Date
July 23, 2025, 3:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.254124] ================================================================== [ 30.254473] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.254561] Write of size 1 at addr fff00000c9ae60eb by task kunit_try_catch/193 [ 30.254614] [ 30.254827] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.255101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.255167] Hardware name: linux,dummy-virt (DT) [ 30.255217] Call trace: [ 30.255245] show_stack+0x20/0x38 (C) [ 30.255816] dump_stack_lvl+0x8c/0xd0 [ 30.256069] print_report+0x118/0x5e8 [ 30.256127] kasan_report+0xdc/0x128 [ 30.256171] __asan_report_store1_noabort+0x20/0x30 [ 30.256218] krealloc_more_oob_helper+0x60c/0x678 [ 30.256418] krealloc_large_more_oob+0x20/0x38 [ 30.256886] kunit_try_run_case+0x170/0x3f0 [ 30.257072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.257230] kthread+0x328/0x630 [ 30.257319] ret_from_fork+0x10/0x20 [ 30.257461] [ 30.257501] The buggy address belongs to the physical page: [ 30.257556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.257675] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.257745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.257957] page_type: f8(unknown) [ 30.258164] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.258275] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.258367] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.258585] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.258698] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.258884] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.259016] page dumped because: kasan: bad access detected [ 30.259057] [ 30.259085] Memory state around the buggy address: [ 30.259249] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.259640] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.259869] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.259923] ^ [ 30.260276] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.260410] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.260474] ================================================================== [ 30.169020] ================================================================== [ 30.169078] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.169132] Write of size 1 at addr fff00000c91e62eb by task kunit_try_catch/189 [ 30.169195] [ 30.169225] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.169565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.169604] Hardware name: linux,dummy-virt (DT) [ 30.169725] Call trace: [ 30.169809] show_stack+0x20/0x38 (C) [ 30.169884] dump_stack_lvl+0x8c/0xd0 [ 30.169941] print_report+0x118/0x5e8 [ 30.169984] kasan_report+0xdc/0x128 [ 30.170032] __asan_report_store1_noabort+0x20/0x30 [ 30.170258] krealloc_more_oob_helper+0x60c/0x678 [ 30.170353] krealloc_more_oob+0x20/0x38 [ 30.170469] kunit_try_run_case+0x170/0x3f0 [ 30.170521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.170577] kthread+0x328/0x630 [ 30.170631] ret_from_fork+0x10/0x20 [ 30.170678] [ 30.170697] Allocated by task 189: [ 30.170756] kasan_save_stack+0x3c/0x68 [ 30.170917] kasan_save_track+0x20/0x40 [ 30.170951] kasan_save_alloc_info+0x40/0x58 [ 30.170987] __kasan_krealloc+0x118/0x178 [ 30.171021] krealloc_noprof+0x128/0x360 [ 30.171055] krealloc_more_oob_helper+0x168/0x678 [ 30.171395] krealloc_more_oob+0x20/0x38 [ 30.171457] kunit_try_run_case+0x170/0x3f0 [ 30.171493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.171535] kthread+0x328/0x630 [ 30.171914] ret_from_fork+0x10/0x20 [ 30.171966] [ 30.171988] The buggy address belongs to the object at fff00000c91e6200 [ 30.171988] which belongs to the cache kmalloc-256 of size 256 [ 30.172046] The buggy address is located 0 bytes to the right of [ 30.172046] allocated 235-byte region [fff00000c91e6200, fff00000c91e62eb) [ 30.172108] [ 30.172129] The buggy address belongs to the physical page: [ 30.172166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.172237] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.172327] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.172444] page_type: f5(slab) [ 30.172480] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.172779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.173379] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.173446] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.174007] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.174058] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.174096] page dumped because: kasan: bad access detected [ 30.174125] [ 30.174142] Memory state around the buggy address: [ 30.174957] fff00000c91e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.175297] fff00000c91e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.175812] >fff00000c91e6280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.175878] ^ [ 30.176483] fff00000c91e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.176766] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177180] ================================================================== [ 