 201-byte region [ffff8881009a9000, ffff8881009a90c9) [ 23.832307] [ 23.832397] The buggy address belongs to the physical page: [ 23.832700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8 [ 23.833036] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.833345] anon flags: 0x200000000000040(head|node=0|zone=2) [ 23.833823] page_type: f5(slab) [ 23.833964] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.834188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.834539] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.834973] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.835300] head: 0200000000000001 ffffea0004026a01 00000000ffffffff 00000000ffffffff [ 23.835627] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.835878] page dumped because: kasan: bad access detected [ 23.836128] [ 23.836204] Memory state around the buggy address: [ 23.836363] ffff8881009a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.836588] ffff8881009a9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.836894] >ffff8881009a9080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.837297] ^ [ 23.837532] ffff8881009a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.837892] ffff8881009a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.838179] ================================================================== [ 23.906310] ================================================================== [ 23.906945] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 23.907300] Write of size 1 at addr ffff8881049420c9 by task kunit_try_catch/210 [ 23.907644] [ 23.907834] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.907893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.907907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.907931] Call Trace: [ 23.907946] <TASK> [ 23.907977] dump_stack_lvl+0x73/0xb0 [ 23.908015] print_report+0xd1/0x610 [ 23.908043] ? __virt_addr_valid+0x1db/0x2d0 [ 23.908074] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.908102] ? kasan_addr_to_slab+0x11/0xa0 [ 23.908127] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.908156] kasan_report+0x141/0x180 [ 23.908183] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 23.908218] __asan_report_store1_noabort+0x1b/0x30 [ 23.908247] krealloc_less_oob_helper+0xd70/0x11d0 [ 23.908278] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.908307] ? finish_task_switch.isra.0+0x153/0x700 [ 23.908333] ? __switch_to+0x47/0xf80 [ 23.908367] ? __schedule+0x10cc/0x2b60 [ 23.908395] ? __pfx_read_tsc+0x10/0x10 [ 23.908426] krealloc_large_less_oob+0x1c/0x30 [ 23.908453] kunit_try_run_case+0x1a5/0x480 [ 23.908483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.908509] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.908549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.908576] ? __kthread_parkme+0x82/0x180 [ 23.908656] ? preempt_count_sub+0x50/0x80 [ 23.908686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.908714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.908752] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.908783] kthread+0x337/0x6f0 [ 23.908807] ? trace_preempt_on+0x20/0xc0 [ 23.908838] ? __pfx_kthread+0x10/0x10 [ 23.908863] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.908893] ? calculate_sigpending+0x7b/0xa0 [ 23.908921] ? __pfx_kthread+0x10/0x10 [ 23.908948] ret_from_fork+0x116/0x1d0 [ 23.908972] ? __pfx_kthread+0x10/0x10 [ 23.908997] ret_from_fork_asm+0x1a/0x30 [ 23.909038] </TASK> [ 23.909052] [ 23.916378] The buggy address belongs to the physical page: [ 23.916735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104940 [ 23.917380] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.917699] flags: 0x200000000000040(head|node=0|zone=2) [ 23.917929] page_type: f8(unknown) [ 23.918100] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.918405] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.918652] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.918910] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.919249] head: 0200000000000002 ffffea0004125001 00000000ffffffff 00000000ffffffff [ 23.919720] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.920028] page dumped because: kasan: bad access detected [ 23.920199] [ 23.920266] Memory state around the buggy address: [ 23.920437] ffff888104941f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.921012] ffff888104942000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.921339] >ffff888104942080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.921692] ^ [ 23.921916] ffff888104942100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.922195] ffff888104942180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.922495] ================================================================== [ 23.955485] ================================================================== [ 23.956375] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 23.956960] Write of size 1 at addr ffff8881049420ea by task kunit_try_catch/210 [ 23.957275] [ 23.957361] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.957407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.957421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.957442] Call Trace: [ 23.957457] <TASK> [ 23.957472] dump_stack_lvl+0x73/0xb0 [ 23.957504] print_report+0xd1/0x610 [ 23.957545] ? __virt_addr_valid+0x1db/0x2d0 [ 23.957572] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.957618] ? kasan_addr_to_slab+0x11/0xa0 [ 23.957643] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.957672] kasan_report+0x141/0x180 [ 23.957699] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 23.957734] __asan_report_store1_noabort+0x1b/0x30 [ 23.957763] krealloc_less_oob_helper+0xe90/0x11d0 [ 23.957795] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.957824] ? finish_task_switch.isra.0+0x153/0x700 [ 23.957849] ? __switch_to+0x47/0xf80 [ 23.957881] ? __schedule+0x10cc/0x2b60 [ 23.957907] ? __pfx_read_tsc+0x10/0x10 [ 23.957937] krealloc_large_less_oob+0x1c/0x30 [ 23.957964] kunit_try_run_case+0x1a5/0x480 [ 23.957992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.958018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.958045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.958072] ? __kthread_parkme+0x82/0x180 [ 23.958096] ? preempt_count_sub+0x50/0x80 [ 23.958125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.958153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.958183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.958214] kthread+0x337/0x6f0 [ 23.958238] ? trace_preempt_on+0x20/0xc0 [ 23.958266] ? __pfx_kthread+0x10/0x10 [ 23.958291] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.958320] ? calculate_sigpending+0x7b/0xa0 [ 23.958349] ? __pfx_kthread+0x10/0x10 [ 23.958375] ret_from_fork+0x116/0x1d0 [ 23.958399] ? __pfx_kthread+0x10/0x10 [ 23.958424] ret_from_fork_asm+0x1a/0x30 [ 23.958468] </TASK> [ 23.958480] [ 23.965543] The buggy address belongs to the physical page: [ 23.966049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104940 [ 23.966402] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.966893] flags: 0x200000000000040(head|node=0|zone=2) [ 23.967118] page_type: f8(unknown) [ 23.967244] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.967473] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.968161] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.968532] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.968916] head: 0200000000000002 ffffea0004125001 00000000ffffffff 00000000ffffffff [ 23.969238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.969535] page dumped because: kasan: bad access detected [ 23.969857] [ 23.969945] Memory state around the buggy address: [ 23.970147] ffff888104941f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.970404] ffff888104942000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.970886] >ffff888104942080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.971155] ^ [ 23.971405] ffff888104942100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.971819] ffff888104942180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.972065] ================================================================== [ 23.762338] ================================================================== [ 23.762699] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 23.763350] Write of size 1 at addr ffff8881009a90d0 by task kunit_try_catch/206 [ 23.763995] [ 23.764089] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.764153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.764165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.764208] Call Trace: [ 23.764223] <TASK> [ 23.764238] dump_stack_lvl+0x73/0xb0 [ 23.764277] print_report+0xd1/0x610 [ 23.764299] ? __virt_addr_valid+0x1db/0x2d0 [ 23.764321] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.764344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.764369] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.764423] kasan_report+0x141/0x180 [ 23.764444] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.764501] __asan_report_store1_noabort+0x1b/0x30 [ 23.764543] krealloc_less_oob_helper+0xe23/0x11d0 [ 23.764568] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.764632] ? finish_task_switch.isra.0+0x153/0x700 [ 23.764911] ? __switch_to+0x47/0xf80 [ 23.764937] ? __schedule+0x10cc/0x2b60 [ 23.764959] ? __pfx_read_tsc+0x10/0x10 [ 23.764983] krealloc_less_oob+0x1c/0x30 [ 23.765004] kunit_try_run_case+0x1a5/0x480 [ 23.765027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.765047] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.765069] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.765091] ? __kthread_parkme+0x82/0x180 [ 23.765111] ? preempt_count_sub+0x50/0x80 [ 23.765133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.765156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.765181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.765207] kthread+0x337/0x6f0 [ 23.765226] ? trace_preempt_on+0x20/0xc0 [ 23.765248] ? __pfx_kthread+0x10/0x10 [ 23.765268] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.765292] ? calculate_sigpending+0x7b/0xa0 [ 23.765315] ? __pfx_kthread+0x10/0x10 [ 23.765336] ret_from_fork+0x116/0x1d0 [ 23.765354] ? __pfx_kthread+0x10/0x10 [ 23.765374] ret_from_fork_asm+0x1a/0x30 [ 23.765405] </TASK> [ 23.765415] [ 23.777694] Allocated by task 206: [ 23.777817] kasan_save_stack+0x45/0x70 [ 23.778280] kasan_save_track+0x18/0x40 [ 23.778706] kasan_save_alloc_info+0x3b/0x50 [ 23.779136] __kasan_krealloc+0x190/0x1f0 [ 23.779655] krealloc_noprof+0xf3/0x340 [ 