Date
July 23, 2025, 3:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.292031] ================================================================== [ 30.292087] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.292140] Write of size 1 at addr fff00000c9ae60da by task kunit_try_catch/195 [ 30.292188] [ 30.292414] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.292564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.292700] Hardware name: linux,dummy-virt (DT) [ 30.292736] Call trace: [ 30.293452] show_stack+0x20/0x38 (C) [ 30.293540] dump_stack_lvl+0x8c/0xd0 [ 30.293618] print_report+0x118/0x5e8 [ 30.293664] kasan_report+0xdc/0x128 [ 30.293876] __asan_report_store1_noabort+0x20/0x30 [ 30.294178] krealloc_less_oob_helper+0xa80/0xc50 [ 30.294425] krealloc_large_less_oob+0x20/0x38 [ 30.294513] kunit_try_run_case+0x170/0x3f0 [ 30.294598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.294650] kthread+0x328/0x630 [ 30.294699] ret_from_fork+0x10/0x20 [ 30.294748] [ 30.294769] The buggy address belongs to the physical page: [ 30.294805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.294856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.294920] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.294972] page_type: f8(unknown) [ 30.295018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.295072] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.295118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.295173] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.295236] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.295298] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.295336] page dumped because: kasan: bad access detected [ 30.295365] [ 30.295388] Memory state around the buggy address: [ 30.295433] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.295474] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.295514] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.295560] ^ [ 30.295598] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.295648] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.295684] ================================================================== [ 30.284304] ================================================================== [ 30.284350] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.284509] Write of size 1 at addr fff00000c9ae60d0 by task kunit_try_catch/195 [ 30.285045] [ 30.285153] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.285239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.285265] Hardware name: linux,dummy-virt (DT) [ 30.285294] Call trace: [ 30.285315] show_stack+0x20/0x38 (C) [ 30.285891] dump_stack_lvl+0x8c/0xd0 [ 30.286011] print_report+0x118/0x5e8 [ 30.286157] kasan_report+0xdc/0x128 [ 30.286233] __asan_report_store1_noabort+0x20/0x30 [ 30.286304] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.286687] krealloc_large_less_oob+0x20/0x38 [ 30.286834] kunit_try_run_case+0x170/0x3f0 [ 30.287001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.287248] kthread+0x328/0x630 [ 30.287487] ret_from_fork+0x10/0x20 [ 30.287570] [ 30.287591] The buggy address belongs to the physical page: [ 30.287786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.288049] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.288194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.288300] page_type: f8(unknown) [ 30.288377] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.288662] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.288845] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.289012] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.289100] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.289253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.289343] page dumped because: kasan: bad access detected [ 30.289399] [ 30.289422] Memory state around the buggy address: [ 30.289453] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.289496] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.289745] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.289987] ^ [ 30.290126] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.290201] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.290250] ================================================================== [ 30.218815] ================================================================== [ 30.218883] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.218969] Write of size 1 at addr fff00000c91e64c9 by task kunit_try_catch/191 [ 30.219072] [ 30.219163] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.219269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.219306] Hardware name: linux,dummy-virt (DT) [ 30.219339] Call trace: [ 30.219362] show_stack+0x20/0x38 (C) [ 30.219652] dump_stack_lvl+0x8c/0xd0 [ 30.219699] print_report+0x118/0x5e8 [ 30.219760] kasan_report+0xdc/0x128 [ 30.219834] __asan_report_store1_noabort+0x20/0x30 [ 30.219923] krealloc_less_oob_helper+0xa48/0xc50 [ 30.219996] krealloc_less_oob+0x20/0x38 [ 30.220043] kunit_try_run_case+0x170/0x3f0 [ 30.220111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.220195] kthread+0x328/0x630 [ 30.220498] ret_from_fork+0x10/0x20 [ 30.220563] [ 30.220581] Allocated by task 191: [ 30.220609] kasan_save_stack+0x3c/0x68 [ 30.220670] kasan_save_track+0x20/0x40 [ 30.220704] kasan_save_alloc_info+0x40/0x58 [ 30.220800] __kasan_krealloc+0x118/0x178 [ 30.220860] krealloc_noprof+0x128/0x360 [ 30.221002] krealloc_less_oob_helper+0x168/0xc50 [ 30.221070] krealloc_less_oob+0x20/0x38 [ 30.221188] kunit_try_run_case+0x170/0x3f0 [ 30.221276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.221368] kthread+0x328/0x630 [ 30.221402] ret_from_fork+0x10/0x20 [ 30.221436] [ 30.221472] The buggy address belongs to the object at fff00000c91e6400 [ 30.221472] which belongs to the cache kmalloc-256 of size 256 [ 30.221709] The buggy address is located 0 bytes to the right of [ 30.221709] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.221774] [ 30.221794] The buggy address belongs to the physical page: [ 30.221834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.221944] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.222025] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.222103] page_type: f5(slab) [ 30.222143] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.222190] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.222237] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.222355] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.222402] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.222448] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.222523] page dumped because: kasan: bad access detected [ 30.222619] [ 30.222688] Memory state around the buggy address: [ 30.222744] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.222812] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.222870] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.222917] ^ [ 30.222953] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.222995] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.223068] ================================================================== [ 30.239088] ================================================================== [ 30.239136] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.239186] Write of size 1 at addr fff00000c91e64eb by task kunit_try_catch/191 [ 30.239234] [ 30.239262] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.239343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.239368] Hardware name: linux,dummy-virt (DT) [ 30.239419] Call trace: [ 30.239442] show_stack+0x20/0x38 (C) [ 30.239490] dump_stack_lvl+0x8c/0xd0 [ 30.239534] print_report+0x118/0x5e8 [ 30.239576] kasan_report+0xdc/0x128 [ 30.239617] __asan_report_store1_noabort+0x20/0x30 [ 30.239665] krealloc_less_oob_helper+0xa58/0xc50 [ 30.239714] krealloc_less_oob+0x20/0x38 [ 30.239759] kunit_try_run_case+0x170/0x3f0 [ 