Date
July 24, 2025, 4:41 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.297301] ================================================================== [ 32.297437] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.297553] Write of size 1 at addr fff00000c8575ceb by task kunit_try_catch/187 [ 32.297605] [ 32.297682] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.297783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.297828] Hardware name: linux,dummy-virt (DT) [ 32.297861] Call trace: [ 32.297981] show_stack+0x20/0x38 (C) [ 32.298035] dump_stack_lvl+0x8c/0xd0 [ 32.298081] print_report+0x118/0x5e8 [ 32.298249] kasan_report+0xdc/0x128 [ 32.298367] __asan_report_store1_noabort+0x20/0x30 [ 32.298419] krealloc_more_oob_helper+0x60c/0x678 [ 32.298467] krealloc_more_oob+0x20/0x38 [ 32.298701] kunit_try_run_case+0x170/0x3f0 [ 32.298775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.298909] kthread+0x328/0x630 [ 32.298971] ret_from_fork+0x10/0x20 [ 32.299108] [ 32.299147] Allocated by task 187: [ 32.299177] kasan_save_stack+0x3c/0x68 [ 32.299216] kasan_save_track+0x20/0x40 [ 32.299276] kasan_save_alloc_info+0x40/0x58 [ 32.299314] __kasan_krealloc+0x118/0x178 [ 32.299348] krealloc_noprof+0x128/0x360 [ 32.299412] krealloc_more_oob_helper+0x168/0x678 [ 32.299453] krealloc_more_oob+0x20/0x38 [ 32.299490] kunit_try_run_case+0x170/0x3f0 [ 32.299526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.299707] kthread+0x328/0x630 [ 32.299841] ret_from_fork+0x10/0x20 [ 32.299932] [ 32.300030] The buggy address belongs to the object at fff00000c8575c00 [ 32.300030] which belongs to the cache kmalloc-256 of size 256 [ 32.300135] The buggy address is located 0 bytes to the right of [ 32.300135] allocated 235-byte region [fff00000c8575c00, fff00000c8575ceb) [ 32.300254] [ 32.300333] The buggy address belongs to the physical page: [ 32.300372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.300657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.300807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.300909] page_type: f5(slab) [ 32.301004] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.301109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.301223] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.301272] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.301724] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.301836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.301971] page dumped because: kasan: bad access detected [ 32.302012] [ 32.302031] Memory state around the buggy address: [ 32.302184] fff00000c8575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302398] fff00000c8575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.302532] >fff00000c8575c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.302683] ^ [ 32.302768] fff00000c8575d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302850] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302934] ================================================================== [ 32.304001] ================================================================== [ 32.304056] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.304254] Write of size 1 at addr fff00000c8575cf0 by task kunit_try_catch/187 [ 32.304339] [ 32.304373] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.304490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.304713] Hardware name: linux,dummy-virt (DT) [ 32.304802] Call trace: [ 32.304853] show_stack+0x20/0x38 (C) [ 32.305216] dump_stack_lvl+0x8c/0xd0 [ 32.305286] print_report+0x118/0x5e8 [ 32.305371] kasan_report+0xdc/0x128 [ 32.305416] __asan_report_store1_noabort+0x20/0x30 [ 32.305488] krealloc_more_oob_helper+0x5c0/0x678 [ 32.305552] krealloc_more_oob+0x20/0x38 [ 32.305618] kunit_try_run_case+0x170/0x3f0 [ 32.305693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.305976] kthread+0x328/0x630 [ 32.306046] ret_from_fork+0x10/0x20 [ 32.306119] [ 32.306189] Allocated by task 187: [ 32.306237] kasan_save_stack+0x3c/0x68 [ 32.306294] kasan_save_track+0x20/0x40 [ 32.306329] kasan_save_alloc_info+0x40/0x58 [ 32.306412] __kasan_krealloc+0x118/0x178 [ 32.306447] krealloc_noprof+0x128/0x360 [ 32.306481] krealloc_more_oob_helper+0x168/0x678 [ 32.306566] krealloc_more_oob+0x20/0x38 [ 32.306603] kunit_try_run_case+0x170/0x3f0 [ 32.306638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.306945] kthread+0x328/0x630 [ 32.307093] ret_from_fork+0x10/0x20 [ 32.307184] [ 32.307292] The buggy address belongs to the object at fff00000c8575c00 [ 32.307292] which belongs to the cache kmalloc-256 of size 256 [ 32.307406] The buggy address is located 5 bytes to the right of [ 32.307406] allocated 235-byte region [fff00000c8575c00, fff00000c8575ceb) [ 32.307520] [ 32.307569] The buggy address belongs to the physical page: [ 32.307664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.308066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.308173] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.308282] page_type: f5(slab) [ 