Date
July 22, 2025, 5:13 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.220659] ================================================================== [ 30.220946] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.221018] Write of size 1 at addr fff00000c9aea0eb by task kunit_try_catch/191 [ 30.221067] [ 30.221102] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.221188] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.221216] Hardware name: linux,dummy-virt (DT) [ 30.221246] Call trace: [ 30.221268] show_stack+0x20/0x38 (C) [ 30.221315] dump_stack_lvl+0x8c/0xd0 [ 30.221361] print_report+0x118/0x5e8 [ 30.221404] kasan_report+0xdc/0x128 [ 30.221445] __asan_report_store1_noabort+0x20/0x30 [ 30.221493] krealloc_more_oob_helper+0x60c/0x678 [ 30.221541] krealloc_large_more_oob+0x20/0x38 [ 30.221588] kunit_try_run_case+0x170/0x3f0 [ 30.221634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.221684] kthread+0x328/0x630 [ 30.221725] ret_from_fork+0x10/0x20 [ 30.221770] [ 30.221789] The buggy address belongs to the physical page: [ 30.221838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.221889] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.221932] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.221981] page_type: f8(unknown) [ 30.222018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.222064] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.222175] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.222291] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.222461] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.222516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.222562] page dumped because: kasan: bad access detected [ 30.222591] [ 30.222608] Memory state around the buggy address: [ 30.222837] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.223107] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.223989] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.224052] ^ [ 30.224139] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.224183] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.224269] ================================================================== [ 30.144348] ================================================================== [ 30.144842] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.144994] Write of size 1 at addr fff00000c81a4cf0 by task kunit_try_catch/187 [ 30.145106] [ 30.145157] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.145522] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.145659] Hardware name: linux,dummy-virt (DT) [ 30.145727] Call trace: [ 30.145796] show_stack+0x20/0x38 (C) [ 30.145959] dump_stack_lvl+0x8c/0xd0 [ 30.146060] print_report+0x118/0x5e8 [ 30.146167] kasan_report+0xdc/0x128 [ 30.146220] __asan_report_store1_noabort+0x20/0x30 [ 30.146277] krealloc_more_oob_helper+0x5c0/0x678 [ 30.146326] krealloc_more_oob+0x20/0x38 [ 30.146371] kunit_try_run_case+0x170/0x3f0 [ 30.146425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.146484] kthread+0x328/0x630 [ 30.146533] ret_from_fork+0x10/0x20 [ 30.146579] [ 30.146597] Allocated by task 187: [ 30.146626] kasan_save_stack+0x3c/0x68 [ 30.146671] kasan_save_track+0x20/0x40 [ 30.146706] kasan_save_alloc_info+0x40/0x58 [ 30.146752] __kasan_krealloc+0x118/0x178 [ 30.146786] krealloc_noprof+0x128/0x360 [ 30.147140] krealloc_more_oob_helper+0x168/0x678 [ 30.147408] krealloc_more_oob+0x20/0x38 [ 30.147670] kunit_try_run_case+0x170/0x3f0 [ 30.147848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.148021] kthread+0x328/0x630 [ 30.148107] ret_from_fork+0x10/0x20 [ 30.148214] [ 30.148482] The buggy address belongs to the object at fff00000c81a4c00 [ 30.148482] which belongs to the cache kmalloc-256 of size 256 [ 30.148749] The buggy address is located 5 bytes to the right of [ 30.148749] allocated 235-byte region [fff00000c81a4c00, fff00000c81a4ceb) [ 30.148954] [ 30.149032] The buggy address belongs to the physical page: [ 30.149135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.149190] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.149252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.149677] page_type: f5(slab) [ 30.150161] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.150230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.150658] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.150743] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.150847] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.151493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.151604] page dumped because: kasan: bad access detected [ 30.151781] [ 30.151880] Memory state around the buggy address: [ 30.152050] fff00000c81a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.152137] fff00000c81a4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.152213] >fff00000c81a4c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.152416] ^ [ 30.152496] fff00000c81a4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.152601] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.152656] ================================================================== [ 