30.239803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.239852] kthread+0x328/0x630 [ 30.240072] ret_from_fork+0x10/0x20 [ 30.240138] [ 30.240157] Allocated by task 191: [ 30.240247] kasan_save_stack+0x3c/0x68 [ 30.240298] kasan_save_track+0x20/0x40 [ 30.240492] kasan_save_alloc_info+0x40/0x58 [ 30.240560] __kasan_krealloc+0x118/0x178 [ 30.240639] krealloc_noprof+0x128/0x360 [ 30.240673] krealloc_less_oob_helper+0x168/0xc50 [ 30.240712] krealloc_less_oob+0x20/0x38 [ 30.241229] kunit_try_run_case+0x170/0x3f0 [ 30.241632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.241712] kthread+0x328/0x630 [ 30.241764] ret_from_fork+0x10/0x20 [ 30.241817] [ 30.242258] The buggy address belongs to the object at fff00000c91e6400 [ 30.242258] which belongs to the cache kmalloc-256 of size 256 [ 30.242364] The buggy address is located 34 bytes to the right of [ 30.242364] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.242570] [ 30.242654] The buggy address belongs to the physical page: [ 30.242745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.242850] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.242960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.243285] page_type: f5(slab) [ 30.243344] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.243483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.243595] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.243660] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.243761] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.243814] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.243852] page dumped because: kasan: bad access detected [ 30.243881] [ 30.243915] Memory state around the buggy address: [ 30.243946] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244010] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.244059] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.244104] ^ [ 30.244152] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244202] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244238] ================================================================== [ 30.228032] ================================================================== [ 30.228079] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.228154] Write of size 1 at addr fff00000c91e64da by task kunit_try_catch/191 [ 30.228202] [ 30.228255] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.228342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.228368] Hardware name: linux,dummy-virt (DT) [ 30.228398] Call trace: [ 30.228453] show_stack+0x20/0x38 (C) [ 30.228506] dump_stack_lvl+0x8c/0xd0 [ 30.228566] print_report+0x118/0x5e8 [ 30.228666] kasan_report+0xdc/0x128 [ 30.228792] __asan_report_store1_noabort+0x20/0x30 [ 30.228880] krealloc_less_oob_helper+0xa80/0xc50 [ 30.228991] krealloc_less_oob+0x20/0x38 [ 30.229068] kunit_try_run_case+0x170/0x3f0 [ 30.229145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.229195] kthread+0x328/0x630 [ 30.229401] ret_from_fork+0x10/0x20 [ 30.229451] [ 30.229469] Allocated by task 191: [ 30.229495] kasan_save_stack+0x3c/0x68 [ 30.229534] kasan_save_track+0x20/0x40 [ 30.229567] kasan_save_alloc_info+0x40/0x58 [ 30.229603] __kasan_krealloc+0x118/0x178 [ 30.229660] krealloc_noprof+0x128/0x360 [ 30.229730] krealloc_less_oob_helper+0x168/0xc50 [ 30.229776] krealloc_less_oob+0x20/0x38 [ 30.229847] kunit_try_run_case+0x170/0x3f0 [ 30.229954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.230046] kthread+0x328/0x630 [ 30.230084] ret_from_fork+0x10/0x20 [ 30.230131] [ 30.230148] The buggy address belongs to the object at fff00000c91e6400 [ 30.230148] which belongs to the cache kmalloc-256 of size 256 [ 30.230203] The buggy address is located 17 bytes to the right of [ 30.230203] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.230265] [ 30.230304] The buggy address belongs to the physical page: [ 30.230355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.230414] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.230468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.230517] page_type: f5(slab) [ 30.230552] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.230599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.230646] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.230702] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.230749] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.230794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.230832] page dumped because: kasan: bad access detected [ 30.230861] [ 30.230887] Memory state around the buggy address: [ 30.231257] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.231520] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231565] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.231748] ^ [ 30.231852] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.231976] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.232048] ================================================================== [ 30.303961] ================================================================== [ 30.304109] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.304183] Write of size 1 at addr fff00000c9ae60eb by task kunit_try_catch/195 [ 30.304386] [ 30.304431] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.304517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.304804] Hardware name: linux,dummy-virt (DT) [ 30.304877] Call trace: [ 30.304976] show_stack+0x20/0x38 (C) [ 30.305211] dump_stack_lvl+0x8c/0xd0 [ 30.305430] print_report+0x118/0x5e8 [ 30.305554] kasan_report+0xdc/0x128 [ 30.305601] __asan_report_store1_noabort+0x20/0x30 [ 30.305678] krealloc_less_oob_helper+0xa58/0xc50 [ 30.306029] krealloc_large_less_oob+0x20/0x38 [ 30.306122] kunit_try_run_case+0x170/0x3f0 [ 30.306255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.306343] kthread+0x328/0x630 [ 30.306475] ret_from_fork+0x10/0x20 [ 30.306535] [ 30.306562] The buggy address belongs to the physical page: [ 30.306882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.307065] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.307147] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.307294] page_type: f8(unknown) [ 30.307351] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.307430] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.307514] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.307942] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.308067] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.308196] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.308273] page dumped because: kasan: bad access detected [ 30.308388] [ 30.308440] Memory state around the buggy address: [ 30.308517] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.308562] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.309007] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.309137] ^ [ 30.309206] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.309348] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.309434] ================================================================== [ 30.232519] ================================================================== [ 30.232596] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.232674] Write of size 1 at addr fff00000c91e64ea by task kunit_try_catch/191 [ 30.232765] [ 30.232801] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.232958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.233011] Hardware name: linux,dummy-virt (DT) [ 30.233041] Call trace: [ 30.233062] show_stack+0x20/0x38 (C) [ 30.233108] dump_stack_lvl+0x8c/0xd0 [ 30.233153] print_report+0x118/0x5e8 [ 30.233253] kasan_report+0xdc/0x128 [ 30.233388] __asan_report_store1_noabort+0x20/0x30 [ 30.233475] krealloc_less_oob_helper+0xae4/0xc50 [ 30.233563] krealloc_less_oob+0x20/0x38 [ 30.233685] kunit_try_run_case+0x170/0x3f0 [ 30.233773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.233848] kthread+0x328/0x630 [ 30.233889] ret_from_fork+0x10/0x20 [ 30.234224] [ 30.234294] Allocated by task 191: [ 30.234378] kasan_save_stack+0x3c/0x68 [ 30.234477] kasan_save_track+0x20/0x40 [ 30.234558] kasan_save_alloc_info+0x40/0x58 [ 30.234651] __kasan_krealloc+0x118/0x178 [ 30.234726] krealloc_noprof+0x128/0x360 [ 30.234783] krealloc_less_oob_helper+0x168/0xc50 [ 30.234824] krealloc_less_oob+0x20/0x38 [ 30.234860] kunit_try_run_case+0x170/0x3f0 [ 30.235158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.235284] kthread+0x328/0x630 [ 30.235362] ret_from_fork+0x10/0x20 [ 30.235428] [ 30.235496] The buggy address belongs to the object at fff00000c91e6400 [ 30.235496] which belongs to the cache kmalloc-256 of size 256 [ 30.235581] The buggy address is located 33 bytes to the right of [ 30.235581] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.235685] [ 30.235712] The buggy address belongs to the physical page: [ 30.235753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.235803] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.236066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.236214] page_type: f5(slab) [ 30.236309] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.236396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.236508] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.236554] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.236750] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.236804] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.237045] page dumped because: kasan: bad access detected [ 30.237129] [ 30.237194] Memory state around the buggy address: [ 30.237291] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.237369] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.237492] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.237563] ^ [ 30.237614] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.237931] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.238031] ================================================================== [ 30.223482] ================================================================== [ 30.223547] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.223616] Write of size 1 at addr fff00000c91e64d0 by task kunit_try_catch/191 [ 30.223664] [ 30.223693] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.223860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.223889] Hardware name: linux,dummy-virt (DT) [ 30.223931] Call trace: [ 30.223952] show_stack+0x20/0x38 (C) [ 30.224040] dump_stack_lvl+0x8c/0xd0 [ 30.224097] print_report+0x118/0x5e8 [ 30.224165] kasan_report+0xdc/0x128 [ 30.224223] __asan_report_store1_noabort+0x20/0x30 [ 30.224318] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.224383] krealloc_less_oob+0x20/0x38 [ 30.224428] kunit_try_run_case+0x170/0x3f0 [ 30.224473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.224637] kthread+0x328/0x630 [ 30.224683] ret_from_fork+0x10/0x20 [ 30.224741] [ 30.224759] Allocated by task 191: [ 30.224837] kasan_save_stack+0x3c/0x68 [ 30.224975] kasan_save_track+0x20/0x40 [ 30.225037] kasan_save_alloc_info+0x40/0x58 [ 30.225083] __kasan_krealloc+0x118/0x178 [ 30.225134] krealloc_noprof+0x128/0x360 [ 30.225168] krealloc_less_oob_helper+0x168/0xc50 [ 30.225209] krealloc_less_oob+0x20/0x38 [ 30.225246] kunit_try_run_case+0x170/0x3f0 [ 30.225410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.225453] kthread+0x328/0x630 [ 30.225484] ret_from_fork+0x10/0x20 [ 30.225518] [ 30.225536] The buggy address belongs to the object at fff00000c91e6400 [ 30.225536] which belongs to the cache kmalloc-256 of size 256 [ 30.225591] The buggy address is located 7 bytes to the right of [ 30.225591] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.225718] [ 30.225797] The buggy address belongs to the physical page: [ 30.225880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.225993] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.226087] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.226192] page_type: f5(slab) [ 30.226270] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.226332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.226387] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.226561] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.226609] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.226669] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.226776] page dumped because: kasan: bad access detected [ 30.226926] [ 30.226996] Memory state around the buggy address: [ 30.227084] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.227173] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.227226] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.227278] ^ [ 30.227315] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.227372] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.227410] ================================================================== [ 30.279215] ================================================================== [ 30.279292] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.279352] Write of size 1 at addr fff00000c9ae60c9 by task kunit_try_catch/195 [ 30.279598] [ 30.279663] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.279946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.280025] Hardware name: linux,dummy-virt (DT) [ 30.280059] Call trace: [ 30.280100] show_stack+0x20/0x38 (C) [ 30.280224] dump_stack_lvl+0x8c/0xd0 [ 30.280300] print_report+0x118/0x5e8 [ 30.280344] kasan_report+0xdc/0x128 [ 30.280530] __asan_report_store1_noabort+0x20/0x30 [ 30.280765] krealloc_less_oob_helper+0xa48/0xc50 [ 30.280852] krealloc_large_less_oob+0x20/0x38 [ 30.280999] kunit_try_run_case+0x170/0x3f0 [ 30.281081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.281219] kthread+0x328/0x630 [ 30.281285] ret_from_fork+0x10/0x20 [ 30.281341] [ 30.281361] The buggy address belongs to the physical page: [ 30.281396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.281867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.281981] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.282070] page_type: f8(unknown) [ 30.282198] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.282292] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.282542] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.282749] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.282964] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.283041] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.283172] page dumped because: kasan: bad access detected [ 30.283215] [ 30.283234] Memory state around the buggy address: [ 30.283265] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.283347] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.283388] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.283433] ^ [ 30.283470] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.283520] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.283562] ================================================================== [ 30.296738] ================================================================== [ 30.297050] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.297220] Write of size 1 at addr fff00000c9ae60ea by task kunit_try_catch/195 [ 30.297277] [ 30.297688] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.298110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.298165] Hardware name: linux,dummy-virt (DT) [ 30.298295] Call trace: [ 30.298321] show_stack+0x20/0x38 (C) [ 30.298378] dump_stack_lvl+0x8c/0xd0 [ 30.298425] print_report+0x118/0x5e8 [ 30.298478] kasan_report+0xdc/0x128 [ 30.298645] __asan_report_store1_noabort+0x20/0x30 [ 30.298708] krealloc_less_oob_helper+0xae4/0xc50 [ 30.298818] krealloc_large_less_oob+0x20/0x38 [ 30.299166] kunit_try_run_case+0x170/0x3f0 [ 30.299442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.299511] kthread+0x328/0x630 [ 30.299570] ret_from_fork+0x10/0x20 [ 30.299825] [ 30.299980] The buggy address belongs to the physical page: [ 30.300026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.300079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.300123] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.300306] page_type: f8(unknown) [ 30.300437] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.300578] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.300633] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.300681] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.301039] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.301187] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.301228] page dumped because: kasan: bad access detected [ 30.301435] [ 30.301464] Memory state around the buggy address: [ 30.301622] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.301947] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.302147] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.302191] ^ [ 30.302543] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.302678] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.302764] ==================================================================