32.308366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.308465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.308588] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.308685] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.308762] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.308810] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.308990] page dumped because: kasan: bad access detected [ 32.309021] [ 32.309039] Memory state around the buggy address: [ 32.309070] fff00000c8575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309112] fff00000c8575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.309334] >fff00000c8575c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.309391] ^ [ 32.309661] fff00000c8575d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309822] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309947] ================================================================== [ 32.354702] ================================================================== [ 32.354779] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.354846] Write of size 1 at addr fff00000c99620f0 by task kunit_try_catch/191 [ 32.354930] [ 32.355038] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.355203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.355280] Hardware name: linux,dummy-virt (DT) [ 32.355331] Call trace: [ 32.355353] show_stack+0x20/0x38 (C) [ 32.355401] dump_stack_lvl+0x8c/0xd0 [ 32.355462] print_report+0x118/0x5e8 [ 32.355722] kasan_report+0xdc/0x128 [ 32.355937] __asan_report_store1_noabort+0x20/0x30 [ 32.356065] krealloc_more_oob_helper+0x5c0/0x678 [ 32.356265] krealloc_large_more_oob+0x20/0x38 [ 32.356385] kunit_try_run_case+0x170/0x3f0 [ 32.356498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.356605] kthread+0x328/0x630 [ 32.356688] ret_from_fork+0x10/0x20 [ 32.356795] [ 32.356827] The buggy address belongs to the physical page: [ 32.356882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.357254] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.357316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.357369] page_type: f8(unknown) [ 32.357416] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.357465] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.357512] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.357558] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.357605] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.358221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.358306] page dumped because: kasan: bad access detected [ 32.358363] [ 32.358410] Memory state around the buggy address: [ 32.358613] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.358878] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.359052] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.359123] ^ [ 32.359165] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.359478] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.359692] ================================================================== [ 32.350317] ================================================================== [ 32.350403] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.350465] Write of size 1 at addr fff00000c99620eb by task kunit_try_catch/191 [ 32.350515] [ 32.350552] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.350636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.350663] Hardware name: linux,dummy-virt (DT) [ 32.350694] Call trace: [ 32.350717] show_stack+0x20/0x38 (C) [ 32.350779] dump_stack_lvl+0x8c/0xd0 [ 32.350830] print_report+0x118/0x5e8 [ 32.350873] kasan_report+0xdc/0x128 [ 32.350914] __asan_report_store1_noabort+0x20/0x30 [ 32.351326] krealloc_more_oob_helper+0x60c/0x678 [ 32.351427] krealloc_large_more_oob+0x20/0x38 [ 32.351498] kunit_try_run_case+0x170/0x3f0 [ 32.351580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.351678] kthread+0x328/0x630 [ 32.351742] ret_from_fork+0x10/0x20 [ 32.351859] [ 32.351882] The buggy address belongs to the physical page: [ 32.351957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.352020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.352066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.352119] page_type: f8(unknown) [ 32.352192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.352242] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.352290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.352336] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.352537] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.352598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.352689] page dumped because: kasan: bad access detected [ 32.352757] [ 32.352776] Memory state around the buggy address: [ 32.352835] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.352898] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.352984] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.353043] ^ [ 32.353110] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.353196] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.353266] ==================================================================
