Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   27.236638] ==================================================================
[   27.236831] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   27.237015] Write of size 1 at addr fff00000c77da0f0 by task kunit_try_catch/162
[   27.237166] 
[   27.237284] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   27.237542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.237614] Hardware name: linux,dummy-virt (DT)
[   27.237695] Call trace:
[   27.237758]  show_stack+0x20/0x38 (C)
[   27.237889]  dump_stack_lvl+0x8c/0xd0
[   27.238044]  print_report+0x118/0x608
[   27.238165]  kasan_report+0xdc/0x128
[   27.238284]  __asan_report_store1_noabort+0x20/0x30
[   27.238420]  krealloc_more_oob_helper+0x5c0/0x678
[   27.238581]  krealloc_large_more_oob+0x20/0x38
[   27.238738]  kunit_try_run_case+0x170/0x3f0
[   27.238929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.239134]  kthread+0x328/0x630
[   27.239273]  ret_from_fork+0x10/0x20
[   27.239687] 
[   27.239781] The buggy address belongs to the physical page:
[   27.239878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d8
[   27.240269] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.240442] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.240620] page_type: f8(unknown)
[   27.240718] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.240838] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.240964] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.241078] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.241213] head: 0bfffe0000000002 ffffc1ffc31df601 00000000ffffffff 00000000ffffffff
[   27.241353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.241496] page dumped because: kasan: bad access detected
[   27.241598] 
[   27.241675] Memory state around the buggy address:
[   27.241798]  fff00000c77d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.241928]  fff00000c77da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.242056] >fff00000c77da080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   27.242170]                                                              ^
[   27.242314]  fff00000c77da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.242439]  fff00000c77da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.242556] ==================================================================
[   27.040336] ==================================================================
[   27.040587] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   27.040758] Write of size 1 at addr fff00000c1a546eb by task kunit_try_catch/158
[   27.040915] 
[   27.041051] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   27.041327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.041391] Hardware name: linux,dummy-virt (DT)
[   27.041484] Call trace:
[   27.041545]  show_stack+0x20/0x38 (C)
[   27.041716]  dump_stack_lvl+0x8c/0xd0
[   27.041897]  print_report+0x118/0x608
[   27.042061]  kasan_report+0xdc/0x128
[   27.042227]  __asan_report_store1_noabort+0x20/0x30
[   27.042424]  krealloc_more_oob_helper+0x60c/0x678
[   27.042594]  krealloc_more_oob+0x20/0x38
[   27.042793]  kunit_try_run_case+0x170/0x3f0
[   27.042938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.043121]  kthread+0x328/0x630
[   27.043306]  ret_from_fork+0x10/0x20
[   27.043511] 
[   27.043621] Allocated by task 158:
[   27.043709]  kasan_save_stack+0x3c/0x68
[   27.043835]  kasan_save_track+0x20/0x40
[   27.044050]  kasan_save_alloc_info+0x40/0x58
[   27.044230]  __kasan_krealloc+0x118/0x178
[   27.044365]  krealloc_noprof+0x128/0x360
[   27.044524]  krealloc_more_oob_helper+0x168/0x678
[   27.044689]  krealloc_more_oob+0x20/0x38
[   27.044829]  kunit_try_run_case+0x170/0x3f0
[   27.044969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.045127]  kthread+0x328/0x630
[   27.045412]  ret_from_fork+0x10/0x20
[   27.045565] 
[   27.045619] The buggy address belongs to the object at fff00000c1a54600
[   27.045619]  which belongs to the cache kmalloc-256 of size 256
[   27.045761] The buggy address is located 0 bytes to the right of
[   27.045761]  allocated 235-byte region [fff00000c1a54600, fff00000c1a546eb)
[   27.045942] 
[   27.046001] The buggy address belongs to the physical page:
[   27.046110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a54
[   27.046357] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.046554] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.046727] page_type: f5(slab)
[   27.046875] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   27.047034] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.047170] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   27.047937] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.048059] head: 0bfffe0000000001 ffffc1ffc3069501 00000000ffffffff 00000000ffffffff
[   27.048131] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.048211] page dumped because: kasan: bad access detected
[   27.048312] 
[   27.048375] Memory state around the buggy address:
[   27.048484]  fff00000c1a54580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.048594]  fff00000c1a54600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.048690] >fff00000c1a54680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   27.048788]                                                           ^
[   27.048897]  fff00000c1a54700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.049034]  fff00000c1a54780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.049162] ==================================================================