[ 24.767210] ================================================================== [ 24.767910] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 24.768934] Write of size 1 at addr ffff8881055e3cc9 by task kunit_try_catch/207 [ 24.769828] [ 24.770098] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.770166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.770179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.770202] Call Trace: [ 24.770216] <TASK> [ 24.770235] dump_stack_lvl+0x73/0xb0 [ 24.770271] print_report+0xd1/0x640 [ 24.770295] ? __virt_addr_valid+0x1db/0x2d0 [ 24.770319] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.770343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.770376] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.770400] kasan_report+0x141/0x180 [ 24.770421] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.770449] __asan_report_store1_noabort+0x1b/0x30 [ 24.770473] krealloc_less_oob_helper+0xd70/0x11d0 [ 24.770498] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.770522] ? finish_task_switch.isra.0+0x153/0x700 [ 24.770543] ? __switch_to+0x47/0xf80 [ 24.770570] ? __schedule+0x10da/0x2b60 [ 24.770595] ? __pfx_read_tsc+0x10/0x10 [ 24.770619] krealloc_less_oob+0x1c/0x30 [ 24.770641] kunit_try_run_case+0x1a5/0x480 [ 24.770667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.770689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.770714] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.770739] ? __kthread_parkme+0x82/0x180 [ 24.770759] ? preempt_count_sub+0x50/0x80 [ 24.770781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.770805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.770828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.770854] kthread+0x337/0x6f0 [ 24.770877] ? trace_preempt_on+0x20/0xc0 [ 24.770902] ? __pfx_kthread+0x10/0x10 [ 24.770922] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.770946] ? calculate_sigpending+0x7b/0xa0 [ 24.770969] ? __pfx_kthread+0x10/0x10 [ 24.770990] ret_from_fork+0x116/0x1d0 [ 24.771010] ? __pfx_kthread+0x10/0x10 [ 24.771030] ret_from_fork_asm+0x1a/0x30 [ 24.771061] </TASK> [ 24.771072] [ 24.781811] Allocated by task 207: [ 24.782103] kasan_save_stack+0x45/0x70 [ 24.782359] kasan_save_track+0x18/0x40 [ 24.782489] kasan_save_alloc_info+0x3b/0x50 [ 24.782822] __kasan_krealloc+0x190/0x1f0 [ 24.783017] krealloc_noprof+0xf3/0x340 [ 24.783223] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.783534] krealloc_less_oob+0x1c/0x30 [ 24.783692] kunit_try_run_case+0x1a5/0x480 [ 24.783854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.784170] kthread+0x337/0x6f0 [ 24.784341] ret_from_fork+0x116/0x1d0 [ 24.784640] ret_from_fork_asm+0x1a/0x30 [ 24.784786] [ 24.784852] The buggy address belongs to the object at ffff8881055e3c00 [ 24.784852] which belongs to the cache kmalloc-256 of size 256 [ 24.785666] The buggy address is located 0 bytes to the right of [ 24.785666] allocated 201-byte region [ffff8881055e3c00, ffff8881055e3cc9) [ 24.786030] [ 24.786188] The buggy address belongs to the physical page: [ 24.786530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e2 [ 24.786916] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.787323] flags: 0x200000000000040(head|node=0|zone=2) [ 24.787668] page_type: f5(slab) [ 24.787796] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.788295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.788515] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.789191] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.789717] head: 0200000000000001 ffffea0004157881 00000000ffffffff 00000000ffffffff [ 24.790072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.790507] page dumped because: kasan: bad access detected [ 24.790751] [ 24.790820] Memory state around the buggy address: [ 24.790972] ffff8881055e3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.791273] ffff8881055e3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.791767] >ffff8881055e3c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.792100] ^ [ 24.792312] ffff8881055e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.792761] ffff8881055e3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.793068] ================================================================== [ 24.818292] ================================================================== [ 24.818896] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 24.819254] Write of size 1 at addr ffff8881055e3cda by task kunit_try_catch/207 [ 24.819675] [ 24.819809] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.819874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.819886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.819908] Call Trace: [ 24.819924] <TASK> [ 24.819954] dump_stack_lvl+0x73/0xb0 [ 24.819997] print_report+0xd1/0x640 [ 24.820021] ? __virt_addr_valid+0x1db/0x2d0 [ 24.820056] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 24.820080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.820106] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 24.820129] kasan_report+0x141/0x180 [ 24.820173] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 24.820201] __asan_report_store1_noabort+0x1b/0x30 [ 24.820225] krealloc_less_oob_helper+0xec6/0x11d0 [ 24.820261] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.820284] ? finish_task_switch.isra.0+0x153/0x700 [ 24.820306] ? __switch_to+0x47/0xf80 [ 24.820333] ? __schedule+0x10da/0x2b60 [ 24.820366] ? __pfx_read_tsc+0x10/0x10 [ 24.820391] krealloc_less_oob+0x1c/0x30 [ 24.820412] kunit_try_run_case+0x1a5/0x480 [ 24.820443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.820473] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.820497] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.820522] ? __kthread_parkme+0x82/0x180 [ 24.820542] ? preempt_count_sub+0x50/0x80 [ 24.820565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.820588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.820611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.820634] kthread+0x337/0x6f0 [ 24.820654] ? trace_preempt_on+0x20/0xc0 [ 24.820678] ? __pfx_kthread+0x10/0x10 [ 24.820699] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.820722] ? calculate_sigpending+0x7b/0xa0 [ 24.820745] ? __pfx_kthread+0x10/0x10 [ 24.820766] ret_from_fork+0x116/0x1d0 [ 24.820786] ? __pfx_kthread+0x10/0x10 [ 24.820806] ret_from_fork_asm+0x1a/0x30 [ 24.820837] </TASK> [ 24.820849] [ 24.829031] Allocated by task 207: [ 24.829267] kasan_save_stack+0x45/0x70 [ 24.829739] kasan_save_track+0x18/0x40 [ 24.829947] kasan_save_alloc_info+0x3b/0x50 [ 24.830185] __kasan_krealloc+0x190/0x1f0 [ 24.830648] krealloc_noprof+0xf3/0x340 [ 24.830870] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.831265] krealloc_less_oob+0x1c/0x30 [ 