30.227205] ================================================================== [ 30.227253] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.227304] Write of size 1 at addr fff00000c9aea0f0 by task kunit_try_catch/191 [ 30.227352] [ 30.227380] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.227465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.227492] Hardware name: linux,dummy-virt (DT) [ 30.227521] Call trace: [ 30.227542] show_stack+0x20/0x38 (C) [ 30.227587] dump_stack_lvl+0x8c/0xd0 [ 30.227641] print_report+0x118/0x5e8 [ 30.227685] kasan_report+0xdc/0x128 [ 30.227727] __asan_report_store1_noabort+0x20/0x30 [ 30.227776] krealloc_more_oob_helper+0x5c0/0x678 [ 30.228083] krealloc_large_more_oob+0x20/0x38 [ 30.228162] kunit_try_run_case+0x170/0x3f0 [ 30.228209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.228261] kthread+0x328/0x630 [ 30.228494] ret_from_fork+0x10/0x20 [ 30.228799] [ 30.228846] The buggy address belongs to the physical page: [ 30.228993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.229062] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.229105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.229503] page_type: f8(unknown) [ 30.229625] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.229676] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.229783] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.230014] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.230502] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.230728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.230969] page dumped because: kasan: bad access detected [ 30.231241] [ 30.231268] Memory state around the buggy address: [ 30.231300] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231636] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231851] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.231961] ^ [ 30.232222] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.232457] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.232604] ================================================================== [ 30.136043] ================================================================== [ 30.136100] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.136156] Write of size 1 at addr fff00000c81a4ceb by task kunit_try_catch/187 [ 30.136204] [ 30.136236] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.136320] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.136348] Hardware name: linux,dummy-virt (DT) [ 30.136378] Call trace: [ 30.136400] show_stack+0x20/0x38 (C) [ 30.136447] dump_stack_lvl+0x8c/0xd0 [ 30.136491] print_report+0x118/0x5e8 [ 30.136534] kasan_report+0xdc/0x128 [ 30.136577] __asan_report_store1_noabort+0x20/0x30 [ 30.136627] krealloc_more_oob_helper+0x60c/0x678 [ 30.136676] krealloc_more_oob+0x20/0x38 [ 30.136721] kunit_try_run_case+0x170/0x3f0 [ 30.136768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.137727] kthread+0x328/0x630 [ 30.137925] ret_from_fork+0x10/0x20 [ 30.138032] [ 30.138135] Allocated by task 187: [ 30.138170] kasan_save_stack+0x3c/0x68 [ 30.138256] kasan_save_track+0x20/0x40 [ 30.138451] kasan_save_alloc_info+0x40/0x58 [ 30.138497] __kasan_krealloc+0x118/0x178 [ 30.138737] krealloc_noprof+0x128/0x360 [ 30.138841] krealloc_more_oob_helper+0x168/0x678 [ 30.138888] krealloc_more_oob+0x20/0x38 [ 30.138926] kunit_try_run_case+0x170/0x3f0 [ 30.139016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.139235] kthread+0x328/0x630 [ 30.139392] ret_from_fork+0x10/0x20 [ 30.139525] [ 30.139685] The buggy address belongs to the object at fff00000c81a4c00 [ 30.139685] which belongs to the cache kmalloc-256 of size 256 [ 30.140069] The buggy address is located 0 bytes to the right of [ 30.140069] allocated 235-byte region [fff00000c81a4c00, fff00000c81a4ceb) [ 30.140161] [ 30.140489] The buggy address belongs to the physical page: [ 30.140660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.140737] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.140791] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.141018] page_type: f5(slab) [ 30.141261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.141432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.141527] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.141666] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.141753] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.141829] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.142020] page dumped because: kasan: bad access detected [ 30.142294] [ 30.142405] Memory state around the buggy address: [ 30.142496] fff00000c81a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.142587] fff00000c81a4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.142846] >fff00000c81a4c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.142940] ^ [ 30.143222] fff00000c81a4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.143360] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.143505] ==================================================================