[   27.050473] ==================================================================
[   27.050587] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   27.050794] Write of size 1 at addr fff00000c1a546f0 by task kunit_try_catch/158
[   27.050971] 
[   27.051088] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   27.051320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.051411] Hardware name: linux,dummy-virt (DT)
[   27.051526] Call trace:
[   27.051589]  show_stack+0x20/0x38 (C)
[   27.051728]  dump_stack_lvl+0x8c/0xd0
[   27.051862]  print_report+0x118/0x608
[   27.052055]  kasan_report+0xdc/0x128
[   27.052206]  __asan_report_store1_noabort+0x20/0x30
[   27.052355]  krealloc_more_oob_helper+0x5c0/0x678
[   27.052522]  krealloc_more_oob+0x20/0x38
[   27.052650]  kunit_try_run_case+0x170/0x3f0
[   27.052781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.052916]  kthread+0x328/0x630
[   27.053029]  ret_from_fork+0x10/0x20
[   27.053155] 
[   27.053205] Allocated by task 158:
[   27.053575]  kasan_save_stack+0x3c/0x68
[   27.053721]  kasan_save_track+0x20/0x40
[   27.053827]  kasan_save_alloc_info+0x40/0x58
[   27.053984]  __kasan_krealloc+0x118/0x178
[   27.054112]  krealloc_noprof+0x128/0x360
[   27.054490]  krealloc_more_oob_helper+0x168/0x678
[   27.054616]  krealloc_more_oob+0x20/0x38
[   27.054732]  kunit_try_run_case+0x170/0x3f0
[   27.054934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.055128]  kthread+0x328/0x630
[   27.055294]  ret_from_fork+0x10/0x20
[   27.055406] 
[   27.055886] The buggy address belongs to the object at fff00000c1a54600
[   27.055886]  which belongs to the cache kmalloc-256 of size 256
[   27.056160] The buggy address is located 5 bytes to the right of
[   27.056160]  allocated 235-byte region [fff00000c1a54600, fff00000c1a546eb)
[   27.056476] 
[   27.056540] The buggy address belongs to the physical page:
[   27.056827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a54
[   27.056976] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.057236] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.057425] page_type: f5(slab)
[   27.057617] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   27.057779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.057930] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   27.058494] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.058665] head: 0bfffe0000000001 ffffc1ffc3069501 00000000ffffffff 00000000ffffffff
[   27.058813] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.058936] page dumped because: kasan: bad access detected
[   27.059091] 
[   27.059144] Memory state around the buggy address:
[   27.059300]  fff00000c1a54580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.059692]  fff00000c1a54600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.059840] >fff00000c1a54680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   27.060079]                                                              ^
[   27.060860]  fff00000c1a54700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.061003]  fff00000c1a54780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.061121] ==================================================================
[   27.202984] ==================================================================
[   27.203180] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   27.203594] Write of size 1 at addr fff00000c77da0eb by task kunit_try_catch/162
[   27.204092] 
[   27.204528] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   27.205016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.205099] Hardware name: linux,dummy-virt (DT)
[   27.205651] Call trace:
[   27.206070]  show_stack+0x20/0x38 (C)
[   27.206230]  dump_stack_lvl+0x8c/0xd0
[   27.206356]  print_report+0x118/0x608
[   27.207534]  kasan_report+0xdc/0x128
[   27.207943]  __asan_report_store1_noabort+0x20/0x30
[   27.208102]  krealloc_more_oob_helper+0x60c/0x678
[   27.208257]  krealloc_large_more_oob+0x20/0x38
[   27.210030]  kunit_try_run_case+0x170/0x3f0
[   27.210477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.210831]  kthread+0x328/0x630
[   27.211003]  ret_from_fork+0x10/0x20
[   27.211147] 
[   27.211208] The buggy address belongs to the physical page:
[   27.211303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d8
[   27.212609] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.213164] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.213732] page_type: f8(unknown)
[   27.214276] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.215203] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.215614] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.215767] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.215914] head: 0bfffe0000000002 ffffc1ffc31df601 00000000ffffffff 00000000ffffffff
[   27.216046] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.216142] page dumped because: kasan: bad access detected
[   27.216958] 
[   27.217058] Memory state around the buggy address:
[   27.217378]  fff00000c77d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.217737]  fff00000c77da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.218131] >fff00000c77da080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   27.218726]                                                           ^