24.831497] kunit_try_run_case+0x1a5/0x480 [ 24.831712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.831953] kthread+0x337/0x6f0 [ 24.832117] ret_from_fork+0x116/0x1d0 [ 24.832324] ret_from_fork_asm+0x1a/0x30 [ 24.832629] [ 24.832731] The buggy address belongs to the object at ffff8881055e3c00 [ 24.832731] which belongs to the cache kmalloc-256 of size 256 [ 24.833303] The buggy address is located 17 bytes to the right of [ 24.833303] allocated 201-byte region [ffff8881055e3c00, ffff8881055e3cc9) [ 24.833906] [ 24.833991] The buggy address belongs to the physical page: [ 24.834176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e2 [ 24.834416] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.834635] flags: 0x200000000000040(head|node=0|zone=2) [ 24.834807] page_type: f5(slab) [ 24.834924] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.835576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.836446] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.836747] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.837095] head: 0200000000000001 ffffea0004157881 00000000ffffffff 00000000ffffffff [ 24.837576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.837926] page dumped because: kasan: bad access detected [ 24.838134] [ 24.838207] Memory state around the buggy address: [ 24.838360] ffff8881055e3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.838571] ffff8881055e3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.838958] >ffff8881055e3c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.839303] ^ [ 24.839815] ffff8881055e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.840288] ffff8881055e3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.840498] ================================================================== [ 25.040846] ================================================================== [ 25.041131] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 25.041516] Write of size 1 at addr ffff8881060da0eb by task kunit_try_catch/211 [ 25.041802] [ 25.041914] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 25.042122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.042140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.042178] Call Trace: [ 25.042198] <TASK> [ 25.042217] dump_stack_lvl+0x73/0xb0 [ 25.042248] print_report+0xd1/0x640 [ 25.042271] ? __virt_addr_valid+0x1db/0x2d0 [ 25.042295] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 25.042319] ? kasan_addr_to_slab+0x11/0xa0 [ 25.042339] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 25.042363] kasan_report+0x141/0x180 [ 25.042385] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 25.042412] __asan_report_store1_noabort+0x1b/0x30 [ 25.042437] krealloc_less_oob_helper+0xd47/0x11d0 [ 25.042462] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 25.042486] ? finish_task_switch.isra.0+0x153/0x700 [ 25.042508] ? __switch_to+0x47/0xf80 [ 25.042534] ? __schedule+0x10da/0x2b60 [ 25.042560] ? __pfx_read_tsc+0x10/0x10 [ 25.042586] krealloc_large_less_oob+0x1c/0x30 [ 25.042608] kunit_try_run_case+0x1a5/0x480 [ 25.042633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.042655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.042680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.042705] ? __kthread_parkme+0x82/0x180 [ 25.042725] ? preempt_count_sub+0x50/0x80 [ 25.042747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.042771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.042794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.042817] kthread+0x337/0x6f0 [ 25.042837] ? trace_preempt_on+0x20/0xc0 [ 25.042861] ? __pfx_kthread+0x10/0x10 [ 25.042882] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.042905] ? calculate_sigpending+0x7b/0xa0 [ 25.042928] ? __pfx_kthread+0x10/0x10 [ 25.042949] ret_from_fork+0x116/0x1d0 [ 25.042969] ? __pfx_kthread+0x10/0x10 [ 25.042989] ret_from_fork_asm+0x1a/0x30 [ 25.043022] </TASK> [ 25.043034] [ 25.050575] The buggy address belongs to the physical page: [ 25.050799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d8 [ 25.051087] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.051443] flags: 0x200000000000040(head|node=0|zone=2) [ 25.051694] page_type: f8(unknown) [ 25.051868] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.052368] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.052755] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.053187] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.053527] head: 0200000000000002 ffffea0004183601 00000000ffffffff 00000000ffffffff [ 25.053834] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.054202] page dumped because: kasan: bad access detected [ 25.054472] [ 25.054559] Memory state around the buggy address: [ 25.054750] ffff8881060d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.055106] ffff8881060da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.055406] >ffff8881060da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.055632] ^ [ 25.055832] ffff8881060da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.056042] ffff8881060da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.056257] ================================================================== [ 24.872049] ================================================================== [ 24.872813] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 24.873362] Write of size 1 at addr ffff8881055e3ceb by task kunit_try_catch/207 [ 24.874092] [ 24.874285] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.874338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.874350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.874373] Call Trace: [ 24.874394] <TASK> [ 24.874416] dump_stack_lvl+0x73/0xb0 [ 24.874448] print_report+0xd1/0x640 [ 24.874525] ? __virt_addr_valid+0x1db/0x2d0 [ 24.874551] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.874574] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.874600] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.874624] kasan_report+0x141/0x180 [ 24.874645] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.874673] __asan_report_store1_noabort+0x1b/0x30 [ 24.874697] krealloc_less_oob_helper+0xd47/0x11d0 [ 24.874722] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.874745] ? finish_task_switch.isra.0+0x153/0x700 [ 24.874767] ? __switch_to+0x47/0xf80 [ 24.874793] ? __schedule+0x10da/0x2b60 [ 24.874818] ? __pfx_read_tsc+0x10/0x10 [ 24.874843] krealloc_less_oob+0x1c/0x30 [ 24.874865] kunit_try_run_case+0x1a5/0x480 [ 24.874890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.874912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.874936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.874968] ? __kthread_parkme+0x82/0x180 [ 24.874988] ? preempt_count_sub+0x50/0x80 [ 24.875011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.875034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.875057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.875080] kthread+0x337/0x6f0 [ 24.875100] ? trace_preempt_on+0x20/0xc0 [ 24.875124] ? __pfx_kthread+0x10/0x10 [ 24.875144] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.875181] ? calculate_sigpending+0x7b/0xa0 [ 24.875204] ? __pfx_kthread+0x10/0x10 [ 24.875226] ret_from_fork+0x116/0x1d0 [ 24.875246] ? __pfx_kthread+0x10/0x10 [ 24.875266] ret_from_fork_asm+0x1a/0x30 [ 24.875299] </TASK> [ 24.875310] [ 24.888998] Allocated by task 207: [ 24.889410] kasan_save_stack+0x45/0x70 [ 24.889795] kasan_save_track+0x18/0x40 [ 24.890165] kasan_save_alloc_info+0x3b/0x50 [ 24.890320] __kasan_krealloc+0x190/0x1f0 [ 24.890627] krealloc_noprof+0xf3/0x340 [ 24.891004] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.891455] krealloc_less_oob+0x1c/0x30 [ 24.891939] kunit_try_run_case+0x1a5/0x480 [ 24.892100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.892284] kthread+0x337/0x6f0 [ 24.892428] ret_from_fork+0x116/0x1d0 [ 24.892556] ret_from_fork_asm+0x1a/0x30 [ 24.892777] [ 24.892941] The