[ 24.721318] ================================================================== [ 24.721991] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 24.722301] Write of size 1 at addr ffff888104a0faeb by task kunit_try_catch/204 [ 24.722818] [ 24.722932] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 24.722980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.722993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.723014] Call Trace: [ 24.723027] <TASK> [ 24.723042] dump_stack_lvl+0x73/0xb0 [ 24.723075] print_report+0xd1/0x640 [ 24.723099] ? __virt_addr_valid+0x1db/0x2d0 [ 24.723124] ? krealloc_more_oob_helper+0x821/0x930 [ 24.723147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.723188] ? krealloc_more_oob_helper+0x821/0x930 [ 24.723212] kasan_report+0x141/0x180 [ 24.723235] ? krealloc_more_oob_helper+0x821/0x930 [ 24.723263] __asan_report_store1_noabort+0x1b/0x30 [ 24.723287] krealloc_more_oob_helper+0x821/0x930 [ 24.723310] ? __schedule+0x10da/0x2b60 [ 24.723335] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.723359] ? finish_task_switch.isra.0+0x153/0x700 [ 24.723381] ? __switch_to+0x47/0xf80 [ 24.723412] ? __schedule+0x10da/0x2b60 [ 24.723437] ? __pfx_read_tsc+0x10/0x10 [ 24.723513] krealloc_more_oob+0x1c/0x30 [ 24.723539] kunit_try_run_case+0x1a5/0x480 [ 24.723565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.723588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.723613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.723637] ? __kthread_parkme+0x82/0x180 [ 24.723658] ? preempt_count_sub+0x50/0x80 [ 24.723680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.723704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.723727] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.723752] kthread+0x337/0x6f0 [ 24.723772] ? trace_preempt_on+0x20/0xc0 [ 24.723797] ? __pfx_kthread+0x10/0x10 [ 24.723817] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.723854] ? calculate_sigpending+0x7b/0xa0 [ 24.723878] ? __pfx_kthread+0x10/0x10 [ 24.723899] ret_from_fork+0x116/0x1d0 [ 24.723919] ? __pfx_kthread+0x10/0x10 [ 24.723940] ret_from_fork_asm+0x1a/0x30 [ 24.723971] </TASK> [ 24.723982] [ 24.733129] Allocated by task 204: [ 24.733306] kasan_save_stack+0x45/0x70 [ 24.734018] kasan_save_track+0x18/0x40 [ 24.734414] kasan_save_alloc_info+0x3b/0x50 [ 24.734686] __kasan_krealloc+0x190/0x1f0 [ 24.734882] krealloc_noprof+0xf3/0x340 [ 24.735061] krealloc_more_oob_helper+0x1a9/0x930 [ 24.735662] krealloc_more_oob+0x1c/0x30 [ 24.736191] kunit_try_run_case+0x1a5/0x480 [ 24.736408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.736820] kthread+0x337/0x6f0 [ 24.737012] ret_from_fork+0x116/0x1d0 [ 24.737432] ret_from_fork_asm+0x1a/0x30 [ 24.737922] [ 24.738029] The buggy address belongs to the object at ffff888104a0fa00 [ 24.738029] which belongs to the cache kmalloc-256 of size 256 [ 24.739124] The buggy address is located 0 bytes to the right of [ 24.739124] allocated 235-byte region [ffff888104a0fa00, ffff888104a0faeb) [ 24.739999] [ 24.740100] The buggy address belongs to the physical page: [ 24.740641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a0e [ 24.741137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.741452] flags: 0x200000000000040(head|node=0|zone=2) [ 24.741989] page_type: f5(slab) [ 24.742343] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.742891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.743447] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.743964] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.744709] head: 0200000000000001 ffffea0004128381 00000000ffffffff 00000000ffffffff [ 24.745134] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.745619] page dumped because: kasan: bad access detected [ 24.745841] [ 24.745913] Memory state around the buggy address: [ 24.746098] ffff888104a0f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.747054] ffff888104a0fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.747547] >ffff888104a0fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.748046] ^ [ 24.748722] ffff888104a0fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.749333] ffff888104a0fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.749778] ================================================================== [ 24.889952] ================================================================== [ 24.890388] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 24.890718] Write of size 1 at addr ffff88810618e0eb by task kunit_try_catch/208 [ 24.891114] [ 24.891378] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 24.891430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.891443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.891464] Call Trace: [ 24.891477] <TASK> [ 24.891493] dump_stack_lvl+0x73/0xb0 [ 24.891525] print_report+0xd1/0x640 [ 24.891549] ? __virt_addr_valid+0x1db/0x2d0 [ 24.891574] ? krealloc_more_oob_helper+0x821/0x930 [ 24.891598] ? kasan_addr_to_slab+0x11/0xa0 [ 24.891673] ? krealloc_more_oob_helper+0x821/0x930 [ 24.891698] kasan_report+0x141/0x180 [ 24.891721] ? krealloc_more_oob_helper+0x821/0x930 [ 24.891749] __asan_report_store1_noabort+0x1b/0x30 [ 24.891774] krealloc_more_oob_helper+0x821/0x930 [ 