[   27.219198]  fff00000c77da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.219360]  fff00000c77da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.220077] ==================================================================

[   12.260603] ==================================================================
[   12.261060] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.261380] Write of size 1 at addr ffff888100a2a8f0 by task kunit_try_catch/175
[   12.261606] 
[   12.261720] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   12.261767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.261779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.261800] Call Trace:
[   12.261813]  <TASK>
[   12.261829]  dump_stack_lvl+0x73/0xb0
[   12.261856]  print_report+0xd1/0x650
[   12.261878]  ? __virt_addr_valid+0x1db/0x2d0
[   12.261900]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.261923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.261945]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.261969]  kasan_report+0x141/0x180
[   12.261991]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.262019]  __asan_report_store1_noabort+0x1b/0x30
[   12.262039]  krealloc_more_oob_helper+0x7eb/0x930
[   12.262061]  ? __schedule+0x10cc/0x2b30
[   12.262084]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.262107]  ? finish_task_switch.isra.0+0x153/0x700
[   12.262130]  ? __switch_to+0x5d9/0xf60
[   12.262150]  ? dequeue_task_fair+0x156/0x4e0
[   12.262174]  ? __schedule+0x10cc/0x2b30
[   12.262195]  ? __pfx_read_tsc+0x10/0x10
[   12.262218]  krealloc_more_oob+0x1c/0x30
[   12.262235]  kunit_try_run_case+0x1a5/0x480
[   12.262259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.262280]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.262315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.262338]  ? __kthread_parkme+0x82/0x180
[   12.262359]  ? preempt_count_sub+0x50/0x80
[   12.262385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.262408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.262430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.262451]  kthread+0x337/0x6f0
[   12.262468]  ? trace_preempt_on+0x20/0xc0
[   12.262491]  ? __pfx_kthread+0x10/0x10
[   12.262509]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.262531]  ? calculate_sigpending+0x7b/0xa0
[   12.262553]  ? __pfx_kthread+0x10/0x10
[   12.262571]  ret_from_fork+0x41/0x80
[   12.262593]  ? __pfx_kthread+0x10/0x10
[   12.262611]  ret_from_fork_asm+0x1a/0x30
[   12.262642]  </TASK>
[   12.262653] 
[   12.270910] Allocated by task 175:
[   12.271052]  kasan_save_stack+0x45/0x70
[   12.271200]  kasan_save_track+0x18/0x40
[   12.271635]  kasan_save_alloc_info+0x3b/0x50
[   12.271857]  __kasan_krealloc+0x190/0x1f0
[   12.272056]  krealloc_noprof+0xf3/0x340
[   12.272257]  krealloc_more_oob_helper+0x1a9/0x930
[   12.272506]  krealloc_more_oob+0x1c/0x30
[   12.272707]  kunit_try_run_case+0x1a5/0x480
[   12.273093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.273367]  kthread+0x337/0x6f0
[   12.273486]  ret_from_fork+0x41/0x80
[   12.273926]  ret_from_fork_asm+0x1a/0x30
[   12.274174] 
[   12.274335] The buggy address belongs to the object at ffff888100a2a800
[   12.274335]  which belongs to the cache kmalloc-256 of size 256
[   12.274874] The buggy address is located 5 bytes to the right of
[   12.274874]  allocated 235-byte region [ffff888100a2a800, ffff888100a2a8eb)
[   12.275355] 
[   12.275429] The buggy address belongs to the physical page:
[   12.275602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a
[   12.275940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.276298] flags: 0x200000000000040(head|node=0|zone=2)
[   12.276605] page_type: f5(slab)
[   12.276823] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.277256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.277677] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.278312] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.278649] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff
[   12.278885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.279279] page dumped because: kasan: bad access detected
[   12.279700] 
[   12.279796] Memory state around the buggy address:
[   12.280156]  ffff888100a2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.280389]  ffff888100a2a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.280606] >ffff888100a2a880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.280859]                                                              ^
[   12.281172]  ffff888100a2a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.281493]  ffff888100a2a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.281814] ==================================================================
[   12.415023] ==================================================================
[   12.415386] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.415747] Write of size 1 at addr ffff888102ad60f0 by task kunit_try_catch/179
[   12.416678] 
[   12.416779] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   12.416822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.416834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.416854] Call Trace:
[   12.416868]  <TASK>
[   12.416882]  dump_stack_lvl+0x73/0xb0
[   12.416909]  print_report+0xd1/0x650
[   12.416931]  ? __virt_addr_valid+0x1db/0x2d0
[   12.416951]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.416974]  ? kasan_addr_to_slab+0x11/0xa0
[   12.416994]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.417017]  kasan_report+0x141/0x180