30.179035] ================================================================== [ 30.180670] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.181075] Write of size 1 at addr fff00000c91e62f0 by task kunit_try_catch/189 [ 30.181520] [ 30.182073] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.182878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.182920] Hardware name: linux,dummy-virt (DT) [ 30.183789] Call trace: [ 30.183832] show_stack+0x20/0x38 (C) [ 30.184194] dump_stack_lvl+0x8c/0xd0 [ 30.184248] print_report+0x118/0x5e8 [ 30.184292] kasan_report+0xdc/0x128 [ 30.184333] __asan_report_store1_noabort+0x20/0x30 [ 30.184380] krealloc_more_oob_helper+0x5c0/0x678 [ 30.185395] krealloc_more_oob+0x20/0x38 [ 30.185849] kunit_try_run_case+0x170/0x3f0 [ 30.186081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.186709] kthread+0x328/0x630 [ 30.187195] ret_from_fork+0x10/0x20 [ 30.187339] [ 30.187406] Allocated by task 189: [ 30.187434] kasan_save_stack+0x3c/0x68 [ 30.187476] kasan_save_track+0x20/0x40 [ 30.188499] kasan_save_alloc_info+0x40/0x58 [ 30.188554] __kasan_krealloc+0x118/0x178 [ 30.189350] krealloc_noprof+0x128/0x360 [ 30.189509] krealloc_more_oob_helper+0x168/0x678 [ 30.189657] krealloc_more_oob+0x20/0x38 [ 30.190054] kunit_try_run_case+0x170/0x3f0 [ 30.190548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.190743] kthread+0x328/0x630 [ 30.191050] ret_from_fork+0x10/0x20 [ 30.191463] [ 30.191502] The buggy address belongs to the object at fff00000c91e6200 [ 30.191502] which belongs to the cache kmalloc-256 of size 256 [ 30.192129] The buggy address is located 5 bytes to the right of [ 30.192129] allocated 235-byte region [fff00000c91e6200, fff00000c91e62eb) [ 30.192252] [ 30.192858] The buggy address belongs to the physical page: [ 30.192929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.193728] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.193786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.194531] page_type: f5(slab) [ 30.194615] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.194850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.195233] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.195752] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.195859] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.195940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.196685] page dumped because: kasan: bad access detected [ 30.196724] [ 30.196745] Memory state around the buggy address: [ 30.197299] fff00000c91e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.197490] fff00000c91e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.197581] >fff00000c91e6280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.197734] ^ [ 30.198467] fff00000c91e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.198762] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.199129] ================================================================== [ 30.263613] ================================================================== [ 30.263668] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.263996] Write of size 1 at addr fff00000c9ae60f0 by task kunit_try_catch/193 [ 30.264127] [ 30.264165] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.264249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.264402] Hardware name: linux,dummy-virt (DT) [ 30.264464] Call trace: [ 30.264488] show_stack+0x20/0x38 (C) [ 30.264772] dump_stack_lvl+0x8c/0xd0 [ 30.265019] print_report+0x118/0x5e8 [ 30.265073] kasan_report+0xdc/0x128 [ 30.265116] __asan_report_store1_noabort+0x20/0x30 [ 30.265163] krealloc_more_oob_helper+0x5c0/0x678 [ 30.265635] krealloc_large_more_oob+0x20/0x38 [ 30.265735] kunit_try_run_case+0x170/0x3f0 [ 30.265931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.266155] kthread+0x328/0x630 [ 30.266227] ret_from_fork+0x10/0x20 [ 30.266541] [ 30.266670] The buggy address belongs to the physical page: [ 30.266838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.267068] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.267195] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.267421] page_type: f8(unknown) [ 30.267659] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.267775] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.267832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.268158] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.268310] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.268385] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.268667] page dumped because: kasan: bad access detected [ 30.268883] [ 30.268984] Memory state around the buggy address: [ 30.269018] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.269309] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.269473] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.269566] ^ [ 30.269634] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.269681] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.269743] ==================================================================