buggy address belongs to the object at ffff8881055e3c00 [ 24.892941] which belongs to the cache kmalloc-256 of size 256 [ 24.893398] The buggy address is located 34 bytes to the right of [ 24.893398] allocated 201-byte region [ffff8881055e3c00, ffff8881055e3cc9) [ 24.894060] [ 24.894132] The buggy address belongs to the physical page: [ 24.894334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e2 [ 24.894975] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.895320] flags: 0x200000000000040(head|node=0|zone=2) [ 24.895794] page_type: f5(slab) [ 24.895953] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.896274] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.896768] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.897071] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.897348] head: 0200000000000001 ffffea0004157881 00000000ffffffff 00000000ffffffff [ 24.897616] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.897943] page dumped because: kasan: bad access detected [ 24.898274] [ 24.898343] Memory state around the buggy address: [ 24.898743] ffff8881055e3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.899047] ffff8881055e3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.899314] >ffff8881055e3c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.899911] ^ [ 24.900190] ffff8881055e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.900494] ffff8881055e3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.900818] ================================================================== [ 24.795180] ================================================================== [ 24.795499] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 24.796072] Write of size 1 at addr ffff8881055e3cd0 by task kunit_try_catch/207 [ 24.796400] [ 24.796514] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.796641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.796654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.796687] Call Trace: [ 24.796708] <TASK> [ 24.796729] dump_stack_lvl+0x73/0xb0 [ 24.796774] print_report+0xd1/0x640 [ 24.796798] ? __virt_addr_valid+0x1db/0x2d0 [ 24.796822] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.796846] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.796872] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.796904] kasan_report+0x141/0x180 [ 24.796926] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.796954] __asan_report_store1_noabort+0x1b/0x30 [ 24.796998] krealloc_less_oob_helper+0xe23/0x11d0 [ 24.797024] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.797048] ? finish_task_switch.isra.0+0x153/0x700 [ 24.797070] ? __switch_to+0x47/0xf80 [ 24.797097] ? __schedule+0x10da/0x2b60 [ 24.797129] ? __pfx_read_tsc+0x10/0x10 [ 24.797170] krealloc_less_oob+0x1c/0x30 [ 24.797192] kunit_try_run_case+0x1a5/0x480 [ 24.797217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.797239] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.797264] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.797288] ? __kthread_parkme+0x82/0x180 [ 24.797317] ? preempt_count_sub+0x50/0x80 [ 24.797339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.797363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.797407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.797431] kthread+0x337/0x6f0 [ 24.797451] ? trace_preempt_on+0x20/0xc0 [ 24.797476] ? __pfx_kthread+0x10/0x10 [ 24.797497] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.797520] ? calculate_sigpending+0x7b/0xa0 [ 24.797544] ? __pfx_kthread+0x10/0x10 [ 24.797565] ret_from_fork+0x116/0x1d0 [ 24.797585] ? __pfx_kthread+0x10/0x10 [ 24.797606] ret_from_fork_asm+0x1a/0x30 [ 24.797638] </TASK> [ 24.797649] [ 24.806086] Allocated by task 207: [ 24.806307] kasan_save_stack+0x45/0x70 [ 24.806584] kasan_save_track+0x18/0x40 [ 24.806782] kasan_save_alloc_info+0x3b/0x50 [ 24.807056] __kasan_krealloc+0x190/0x1f0 [ 24.807264] krealloc_noprof+0xf3/0x340 [ 24.807455] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.807758] krealloc_less_oob+0x1c/0x30 [ 24.807901] kunit_try_run_case+0x1a5/0x480 [ 24.808226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.808424] kthread+0x337/0x6f0 [ 24.808559] ret_from_fork+0x116/0x1d0 [ 24.808837] ret_from_fork_asm+0x1a/0x30 [ 24.809232] [ 24.809326] The buggy address belongs to the object at ffff8881055e3c00 [ 24.809326] which belongs to the cache kmalloc-256 of size 256 [ 24.809956] The buggy address is located 7 bytes to the right of [ 24.809956] allocated 201-byte region [ffff8881055e3c00, ffff8881055e3cc9) [ 24.810564] [ 24.810678] The buggy address belongs to the physical page: [ 24.810911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e2 [ 24.811296] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.811722] flags: 0x200000000000040(head|node=0|zone=2) [ 24.812002] page_type: f5(slab) [ 24.812206] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.812726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.813063] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.813558] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.813901] head: 0200000000000001 ffffea0004157881 00000000ffffffff 00000000ffffffff [ 24.814236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.814586] page dumped because: kasan: bad access detected [ 24.814840] [ 24.814909] Memory state around the buggy address: [ 24.815061] ffff8881055e3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.815285] ffff8881055e3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.815548] >ffff8881055e3c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.816082] ^ [ 24.816439] ffff8881055e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.816773] ffff8881055e3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.817312] ================================================================== [ 24.956130] ================================================================== [ 24.956758] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 24.957138] Write of size 1 at addr ffff8881060da0c9 by task kunit_try_catch/211 [ 24.957462] [ 24.957744] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.957840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.957854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.957876] Call Trace: [ 24.957890] <TASK> [ 24.957909] dump_stack_lvl+0x73/0xb0 [ 24.957944] print_report+0xd1/0x640 [ 24.957968] ? __virt_addr_valid+0x1db/0x2d0 [ 24.957992] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.958016] ? kasan_addr_to_slab+0x11/0xa0 [ 24.958037] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.958075] kasan_report+0x141/0x180 [ 24.958098] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 24.958126] __asan_report_store1_noabort+0x1b/0x30 [ 24.958163] krealloc_less_oob_helper+0xd70/0x11d0 [ 24.958209] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.958233] ? finish_task_switch.isra.0+0x153/0x700 [ 24.958255] ? __switch_to+0x47/0xf80 [ 24.958282] ? __schedule+0x10da/0x2b60 [ 24.958326] ? __pfx_read_tsc+0x10/0x10 [ 24.958351] krealloc_large_less_oob+0x1c/0x30 [ 24.958374] kunit_try_run_case+0x1a5/0x480 [ 24.958483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.958506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.958532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.958558] ? __kthread_parkme+0x82/0x180 [ 24.958578] ? preempt_count_sub+0x50/0x80 [ 24.958601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.958626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.958649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.958672] kthread+0x337/0x6f0 [ 24.958693] ? trace_preempt_on+0x20/0xc0 [ 24.958718] ? __pfx_kthread+0x10/0x10 [ 24.958739] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.958763] ? calculate_sigpending+0x7b/0xa0 [ 24.958787] ? __pfx_kthread+0x10/0x10 [ 24.958809] ret_from_fork+0x116/0x1d0 [ 24.958829] ? __pfx_kthread+0x10/0x10 [ 24.958849] ret_from_fork_asm+0x1a/0x30 [ 