[   12.417039]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.417067]  __asan_report_store1_noabort+0x1b/0x30
[   12.417087]  krealloc_more_oob_helper+0x7eb/0x930
[   12.417109]  ? __schedule+0x10cc/0x2b30
[   12.417130]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.417154]  ? finish_task_switch.isra.0+0x153/0x700
[   12.417176]  ? __switch_to+0x5d9/0xf60
[   12.417196]  ? dequeue_task_fair+0x166/0x4e0
[   12.417220]  ? __schedule+0x10cc/0x2b30
[   12.417240]  ? __pfx_read_tsc+0x10/0x10
[   12.417263]  krealloc_large_more_oob+0x1c/0x30
[   12.417281]  kunit_try_run_case+0x1a5/0x480
[   12.417320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.417341]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.417363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.417384]  ? __kthread_parkme+0x82/0x180
[   12.417406]  ? preempt_count_sub+0x50/0x80
[   12.417429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.417452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.417473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.417495]  kthread+0x337/0x6f0
[   12.417512]  ? trace_preempt_on+0x20/0xc0
[   12.417535]  ? __pfx_kthread+0x10/0x10
[   12.417553]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.417573]  ? calculate_sigpending+0x7b/0xa0
[   12.417595]  ? __pfx_kthread+0x10/0x10
[   12.417614]  ret_from_fork+0x41/0x80
[   12.417634]  ? __pfx_kthread+0x10/0x10
[   12.417652]  ret_from_fork_asm+0x1a/0x30
[   12.417682]  </TASK>
[   12.417748] 
[   12.425491] The buggy address belongs to the physical page:
[   12.425850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4
[   12.426156] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.426468] flags: 0x200000000000040(head|node=0|zone=2)
[   12.426688] page_type: f8(unknown)
[   12.426815] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.427118] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.427463] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.427830] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.428063] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff
[   12.428822] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.429135] page dumped because: kasan: bad access detected
[   12.429377] 
[   12.429462] Memory state around the buggy address:
[   12.429733]  ffff888102ad5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.429992]  ffff888102ad6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.430208] >ffff888102ad6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.430439]                                                              ^
[   12.430757]  ffff888102ad6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.431084]  ffff888102ad6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.431341] ==================================================================
[   12.399416] ==================================================================
[   12.399868] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.400224] Write of size 1 at addr ffff888102ad60eb by task kunit_try_catch/179
[   12.400556] 
[   12.400641] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   12.400685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.400697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.400717] Call Trace:
[   12.400728]  <TASK>
[   12.400744]  dump_stack_lvl+0x73/0xb0
[   12.400769]  print_report+0xd1/0x650
[   12.400790]  ? __virt_addr_valid+0x1db/0x2d0
[   12.400811]  ? krealloc_more_oob_helper+0x821/0x930
[   12.400834]  ? kasan_addr_to_slab+0x11/0xa0
[   12.400854]  ? krealloc_more_oob_helper+0x821/0x930
[   12.400877]  kasan_report+0x141/0x180
[   12.400899]  ? krealloc_more_oob_helper+0x821/0x930
[   12.400928]  __asan_report_store1_noabort+0x1b/0x30
[   12.400948]  krealloc_more_oob_helper+0x821/0x930
[   12.400970]  ? __schedule+0x10cc/0x2b30
[   12.400991]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.401015]  ? finish_task_switch.isra.0+0x153/0x700
[   12.401036]  ? __switch_to+0x5d9/0xf60
[   12.401056]  ? dequeue_task_fair+0x166/0x4e0
[   12.401079]  ? __schedule+0x10cc/0x2b30
[   12.401099]  ? __pfx_read_tsc+0x10/0x10
[   12.401122]  krealloc_large_more_oob+0x1c/0x30
[   12.401140]  kunit_try_run_case+0x1a5/0x480
[   12.401164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.401185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.401206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.401228]  ? __kthread_parkme+0x82/0x180
[   12.401249]  ? preempt_count_sub+0x50/0x80
[   12.401272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.401306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.401328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.401349]  kthread+0x337/0x6f0
[   12.401366]  ? trace_preempt_on+0x20/0xc0
[   12.401389]  ? __pfx_kthread+0x10/0x10
[   12.401407]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.401427]  ? calculate_sigpending+0x7b/0xa0
[   12.401447]  ? __pfx_kthread+0x10/0x10
[   12.401465]  ret_from_fork+0x41/0x80
[   12.401485]  ? __pfx_kthread+0x10/0x10
[   12.401503]  ret_from_fork_asm+0x1a/0x30
[   12.401533]  </TASK>
[   12.401544] 
[   12.408945] The buggy address belongs to the physical page:
[   12.409213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4
[   12.409554] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.409783] flags: 0x200000000000040(head|node=0|zone=2)
[   12.409963] page_type: f8(unknown)