24.891796] ? __schedule+0x10da/0x2b60 [ 24.891822] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.891860] ? finish_task_switch.isra.0+0x153/0x700 [ 24.891882] ? __switch_to+0x47/0xf80 [ 24.891910] ? __schedule+0x10da/0x2b60 [ 24.891935] ? __pfx_read_tsc+0x10/0x10 [ 24.891960] krealloc_large_more_oob+0x1c/0x30 [ 24.891984] kunit_try_run_case+0x1a5/0x480 [ 24.892009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.892032] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.892057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.892082] ? __kthread_parkme+0x82/0x180 [ 24.892102] ? preempt_count_sub+0x50/0x80 [ 24.892126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.892151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.892185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.892210] kthread+0x337/0x6f0 [ 24.892231] ? trace_preempt_on+0x20/0xc0 [ 24.892255] ? __pfx_kthread+0x10/0x10 [ 24.892276] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.892299] ? calculate_sigpending+0x7b/0xa0 [ 24.892324] ? __pfx_kthread+0x10/0x10 [ 24.892345] ret_from_fork+0x116/0x1d0 [ 24.892365] ? __pfx_kthread+0x10/0x10 [ 24.892385] ret_from_fork_asm+0x1a/0x30 [ 24.892417] </TASK> [ 24.892428] [ 24.900174] The buggy address belongs to the physical page: [ 24.900417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10618c [ 24.901622] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.901901] flags: 0x200000000000040(head|node=0|zone=2) [ 24.902150] page_type: f8(unknown) [ 24.902280] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.902869] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.903228] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.903537] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.903874] head: 0200000000000002 ffffea0004186301 00000000ffffffff 00000000ffffffff [ 24.904614] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.904970] page dumped because: kasan: bad access detected [ 24.905461] [ 24.905557] Memory state around the buggy address: [ 24.905982] ffff88810618df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.906679] ffff88810618e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.907155] >ffff88810618e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.907635] ^ [ 24.908140] ffff88810618e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.908573] ffff88810618e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.908877] ================================================================== [ 24.910674] ================================================================== [ 24.911283] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 24.912129] Write of size 1 at addr ffff88810618e0f0 by task kunit_try_catch/208 [ 24.912432] [ 24.912904] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 24.912958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.912972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.912993] Call Trace: [ 24.913006] <TASK> [ 24.913021] dump_stack_lvl+0x73/0xb0 [ 24.913051] print_report+0xd1/0x640 [ 24.913075] ? __virt_addr_valid+0x1db/0x2d0 [ 24.913098] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.913122] ? kasan_addr_to_slab+0x11/0xa0 [ 24.913144] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.913292] kasan_report+0x141/0x180 [ 24.913322] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.913352] __asan_report_store1_noabort+0x1b/0x30 [ 24.913377] krealloc_more_oob_helper+0x7eb/0x930 [ 24.913401] ? __schedule+0x10da/0x2b60 [ 24.913478] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.913504] ? finish_task_switch.isra.0+0x153/0x700 [ 24.913526] ? __switch_to+0x47/0xf80 [ 24.913553] ? __schedule+0x10da/0x2b60 [ 24.913577] ? __pfx_read_tsc+0x10/0x10 [ 24.913602] krealloc_large_more_oob+0x1c/0x30 [ 24.913625] kunit_try_run_case+0x1a5/0x480 [ 24.913650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.913673] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.913697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.913722] ? __kthread_parkme+0x82/0x180 [ 24.913743] ? preempt_count_sub+0x50/0x80 [ 24.913765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.913789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.913813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.913846] kthread+0x337/0x6f0 [ 24.913867] ? trace_preempt_on+0x20/0xc0 [ 24.913889] ? __pfx_kthread+0x10/0x10 [ 24.913910] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.913934] ? calculate_sigpending+0x7b/0xa0 [ 24.913958] ? __pfx_kthread+0x10/0x10 [ 24.913979] ret_from_fork+0x116/0x1d0 [ 24.913999] ? __pfx_kthread+0x10/0x10 [ 24.914020] ret_from_fork_asm+0x1a/0x30 [ 24.914051] </TASK> [ 24.914062] [ 24.922566] The buggy address belongs to the physical page: [ 24.922788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10618c [ 24.923140] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.923625] flags: 0x200000000000040(head|node=0|zone=2) [ 24.923903] page_type: f8(unknown) [ 24.924061] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.924298] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.924690] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.925166] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.925426] head: 