24.958881] </TASK> [ 24.958893] [ 24.968478] The buggy address belongs to the physical page: [ 24.968893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d8 [ 24.969489] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.969802] flags: 0x200000000000040(head|node=0|zone=2) [ 24.970693] page_type: f8(unknown) [ 24.970886] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.971655] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.972020] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.972330] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.973581] head: 0200000000000002 ffffea0004183601 00000000ffffffff 00000000ffffffff [ 24.974307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.974736] page dumped because: kasan: bad access detected [ 24.975183] [ 24.975471] Memory state around the buggy address: [ 24.975964] ffff8881060d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.976307] ffff8881060da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.976793] >ffff8881060da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.977252] ^ [ 24.977616] ffff8881060da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.977894] ffff8881060da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.978837] ================================================================== [ 25.006610] ================================================================== [ 25.006853] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 25.007253] Write of size 1 at addr ffff8881060da0da by task kunit_try_catch/211 [ 25.007646] [ 25.007764] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 25.007815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.007827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.007848] Call Trace: [ 25.007869] <TASK> [ 25.007888] dump_stack_lvl+0x73/0xb0 [ 25.007917] print_report+0xd1/0x640 [ 25.007941] ? __virt_addr_valid+0x1db/0x2d0 [ 25.007965] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 25.007988] ? kasan_addr_to_slab+0x11/0xa0 [ 25.008008] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 25.008032] kasan_report+0x141/0x180 [ 25.008053] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 25.008080] __asan_report_store1_noabort+0x1b/0x30 [ 25.008104] krealloc_less_oob_helper+0xec6/0x11d0 [ 25.008129] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 25.008165] ? finish_task_switch.isra.0+0x153/0x700 [ 25.008186] ? __switch_to+0x47/0xf80 [ 25.008213] ? __schedule+0x10da/0x2b60 [ 25.008238] ? __pfx_read_tsc+0x10/0x10 [ 25.008262] krealloc_large_less_oob+0x1c/0x30 [ 25.008285] kunit_try_run_case+0x1a5/0x480 [ 25.008310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.008331] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.008355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.008426] ? __kthread_parkme+0x82/0x180 [ 25.008450] ? preempt_count_sub+0x50/0x80 [ 25.008472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.008495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.008518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.008541] kthread+0x337/0x6f0 [ 25.008562] ? trace_preempt_on+0x20/0xc0 [ 25.008586] ? __pfx_kthread+0x10/0x10 [ 25.008606] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.008629] ? calculate_sigpending+0x7b/0xa0 [ 25.008653] ? __pfx_kthread+0x10/0x10 [ 25.008674] ret_from_fork+0x116/0x1d0 [ 25.008694] ? __pfx_kthread+0x10/0x10 [ 25.008714] ret_from_fork_asm+0x1a/0x30 [ 25.008746] </TASK> [ 25.008758] [ 25.016695] The buggy address belongs to the physical page: [ 25.016924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d8 [ 25.017304] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.017667] flags: 0x200000000000040(head|node=0|zone=2) [ 25.017921] page_type: f8(unknown) [ 25.018105] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.018434] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.018717] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.018945] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.019280] head: 0200000000000002 ffffea0004183601 00000000ffffffff 00000000ffffffff [ 25.019757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.020038] page dumped because: kasan: bad access detected [ 25.020571] [ 25.020678] Memory state around the buggy address: [ 25.020910] ffff8881060d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.021399] ffff8881060da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.021672] >ffff8881060da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.022014] ^ [ 25.022245] ffff8881060da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.022764] ffff8881060da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.023046] ================================================================== [ 25.023390] ================================================================== [ 25.023644] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 25.023883] Write of size 1 at addr ffff8881060da0ea by task kunit_try_catch/211 [ 25.024099] [ 25.024191] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 25.024237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.024249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.024270] Call Trace: [ 25.024288] <TASK> [ 25.024305] dump_stack_lvl+0x73/0xb0 [ 25.024330] print_report+0xd1/0x640 [ 25.024352] ? __virt_addr_valid+0x1db/0x2d0 [ 25.024374] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 25.024396] ? kasan_addr_to_slab+0x11/0xa0 [ 25.024416] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 25.024438] kasan_report+0x141/0x180 [ 25.024637] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 25.024670] __asan_report_store1_noabort+0x1b/0x30 [ 25.024696] krealloc_less_oob_helper+0xe90/0x11d0 [ 25.024722] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 25.024746] ? finish_task_switch.isra.0+0x153/0x700 [ 25.024768] ? __switch_to+0x47/0xf80 [ 25.024794] ? __schedule+0x10da/0x2b60 [ 25.024820] ? __pfx_read_tsc+0x10/0x10 [ 25.024845] krealloc_large_less_oob+0x1c/0x30 [ 25.024868] kunit_try_run_case+0x1a5/0x480 [ 25.024893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.024915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.024940] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.024966] ? __kthread_parkme+0x82/0x180 [ 25.024987] ? preempt_count_sub+0x50/0x80 [ 25.025009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.025032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.025056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.025079] kthread+0x337/0x6f0 [ 25.025099] ? trace_preempt_on+0x20/0xc0 [ 25.025123] ? __pfx_kthread+0x10/0x10 [ 25.025144] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.025182] ? calculate_sigpending+0x7b/0xa0 [ 25.025206] ? __pfx_kthread+0x10/0x10 [ 25.025228] ret_from_fork+0x116/0x1d0 [ 25.025248] ? __pfx_kthread+0x10/0x10 [ 25.025269] ret_from_fork_asm+0x1a/0x30 [ 25.025302] </TASK> [ 25.025314] [ 25.034070] The buggy address belongs to the physical page: [ 25.034341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d8 [ 25.034775] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.035099] flags: 0x200000000000040(head|node=0|zone=2) [ 25.035320] page_type: f8(unknown) [ 25.035498] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.035780] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.036117] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.036434] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.036690] head: 0200000000000002 ffffea0004183601 00000000ffffffff 00000000ffffffff [ 25.036917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.037249] page dumped because: kasan: bad access detected [ 25.037583] [ 25.037672] Memory state around the buggy address: [ 25.037890] ffff8881060d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.038633] ffff8881060da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.038953] >ffff8881060da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.039306] ^ [ 