23.779993] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.780444] krealloc_less_oob+0x1c/0x30 [ 23.780745] kunit_try_run_case+0x1a5/0x480 [ 23.781104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.781279] kthread+0x337/0x6f0 [ 23.781392] ret_from_fork+0x116/0x1d0 [ 23.781527] ret_from_fork_asm+0x1a/0x30 [ 23.781689] [ 23.781798] The buggy address belongs to the object at ffff8881009a9000 [ 23.781798] which belongs to the cache kmalloc-256 of size 256 [ 23.782307] The buggy address is located 7 bytes to the right of [ 23.782307] allocated 201-byte region [ffff8881009a9000, ffff8881009a90c9) [ 23.782858] [ 23.782944] The buggy address belongs to the physical page: [ 23.783168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8 [ 23.783443] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.783921] anon flags: 0x200000000000040(head|node=0|zone=2) [ 23.784431] page_type: f5(slab) [ 23.784653] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.784964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.785277] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.785746] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.786281] head: 0200000000000001 ffffea0004026a01 00000000ffffffff 00000000ffffffff [ 23.786840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.787068] page dumped because: kasan: bad access detected [ 23.787231] [ 23.787294] Memory state around the buggy address: [ 23.787440] ffff8881009a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.787667] ffff8881009a9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.788263] >ffff8881009a9080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.788511] ^ [ 23.789130] ffff8881009a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.789564] ffff8881009a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.789983] ================================================================== [ 23.939266] ================================================================== [ 23.939487] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 23.939955] Write of size 1 at addr ffff8881049420da by task kunit_try_catch/210 [ 23.940402] [ 23.940488] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 23.940544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.940557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.940577] Call Trace: [ 23.940592] <TASK> [ 23.940607] dump_stack_lvl+0x73/0xb0 [ 23.940637] print_report+0xd1/0x610 [ 23.940664] ? __virt_addr_valid+0x1db/0x2d0 [ 23.940692] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.940719] ? kasan_addr_to_slab+0x11/0xa0 [ 23.940744] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.940772] kasan_report+0x141/0x180 [ 23.940798] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.940833] __asan_report_store1_noabort+0x1b/0x30 [ 23.940862] krealloc_less_oob_helper+0xec6/0x11d0 [ 23.940892] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.940920] ? finish_task_switch.isra.0+0x153/0x700 [ 23.941013] ? __switch_to+0x47/0xf80 [ 23.941046] ? __schedule+0x10cc/0x2b60 [ 23.941073] ? __pfx_read_tsc+0x10/0x10 [ 23.941103] krealloc_large_less_oob+0x1c/0x30 [ 23.941131] kunit_try_run_case+0x1a5/0x480 [ 23.941159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.941185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.941211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.941238] ? __kthread_parkme+0x82/0x180 [ 23.941263] ? preempt_count_sub+0x50/0x80 [ 23.941292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.941320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.941350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.941381] kthread+0x337/0x6f0 [ 23.941405] ? trace_preempt_on+0x20/0xc0 [ 23.941432] ? __pfx_kthread+0x10/0x10 [ 23.941458] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.941486] ? calculate_sigpending+0x7b/0xa0 [ 23.941514] ? __pfx_kthread+0x10/0x10 [ 23.941554] ret_from_fork+0x116/0x1d0 [ 23.941578] ? __pfx_kthread+0x10/0x10 [ 23.941623] ret_from_fork_asm+0x1a/0x30 [ 23.941663] </TASK> [ 23.941674] [ 23.949101] The buggy address belongs to the physical page: [ 23.949363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104940 [ 23.949729] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.950285] flags: 0x200000000000040(head|node=0|zone=2) [ 23.950769] page_type: f8(unknown) [ 23.950901] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.951207] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.951562] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.951984] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.952301] head: 0200000000000002 ffffea0004125001 00000000ffffffff 00000000ffffffff [ 23.952645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.952919] page dumped because: kasan: bad access detected [ 23.953090] [ 23.953157] Memory state around the buggy address: [ 23.953312] ffff888104941f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.953576] ffff888104942000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.954094] >ffff888104942080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.954405] ^ [ 23.954685] ffff888104942100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.954944] ffff888104942180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.955152] ==================================================================