0200000000000002 ffffea0004186301 00000000ffffffff 00000000ffffffff [ 24.925973] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.926361] page dumped because: kasan: bad access detected [ 24.926585] [ 24.926657] Memory state around the buggy address: [ 24.926873] ffff88810618df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.927092] ffff88810618e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.927312] >ffff88810618e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.927527] ^ [ 24.927843] ffff88810618e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.928351] ffff88810618e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.928798] ================================================================== [ 24.750308] ================================================================== [ 24.750678] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 24.751022] Write of size 1 at addr ffff888104a0faf0 by task kunit_try_catch/204 [ 24.751326] [ 24.751476] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 24.751523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.751535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.751555] Call Trace: [ 24.751572] <TASK> [ 24.751588] dump_stack_lvl+0x73/0xb0 [ 24.751614] print_report+0xd1/0x640 [ 24.751637] ? __virt_addr_valid+0x1db/0x2d0 [ 24.751662] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.751685] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.751712] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.751736] kasan_report+0x141/0x180 [ 24.751758] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.751786] __asan_report_store1_noabort+0x1b/0x30 [ 24.751811] krealloc_more_oob_helper+0x7eb/0x930 [ 24.751845] ? __schedule+0x10da/0x2b60 [ 24.751870] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.751895] ? finish_task_switch.isra.0+0x153/0x700 [ 24.751917] ? __switch_to+0x47/0xf80 [ 24.751944] ? __schedule+0x10da/0x2b60 [ 24.751969] ? __pfx_read_tsc+0x10/0x10 [ 24.751994] krealloc_more_oob+0x1c/0x30 [ 24.752016] kunit_try_run_case+0x1a5/0x480 [ 24.752041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.752063] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.752088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.752113] ? __kthread_parkme+0x82/0x180 [ 24.752133] ? preempt_count_sub+0x50/0x80 [ 24.752155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.752179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.752203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.752226] kthread+0x337/0x6f0 [ 24.752246] ? trace_preempt_on+0x20/0xc0 [ 24.752269] ? __pfx_kthread+0x10/0x10 [ 24.752290] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.752313] ? calculate_sigpending+0x7b/0xa0 [ 24.752337] ? __pfx_kthread+0x10/0x10 [ 24.752359] ret_from_fork+0x116/0x1d0 [ 24.752379] ? __pfx_kthread+0x10/0x10 [ 24.752399] ret_from_fork_asm+0x1a/0x30 [ 24.752430] </TASK> [ 24.752441] [ 24.760981] Allocated by task 204: [ 24.761136] kasan_save_stack+0x45/0x70 [ 24.761340] kasan_save_track+0x18/0x40 [ 24.761658] kasan_save_alloc_info+0x3b/0x50 [ 24.761892] __kasan_krealloc+0x190/0x1f0 [ 24.762042] krealloc_noprof+0xf3/0x340 [ 24.762181] krealloc_more_oob_helper+0x1a9/0x930 [ 24.762340] krealloc_more_oob+0x1c/0x30 [ 24.762476] kunit_try_run_case+0x1a5/0x480 [ 24.762675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.763225] kthread+0x337/0x6f0 [ 24.763396] ret_from_fork+0x116/0x1d0 [ 24.763580] ret_from_fork_asm+0x1a/0x30 [ 24.763936] [ 24.764011] The buggy address belongs to the object at ffff888104a0fa00 [ 24.764011] which belongs to the cache kmalloc-256 of size 256 [ 24.764789] The buggy address is located 5 bytes to the right of [ 24.764789] allocated 235-byte region [ffff888104a0fa00, ffff888104a0faeb) [ 24.765263] [ 24.765366] The buggy address belongs to the physical page: [ 24.765893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a0e [ 24.766228] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.766587] flags: 0x200000000000040(head|node=0|zone=2) [ 24.766803] page_type: f5(slab) [ 24.766983] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.767231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.767475] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.767710] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.768055] head: 0200000000000001 ffffea0004128381 00000000ffffffff 00000000ffffffff [ 24.768760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.769121] page dumped because: kasan: bad access detected [ 24.769409] [ 24.769650] Memory state around the buggy address: [ 24.769818] ffff888104a0f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.770054] ffff888104a0fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.770617] >ffff888104a0fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.770961] ^ [ 24.771337] ffff888104a0fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.771606] ffff888104a0fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.771997] ==================================================================