25.039646] ffff8881060da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.040139] ffff8881060da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.040411] ================================================================== [ 24.980189] ================================================================== [ 24.980638] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 24.981599] Write of size 1 at addr ffff8881060da0d0 by task kunit_try_catch/211 [ 24.981916] [ 24.982193] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.982358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.982373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.982396] Call Trace: [ 24.982410] <TASK> [ 24.982455] dump_stack_lvl+0x73/0xb0 [ 24.982495] print_report+0xd1/0x640 [ 24.982519] ? __virt_addr_valid+0x1db/0x2d0 [ 24.982543] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.982567] ? kasan_addr_to_slab+0x11/0xa0 [ 24.982589] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.982613] kasan_report+0x141/0x180 [ 24.982635] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 24.982662] __asan_report_store1_noabort+0x1b/0x30 [ 24.982686] krealloc_less_oob_helper+0xe23/0x11d0 [ 24.982711] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.982734] ? finish_task_switch.isra.0+0x153/0x700 [ 24.982755] ? __switch_to+0x47/0xf80 [ 24.982782] ? __schedule+0x10da/0x2b60 [ 24.982806] ? __pfx_read_tsc+0x10/0x10 [ 24.982830] krealloc_large_less_oob+0x1c/0x30 [ 24.982852] kunit_try_run_case+0x1a5/0x480 [ 24.982877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.982899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.982922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.983203] ? __kthread_parkme+0x82/0x180 [ 24.983242] ? preempt_count_sub+0x50/0x80 [ 24.983265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.983290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.983315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.983337] kthread+0x337/0x6f0 [ 24.983358] ? trace_preempt_on+0x20/0xc0 [ 24.983441] ? __pfx_kthread+0x10/0x10 [ 24.983462] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.983486] ? calculate_sigpending+0x7b/0xa0 [ 24.983510] ? __pfx_kthread+0x10/0x10 [ 24.983530] ret_from_fork+0x116/0x1d0 [ 24.983550] ? __pfx_kthread+0x10/0x10 [ 24.983570] ret_from_fork_asm+0x1a/0x30 [ 24.983602] </TASK> [ 24.983613] [ 24.996507] The buggy address belongs to the physical page: [ 24.996839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d8 [ 24.997420] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.997920] flags: 0x200000000000040(head|node=0|zone=2) [ 24.998362] page_type: f8(unknown) [ 24.998840] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.999453] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.000070] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.000414] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.000728] head: 0200000000000002 ffffea0004183601 00000000ffffffff 00000000ffffffff [ 25.001414] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.001775] page dumped because: kasan: bad access detected [ 25.002221] [ 25.002478] Memory state around the buggy address: [ 25.003160] ffff8881060d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.003769] ffff8881060da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.004422] >ffff8881060da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.004708] ^ [ 25.004954] ffff8881060da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.005241] ffff8881060da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.005909] ================================================================== [ 24.841295] ================================================================== [ 24.841725] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 24.842015] Write of size 1 at addr ffff8881055e3cea by task kunit_try_catch/207 [ 24.842370] [ 24.842489] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.842599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.842611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.842632] Call Trace: [ 24.842653] <TASK> [ 24.842673] dump_stack_lvl+0x73/0xb0 [ 24.842713] print_report+0xd1/0x640 [ 24.842736] ? __virt_addr_valid+0x1db/0x2d0 [ 24.842761] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.842795] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.842821] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.842845] kasan_report+0x141/0x180 [ 24.842875] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.842903] __asan_report_store1_noabort+0x1b/0x30 [ 24.842927] krealloc_less_oob_helper+0xe90/0x11d0 [ 24.842976] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.843000] ? finish_task_switch.isra.0+0x153/0x700 [ 24.843022] ? __switch_to+0x47/0xf80 [ 24.843049] ? __schedule+0x10da/0x2b60 [ 24.843082] ? __pfx_read_tsc+0x10/0x10 [ 24.843108] krealloc_less_oob+0x1c/0x30 [ 24.843129] kunit_try_run_case+0x1a5/0x480 [ 24.843174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.843196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.843220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.843246] ? __kthread_parkme+0x82/0x180 [ 24.843274] ? preempt_count_sub+0x50/0x80 [ 24.843297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.843320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.843353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.843477] kthread+0x337/0x6f0 [ 24.843506] ? trace_preempt_on+0x20/0xc0 [ 24.843531] ? __pfx_kthread+0x10/0x10 [ 24.843564] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.843588] ? calculate_sigpending+0x7b/0xa0 [ 24.843611] ? __pfx_kthread+0x10/0x10 [ 24.843637] ret_from_fork+0x116/0x1d0 [ 24.843793] ? __pfx_kthread+0x10/0x10 [ 24.843819] ret_from_fork_asm+0x1a/0x30 [ 24.843862] </TASK> [ 24.843873] [ 24.852810] Allocated by task 207: [ 24.852951] kasan_save_stack+0x45/0x70 [ 24.853286] kasan_save_track+0x18/0x40 [ 24.853776] kasan_save_alloc_info+0x3b/0x50 [ 24.854209] __kasan_krealloc+0x190/0x1f0 [ 24.854559] krealloc_noprof+0xf3/0x340 [ 24.854932] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.855633] krealloc_less_oob+0x1c/0x30 [ 24.856006] kunit_try_run_case+0x1a5/0x480 [ 24.856396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.856905] kthread+0x337/0x6f0 [ 24.857058] ret_from_fork+0x116/0x1d0 [ 24.857201] ret_from_fork_asm+0x1a/0x30 [ 24.857338] [ 24.857456] The buggy address belongs to the object at ffff8881055e3c00 [ 24.857456] which belongs to the cache kmalloc-256 of size 256 [ 24.858548] The buggy address is located 33 bytes to the right of [ 24.858548] allocated 201-byte region [ffff8881055e3c00, ffff8881055e3cc9) [ 24.859853] [ 24.860204] The buggy address belongs to the physical page: [ 24.860754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e2 [ 24.861280] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.861841] flags: 0x200000000000040(head|node=0|zone=2) [ 24.862210] page_type: f5(slab) [ 24.862550] raw: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.863234] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.863491] head: 0200000000000040 ffff888100041b40 dead000000000100 dead000000000122 [ 24.863724] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.864171] head: 0200000000000001 ffffea0004157881 00000000ffffffff 00000000ffffffff [ 24.864916] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.865678] page dumped because: kasan: bad access detected [ 24.866189] [ 24.866341] Memory state around the buggy address: [ 24.866898] ffff8881055e3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.867706] ffff8881055e3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.868608] >ffff8881055e3c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.869326] ^ [ 24.869618] ffff8881055e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.870196] ffff8881055e3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.870919] ==================================================================