[ 24.726592] ================================================================== [ 24.727554] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 24.728038] Write of size 1 at addr ffff8881048150f0 by task kunit_try_catch/205 [ 24.728886] [ 24.729093] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.729144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.729168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.729190] Call Trace: [ 24.729203] <TASK> [ 24.729222] dump_stack_lvl+0x73/0xb0 [ 24.729254] print_report+0xd1/0x640 [ 24.729277] ? __virt_addr_valid+0x1db/0x2d0 [ 24.729302] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.729325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.729350] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.729374] kasan_report+0x141/0x180 [ 24.729519] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.729548] __asan_report_store1_noabort+0x1b/0x30 [ 24.729574] krealloc_more_oob_helper+0x7eb/0x930 [ 24.729597] ? __schedule+0x10da/0x2b60 [ 24.729623] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.729646] ? finish_task_switch.isra.0+0x153/0x700 [ 24.729668] ? __switch_to+0x47/0xf80 [ 24.729694] ? __schedule+0x10da/0x2b60 [ 24.729718] ? __pfx_read_tsc+0x10/0x10 [ 24.729743] krealloc_more_oob+0x1c/0x30 [ 24.729764] kunit_try_run_case+0x1a5/0x480 [ 24.729790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.729812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.729836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.729861] ? __kthread_parkme+0x82/0x180 [ 24.729881] ? preempt_count_sub+0x50/0x80 [ 24.729904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.729927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.729958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.729981] kthread+0x337/0x6f0 [ 24.730001] ? trace_preempt_on+0x20/0xc0 [ 24.730026] ? __pfx_kthread+0x10/0x10 [ 24.730047] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.730070] ? calculate_sigpending+0x7b/0xa0 [ 24.730094] ? __pfx_kthread+0x10/0x10 [ 24.730115] ret_from_fork+0x116/0x1d0 [ 24.730134] ? __pfx_kthread+0x10/0x10 [ 24.730167] ret_from_fork_asm+0x1a/0x30 [ 24.730198] </TASK> [ 24.730210] [ 24.745683] Allocated by task 205: [ 24.746098] kasan_save_stack+0x45/0x70 [ 24.746278] kasan_save_track+0x18/0x40 [ 24.746422] kasan_save_alloc_info+0x3b/0x50 [ 24.746792] __kasan_krealloc+0x190/0x1f0 [ 24.747459] krealloc_noprof+0xf3/0x340 [ 24.747825] krealloc_more_oob_helper+0x1a9/0x930 [ 24.748379] krealloc_more_oob+0x1c/0x30 [ 24.748730] kunit_try_run_case+0x1a5/0x480 [ 24.749167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.749347] kthread+0x337/0x6f0 [ 24.749670] ret_from_fork+0x116/0x1d0 [ 24.750069] ret_from_fork_asm+0x1a/0x30 [ 24.750528] [ 24.750710] The buggy address belongs to the object at ffff888104815000 [ 24.750710] which belongs to the cache kmalloc-256 of size 256 [ 24.751530] The buggy address is located 5 bytes to the right of [ 24.751530] allocated 235-byte region [ffff888104815000, ffff8881048150eb) [ 24.752572] [ 24.752763] The buggy address belongs to the physical page: [ 24.753309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104814 [ 24.754164] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.754472] flags: 0x200000000000040(head|node=0|zone=2) [ 24.754643] page_type: f5(slab) [ 24.754790] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.755553] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.756295] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.757179] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.758067] head: 0200000000000001 ffffea0004120501 00000000ffffffff 00000000ffffffff [ 24.758367] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.759141] page dumped because: kasan: bad access detected [ 24.759718] [ 24.759784] Memory state around the buggy address: [ 24.759932] ffff888104814f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.760137] ffff888104815000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.760358] >ffff888104815080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.760845] ^ [ 24.761548] ffff888104815100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.762299] ffff888104815180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.763040] ================================================================== [ 24.932553] ================================================================== [ 24.932903] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 24.933222] Write of size 1 at addr ffff8881060da0f0 by task kunit_try_catch/209 [ 24.933820] [ 24.933924] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.933974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.933986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.934006] Call Trace: [ 24.934019] <TASK> [ 24.934037] dump_stack_lvl+0x73/0xb0 [ 24.934069] print_report+0xd1/0x640 [ 24.934091] ? __virt_addr_valid+0x1db/0x2d0 [ 24.934116] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.934139] ? kasan_addr_to_slab+0x11/0xa0 [ 24.934174] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.934198] kasan_report+0x141/0x180 [ 24.934219] ? krealloc_more_oob_helper+0x7eb/0x930 [ 24.934247] __asan_report_store1_noabort+0x1b/0x30 [ 