[ 26.418523] ================================================================== [ 26.418944] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 26.419206] Write of size 1 at addr ffff8881003958eb by task kunit_try_catch/204 [ 26.419434] [ 26.419524] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 26.419594] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.419609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.419631] Call Trace: [ 26.419645] <TASK> [ 26.419666] dump_stack_lvl+0x73/0xb0 [ 26.419696] print_report+0xd1/0x640 [ 26.419719] ? __virt_addr_valid+0x1db/0x2d0 [ 26.419744] ? krealloc_more_oob_helper+0x821/0x930 [ 26.419767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.419793] ? krealloc_more_oob_helper+0x821/0x930 [ 26.419816] kasan_report+0x141/0x180 [ 26.419838] ? krealloc_more_oob_helper+0x821/0x930 [ 26.419865] __asan_report_store1_noabort+0x1b/0x30 [ 26.419889] krealloc_more_oob_helper+0x821/0x930 [ 26.419911] ? __schedule+0x10da/0x2b60 [ 26.419936] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.419959] ? finish_task_switch.isra.0+0x153/0x700 [ 26.419981] ? __switch_to+0x47/0xf80 [ 26.420007] ? __schedule+0x10da/0x2b60 [ 26.420030] ? __pfx_read_tsc+0x10/0x10 [ 26.420055] krealloc_more_oob+0x1c/0x30 [ 26.420075] kunit_try_run_case+0x1a5/0x480 [ 26.420101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.420122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.420146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.420171] ? __kthread_parkme+0x82/0x180 [ 26.420190] ? preempt_count_sub+0x50/0x80 [ 26.420212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.420235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.420257] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.420280] kthread+0x337/0x6f0 [ 26.420299] ? trace_preempt_on+0x20/0xc0 [ 26.420324] ? __pfx_kthread+0x10/0x10 [ 26.420343] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.420366] ? calculate_sigpending+0x7b/0xa0 [ 26.420390] ? __pfx_kthread+0x10/0x10 [ 26.420410] ret_from_fork+0x116/0x1d0 [ 26.420429] ? __pfx_kthread+0x10/0x10 [ 26.420449] ret_from_fork_asm+0x1a/0x30 [ 26.420480] </TASK> [ 26.420490] [ 26.441645] Allocated by task 204: [ 26.442128] kasan_save_stack+0x45/0x70 [ 26.442551] kasan_save_track+0x18/0x40 [ 26.442706] kasan_save_alloc_info+0x3b/0x50 [ 26.442861] __kasan_krealloc+0x190/0x1f0 [ 26.443273] krealloc_noprof+0xf3/0x340 [ 26.443665] krealloc_more_oob_helper+0x1a9/0x930 [ 26.444158] krealloc_more_oob+0x1c/0x30 [ 26.444562] kunit_try_run_case+0x1a5/0x480 [ 26.444965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.445556] kthread+0x337/0x6f0 [ 26.445696] ret_from_fork+0x116/0x1d0 [ 26.445825] ret_from_fork_asm+0x1a/0x30 [ 26.445992] [ 26.446156] The buggy address belongs to the object at ffff888100395800 [ 26.446156] which belongs to the cache kmalloc-256 of size 256 [ 26.447308] The buggy address is located 0 bytes to the right of [ 26.447308] allocated 235-byte region [ffff888100395800, ffff8881003958eb) [ 26.448652] [ 26.448815] The buggy address belongs to the physical page: [ 26.449268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394 [ 26.449511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.450133] flags: 0x200000000000040(head|node=0|zone=2) [ 26.450316] page_type: f5(slab) [ 26.450435] raw: 0200000000000040 ffff888100041b40 ffffea0004026780 dead000000000004 [ 26.450672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.451176] head: 0200000000000040 ffff888100041b40 ffffea0004026780 dead000000000004 [ 26.451903] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.452820] head: 0200000000000001 ffffea000400e501 00000000ffffffff 00000000ffffffff [ 26.453606] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.454385] page dumped because: kasan: bad access detected [ 26.454962] [ 26.455103] Memory state around the buggy address: [ 26.455364] ffff888100395780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.455585] ffff888100395800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.455833] >ffff888100395880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.456437] ^ [ 26.457108] ffff888100395900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.457724] ffff888100395980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.458368] ================================================================== [ 26.459273] ================================================================== [ 26.459593] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 26.459838] Write of size 1 at addr ffff8881003958f0 by task kunit_try_catch/204 [ 26.460089] [ 26.460210] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 26.460262] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.460276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.460297] Call Trace: [ 26.460312] <TASK> [ 26.460330] dump_stack_lvl+0x73/0xb0 [ 26.460357] print_report+0xd1/0x640 [ 26.460379] ? __virt_addr_valid+0x1db/0x2d0 [ 26.460403] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.460425] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.460451] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.460474] kasan_report+0x141/0x180 [ 26.460496] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.460524] __asan_report_store1_noabort+0x1b/0x30 [ 26.460548] krealloc_more_oob_helper+0x7eb/0x930 [ 26.460593] ? __schedule+0x10da/0x2b60 [ 26.460620] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.460831] ? finish_task_switch.isra.0+0x153/0x700 [ 26.460854] ? __switch_to+0x47/0xf80 [ 26.460880] ? __schedule+0x10da/0x2b60 [ 26.460904] ? __pfx_read_tsc+0x10/0x10 [ 26.460940] krealloc_more_oob+0x1c/0x30 [ 26.460962] kunit_try_run_case+0x1a5/0x480 [ 26.460988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.461010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.461035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.461060] ? __kthread_parkme+0x82/0x180 [ 26.461081] ? preempt_count_sub+0x50/0x80 [ 26.461103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.461127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.461150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.461173] kthread+0x337/0x6f0 [ 26.461194] ? trace_preempt_on+0x20/0xc0 [ 26.461218] ? __pfx_kthread+0x10/0x10 [ 26.461238] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.461261] ? calculate_sigpending+0x7b/0xa0 [ 26.461284] ? __pfx_kthread+0x10/0x10 [ 26.461305] ret_from_fork+0x116/0x1d0 [ 26.461324] ? __pfx_kthread+0x10/0x10 [ 26.461344] ret_from_fork_asm+0x1a/0x30 [ 26.461376] </TASK> [ 26.461386] [ 26.473423] Allocated by task 204: [ 26.473724] kasan_save_stack+0x45/0x70 [ 26.474207] kasan_save_track+0x18/0x40 [ 26.474506] kasan_save_alloc_info+0x3b/0x50 [ 26.474905] __kasan_krealloc+0x190/0x1f0 [ 26.475210] krealloc_noprof+0xf3/0x340 [ 26.475393] krealloc_more_oob_helper+0x1a9/0x930 [ 26.475611] krealloc_more_oob+0x1c/0x30 [ 26.475785] kunit_try_run_case+0x1a5/0x480 [ 26.476330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.476615] kthread+0x337/0x6f0 [ 26.476911] ret_from_fork+0x116/0x1d0 [ 26.477362] ret_from_fork_asm+0x1a/0x30 [ 26.477699] [ 26.477938] The buggy address belongs to the object at ffff888100395800 [ 26.477938] which belongs to the cache kmalloc-256 of size 256 [ 26.478746] The buggy address is located 5 bytes to the right of [ 26.478746] allocated 235-byte region [ffff888100395800, ffff8881003958eb) [ 26.479590] [ 26.479694] The buggy address belongs to the physical page: [ 26.480140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394 [ 26.480878] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.481553] flags: 0x200000000000040(head|node=0|zone=2) [ 26.481870] page_type: f5(slab) [ 26.482208] raw: 0200000000000040 ffff888100041b40 ffffea0004026780 dead000000000004 [ 26.482700] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.483266] head: 0200000000000040 ffff888100041b40 ffffea0004026780 dead000000000004 [ 26.483825] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.484355] head: 0200000000000001 ffffea000400e501 00000000ffffffff 00000000ffffffff [ 26.484939] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.485474] page dumped because: kasan: bad access detected [ 26.485695] [ 26.485766] Memory state around the buggy address: [ 26.486011] ffff888100395780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.486305] ffff888100395800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.486657] >ffff888100395880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.487098] ^ [ 26.487322] ffff888100395900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.487645] ffff888100395980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.487958] ================================================================== [ 26.631088] ================================================================== [ 26.631530] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 26.632133] Write of size 1 at addr ffff88810616a0eb by task kunit_try_catch/208 [ 26.632443] [ 26.632535] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 26.632596] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.632609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.632629] Call Trace: [ 26.632642] <TASK> [ 26.632660] dump_stack_lvl+0x73/0xb0 [ 26.632694] print_report+0xd1/0x640 [ 26.632718] ? __virt_addr_valid+0x1db/0x2d0 [ 26.632743] ? krealloc_more_oob_helper+0x821/0x930 [ 26.632766] ? kasan_addr_to_slab+0x11/0xa0 [ 26.632787] ? krealloc_more_oob_helper+0x821/0x930 [ 26.632810] kasan_report+0x141/0x180 [ 26.632832] ? krealloc_more_oob_helper+0x821/0x930 [ 26.632860] __asan_report_store1_noabort+0x1b/0x30 [ 26.632883] krealloc_more_oob_helper+0x821/0x930 [ 26.632904] ? __schedule+0x10da/0x2b60 [ 26.632930] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.633068] ? finish_task_switch.isra.0+0x153/0x700 [ 26.633092] ? __switch_to+0x47/0xf80 [ 26.633119] ? __schedule+0x10da/0x2b60 [ 26.633143] ? __pfx_read_tsc+0x10/0x10 [ 26.633168] krealloc_large_more_oob+0x1c/0x30 [ 26.633191] kunit_try_run_case+0x1a5/0x480 [ 26.633216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.633238] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.633262] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.633286] ? __kthread_parkme+0x82/0x180 [ 26.633306] ? preempt_count_sub+0x50/0x80 [ 26.633328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.633351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.633373] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.633396] kthread+0x337/0x6f0 [ 26.633416] ? trace_preempt_on+0x20/0xc0 [ 26.633440] ? __pfx_kthread+0x10/0x10 [ 26.633460] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.633482] ? calculate_sigpending+0x7b/0xa0 [ 26.633506] ? __pfx_kthread+0x10/0x10 [ 26.633526] ret_from_fork+0x116/0x1d0 [ 26.633545] ? __pfx_kthread+0x10/0x10 [ 26.633564] ret_from_fork_asm+0x1a/0x30 [ 26.633608] </TASK> [ 26.633619] [ 26.646264] The buggy address belongs to the physical page: [ 26.646509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106168 [ 26.647336] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.647675] flags: 0x200000000000040(head|node=0|zone=2) [ 26.648079] page_type: f8(unknown) [ 26.648260] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.648564] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.648800] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.649322] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.649654] head: 0200000000000002 ffffea0004185a01 00000000ffffffff 00000000ffffffff [ 26.650482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.650877] page dumped because: kasan: bad access detected [ 26.651264] [ 26.651362] Memory state around the buggy address: [ 26.651586] ffff888106169f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.651880] ffff88810616a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.652350] >ffff88810616a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 26.652668] ^ [ 26.653212] ffff88810616a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.653591] ffff88810616a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.654080] ================================================================== [ 26.654636] ================================================================== [ 26.654913] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 26.655887] Write of size 1 at addr ffff88810616a0f0 by task kunit_try_catch/208 [ 26.656264] [ 26.656359] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 26.656475] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.656543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.656564] Call Trace: [ 26.656587] <TASK> [ 26.656603] dump_stack_lvl+0x73/0xb0 [ 26.656630] print_report+0xd1/0x640 [ 26.656652] ? __virt_addr_valid+0x1db/0x2d0 [ 26.656674] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.656696] ? kasan_addr_to_slab+0x11/0xa0 [ 26.656716] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.656738] kasan_report+0x141/0x180 [ 26.656760] ? krealloc_more_oob_helper+0x7eb/0x930 [ 26.656868] __asan_report_store1_noabort+0x1b/0x30 [ 26.656897] krealloc_more_oob_helper+0x7eb/0x930 [ 26.656920] ? __schedule+0x10da/0x2b60 [ 26.656944] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 26.656967] ? finish_task_switch.isra.0+0x153/0x700 [ 26.656989] ? __switch_to+0x47/0xf80 [ 26.657014] ? __schedule+0x10da/0x2b60 [ 26.657038] ? __pfx_read_tsc+0x10/0x10 [ 26.657063] krealloc_large_more_oob+0x1c/0x30 [ 26.657085] kunit_try_run_case+0x1a5/0x480 [ 26.657108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.657130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.657154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.657178] ? __kthread_parkme+0x82/0x180 [ 26.657197] ? preempt_count_sub+0x50/0x80 [ 26.657219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.657242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.657265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.657288] kthread+0x337/0x6f0 [ 26.657308] ? trace_preempt_on+0x20/0xc0 [ 26.657331] ? __pfx_kthread+0x10/0x10 [ 26.657351] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.657374] ? calculate_sigpending+0x7b/0xa0 [ 26.657397] ? __pfx_kthread+0x10/0x10 [ 26.657417] ret_from_fork+0x116/0x1d0 [ 26.657436] ? __pfx_kthread+0x10/0x10 [ 26.657455] ret_from_fork_asm+0x1a/0x30 [ 26.657487] </TASK> [ 26.657497] [ 26.667952] The buggy address belongs to the physical page: [ 26.668445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106168 [ 26.668756] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.669331] flags: 0x200000000000040(head|node=0|zone=2) [ 26.669571] page_type: f8(unknown) [ 26.670017] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.670301] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.670752] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.671224] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.671552] head: 0200000000000002 ffffea0004185a01 00000000ffffffff 00000000ffffffff [ 26.672202] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.672519] page dumped because: kasan: bad access detected [ 26.672771] [ 26.673084] Memory state around the buggy address: [ 26.673264] ffff888106169f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.673681] ffff88810616a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.674090] >ffff88810616a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 26.674517] ^ [ 26.674959] ffff88810616a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.675366] ffff88810616a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.675627] ==================================================================