[   12.410137] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.410491] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.410844] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.411076] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.411399] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff
[   12.411753] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.412093] page dumped because: kasan: bad access detected
[   12.412354] 
[   12.412449] Memory state around the buggy address:
[   12.412609]  ffff888102ad5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.412840]  ffff888102ad6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.413319] >ffff888102ad6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.413684]                                                           ^
[   12.413890]  ffff888102ad6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.414105]  ffff888102ad6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.414325] ==================================================================
[   12.237698] ==================================================================
[   12.238159] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.238648] Write of size 1 at addr ffff888100a2a8eb by task kunit_try_catch/175
[   12.238988] 
[   12.239095] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   12.239145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.239157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.239178] Call Trace:
[   12.239190]  <TASK>
[   12.239207]  dump_stack_lvl+0x73/0xb0
[   12.239236]  print_report+0xd1/0x650
[   12.239259]  ? __virt_addr_valid+0x1db/0x2d0
[   12.239281]  ? krealloc_more_oob_helper+0x821/0x930
[   12.239316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.239338]  ? krealloc_more_oob_helper+0x821/0x930
[   12.239362]  kasan_report+0x141/0x180
[   12.239384]  ? krealloc_more_oob_helper+0x821/0x930
[   12.239413]  __asan_report_store1_noabort+0x1b/0x30
[   12.239433]  krealloc_more_oob_helper+0x821/0x930
[   12.239456]  ? __schedule+0x10cc/0x2b30
[   12.239478]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.239502]  ? finish_task_switch.isra.0+0x153/0x700
[   12.239526]  ? __switch_to+0x5d9/0xf60
[   12.239547]  ? dequeue_task_fair+0x156/0x4e0
[   12.239571]  ? __schedule+0x10cc/0x2b30
[   12.239592]  ? __pfx_read_tsc+0x10/0x10
[   12.239615]  krealloc_more_oob+0x1c/0x30
[   12.239633]  kunit_try_run_case+0x1a5/0x480
[   12.239658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.239679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.239702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.239724]  ? __kthread_parkme+0x82/0x180
[   12.239745]  ? preempt_count_sub+0x50/0x80
[   12.239769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.239792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.239813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.239835]  kthread+0x337/0x6f0
[   12.239851]  ? trace_preempt_on+0x20/0xc0
[   12.239875]  ? __pfx_kthread+0x10/0x10
[   12.239906]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.239926]  ? calculate_sigpending+0x7b/0xa0
[   12.239948]  ? __pfx_kthread+0x10/0x10
[   12.239966]  ret_from_fork+0x41/0x80
[   12.239986]  ? __pfx_kthread+0x10/0x10
[   12.240003]  ret_from_fork_asm+0x1a/0x30
[   12.240034]  </TASK>
[   12.240046] 
[   12.248688] Allocated by task 175:
[   12.248915]  kasan_save_stack+0x45/0x70
[   12.249070]  kasan_save_track+0x18/0x40
[   12.249376]  kasan_save_alloc_info+0x3b/0x50
[   12.249655]  __kasan_krealloc+0x190/0x1f0
[   12.249912]  krealloc_noprof+0xf3/0x340
[   12.250049]  krealloc_more_oob_helper+0x1a9/0x930
[   12.250208]  krealloc_more_oob+0x1c/0x30
[   12.250644]  kunit_try_run_case+0x1a5/0x480
[   12.250868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.251121]  kthread+0x337/0x6f0
[   12.251246]  ret_from_fork+0x41/0x80
[   12.251392]  ret_from_fork_asm+0x1a/0x30
[   12.251533] 
[   12.251605] The buggy address belongs to the object at ffff888100a2a800
[   12.251605]  which belongs to the cache kmalloc-256 of size 256
[   12.252437] The buggy address is located 0 bytes to the right of
[   12.252437]  allocated 235-byte region [ffff888100a2a800, ffff888100a2a8eb)
[   12.252836] 
[   12.252910] The buggy address belongs to the physical page:
[   12.253089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a
[   12.253566] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.253928] flags: 0x200000000000040(head|node=0|zone=2)
[   12.254189] page_type: f5(slab)
[   12.254376] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.254738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.255418] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.255723] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.256105] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff
[   12.256471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.256779] page dumped because: kasan: bad access detected
[   12.257075] 
[   12.257149] Memory state around the buggy address:
[   12.257319]  ffff888100a2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.257870]  ffff888100a2a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.258305] >ffff888100a2a880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.258575]                                                           ^
[   12.258783]  ffff888100a2a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.259314]  ffff888100a2a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.259834] ==================================================================