24.934271] krealloc_more_oob_helper+0x7eb/0x930 [ 24.934293] ? __schedule+0x10da/0x2b60 [ 24.934318] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.934341] ? finish_task_switch.isra.0+0x153/0x700 [ 24.934362] ? __switch_to+0x47/0xf80 [ 24.934606] ? __schedule+0x10da/0x2b60 [ 24.934636] ? __pfx_read_tsc+0x10/0x10 [ 24.934661] krealloc_large_more_oob+0x1c/0x30 [ 24.934685] kunit_try_run_case+0x1a5/0x480 [ 24.934711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.934733] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.934757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.934782] ? __kthread_parkme+0x82/0x180 [ 24.934802] ? preempt_count_sub+0x50/0x80 [ 24.934825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.934848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.934872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.934894] kthread+0x337/0x6f0 [ 24.934915] ? trace_preempt_on+0x20/0xc0 [ 24.934939] ? __pfx_kthread+0x10/0x10 [ 24.934975] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.934998] ? calculate_sigpending+0x7b/0xa0 [ 24.935022] ? __pfx_kthread+0x10/0x10 [ 24.935043] ret_from_fork+0x116/0x1d0 [ 24.935063] ? __pfx_kthread+0x10/0x10 [ 24.935083] ret_from_fork_asm+0x1a/0x30 [ 24.935115] </TASK> [ 24.935126] [ 24.943984] The buggy address belongs to the physical page: [ 24.944277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d8 [ 24.944646] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.945020] flags: 0x200000000000040(head|node=0|zone=2) [ 24.945589] page_type: f8(unknown) [ 24.945764] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.946119] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.946435] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.946805] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.947252] head: 0200000000000002 ffffea0004183601 00000000ffffffff 00000000ffffffff [ 24.947610] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.947964] page dumped because: kasan: bad access detected [ 24.948250] [ 24.948607] Memory state around the buggy address: [ 24.948869] ffff8881060d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.949111] ffff8881060da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.949491] >ffff8881060da080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.949812] ^ [ 24.950234] ffff8881060da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.950576] ffff8881060da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.950910] ================================================================== [ 24.904834] ================================================================== [ 24.906091] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 24.906494] Write of size 1 at addr ffff8881060da0eb by task kunit_try_catch/209 [ 24.906906] [ 24.907900] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.907965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.907978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.908000] Call Trace: [ 24.908017] <TASK> [ 24.908038] dump_stack_lvl+0x73/0xb0 [ 24.908072] print_report+0xd1/0x640 [ 24.908096] ? __virt_addr_valid+0x1db/0x2d0 [ 24.908121] ? krealloc_more_oob_helper+0x821/0x930 [ 24.908158] ? kasan_addr_to_slab+0x11/0xa0 [ 24.908179] ? krealloc_more_oob_helper+0x821/0x930 [ 24.908202] kasan_report+0x141/0x180 [ 24.908224] ? krealloc_more_oob_helper+0x821/0x930 [ 24.908252] __asan_report_store1_noabort+0x1b/0x30 [ 24.908276] krealloc_more_oob_helper+0x821/0x930 [ 24.908298] ? __schedule+0x10da/0x2b60 [ 24.908323] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.908346] ? finish_task_switch.isra.0+0x153/0x700 [ 24.908423] ? __switch_to+0x47/0xf80 [ 24.908457] ? __schedule+0x10da/0x2b60 [ 24.908481] ? __pfx_read_tsc+0x10/0x10 [ 24.908505] krealloc_large_more_oob+0x1c/0x30 [ 24.908528] kunit_try_run_case+0x1a5/0x480 [ 24.908554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.908576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.908600] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.908625] ? __kthread_parkme+0x82/0x180 [ 24.908645] ? preempt_count_sub+0x50/0x80 [ 24.908668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.908691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.908714] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.908736] kthread+0x337/0x6f0 [ 24.908757] ? trace_preempt_on+0x20/0xc0 [ 24.908781] ? __pfx_kthread+0x10/0x10 [ 24.908801] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.908824] ? calculate_sigpending+0x7b/0xa0 [ 24.908848] ? __pfx_kthread+0x10/0x10 [ 24.908868] ret_from_fork+0x116/0x1d0 [ 24.908888] ? __pfx_kthread+0x10/0x10 [ 24.908908] ret_from_fork_asm+0x1a/0x30 [ 24.908941] </TASK> [ 24.908952] [ 24.922637] The buggy address belongs to the physical page: [ 24.923121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d8 [ 24.923947] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.924623] flags: 0x200000000000040(head|node=0|zone=2) [ 24.925074] page_type: f8(unknown) [ 24.925214] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.925525] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.926181] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.926901] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.927729] head: 0200000000000002 ffffea0004183601 00000000ffffffff 00000000ffffffff [ 24.928224] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.928627] page dumped because: kasan: bad access detected [ 24.929186] [ 24.929337] Memory state around the buggy address: [ 24.929807] ffff8881060d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.930486] ffff8881060da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.930699] >ffff8881060da080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.930902] ^ [ 24.931228] ffff8881060da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.931497] ffff8881060da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.931847] ================================================================== [ 24.685561] ================================================================== [ 24.686058] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 24.686616] Write of size 1 at addr ffff8881048150eb by task kunit_try_catch/205 [ 24.687634] [ 24.687880] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.687937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.687950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.687972] Call Trace: [ 24.687986] <TASK> [ 24.688005] dump_stack_lvl+0x73/0xb0 [ 24.688039] print_report+0xd1/0x640 [ 24.688064] ? __virt_addr_valid+0x1db/0x2d0 [ 24.688088] ? krealloc_more_oob_helper+0x821/0x930 [ 24.688111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.688136] ? krealloc_more_oob_helper+0x821/0x930 [ 24.688171] kasan_report+0x141/0x180 [ 24.688193] ? krealloc_more_oob_helper+0x821/0x930 [ 24.688220] __asan_report_store1_noabort+0x1b/0x30 [ 24.688244] krealloc_more_oob_helper+0x821/0x930 [ 24.688266] ? __schedule+0x10da/0x2b60 [ 24.688405] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.688525] ? finish_task_switch.isra.0+0x153/0x700 [ 24.688550] ? __switch_to+0x47/0xf80 [ 24.688591] ? __schedule+0x10da/0x2b60 [ 24.688616] ? __pfx_read_tsc+0x10/0x10 [ 24.688640] krealloc_more_oob+0x1c/0x30 [ 24.688662] kunit_try_run_case+0x1a5/0x480 [ 24.688688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.688710] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.688734] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.688759] ? __kthread_parkme+0x82/0x180 [ 24.688778] ? preempt_count_sub+0x50/0x80 [ 24.688801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.688824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.688846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.688869] kthread+0x337/0x6f0 [ 24.688888] ? trace_preempt_on+0x20/0xc0 [ 24.688914] ? __pfx_kthread+0x10/0x10 [ 24.688934] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.688967] ? calculate_sigpending+0x7b/0xa0 [ 24.688992] ? __pfx_kthread+0x10/0x10 [ 24.689012] ret_from_fork+0x116/0x1d0 [ 24.689032] ? __pfx_kthread+0x10/0x10 [ 24.689052] ret_from_fork_asm+0x1a/0x30 [ 24.689083] </TASK> [ 24.689094] [ 24.705645] Allocated by task 205: [ 24.705885] kasan_save_stack+0x45/0x70 [ 24.706319] kasan_save_track+0x18/0x40 [ 24.706693] kasan_save_alloc_info+0x3b/0x50 [ 24.707253] __kasan_krealloc+0x190/0x1f0 [ 24.707716] krealloc_noprof+0xf3/0x340 [ 24.708170] krealloc_more_oob_helper+0x1a9/0x930 [ 24.708635] krealloc_more_oob+0x1c/0x30 [ 24.709100] kunit_try_run_case+0x1a5/0x480 [ 24.709504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.710034] kthread+0x337/0x6f0 [ 24.710330] ret_from_fork+0x116/0x1d0 [ 24.710466] ret_from_fork_asm+0x1a/0x30 [ 24.711033] [ 24.711253] The buggy address belongs to the object at ffff888104815000 [ 24.711253] which belongs to the cache kmalloc-256 of size 256 [ 24.712686] The buggy address is located 0 bytes to the right of [ 24.712686] allocated 235-byte region [ffff888104815000, ffff8881048150eb) [ 24.713414] [ 24.713507] The buggy address belongs to the physical page: [ 24.713691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104814 [ 24.713937] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.714953] flags: 0x200000000000040(head|node=0|zone=2) [ 24.715460] page_type: f5(slab) [ 24.715818] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.716745] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.717567] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.718448] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.719212] head: 0200000000000001 ffffea0004120501 00000000ffffffff 00000000ffffffff [ 24.719798] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.720074] page dumped because: kasan: bad access detected [ 24.720785] [ 24.720954] Memory state around the buggy address: [ 24.721551] ffff888104814f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.722275] ffff888104815000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.723074] >ffff888104815080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.723312] ^ [ 24.723979] ffff888104815100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.724729] ffff888104815180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.725274] ==================================================================