Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.823589] ==================================================================
[   18.823800] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   18.824029] Write of size 1 at addr fff00000c78520eb by task kunit_try_catch/161
[   18.824185] 
[   18.824247] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.824697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.824845] Hardware name: linux,dummy-virt (DT)
[   18.825000] Call trace:
[   18.825068]  show_stack+0x20/0x38 (C)
[   18.825309]  dump_stack_lvl+0x8c/0xd0
[   18.825428]  print_report+0x118/0x608
[   18.825521]  kasan_report+0xdc/0x128
[   18.825624]  __asan_report_store1_noabort+0x20/0x30
[   18.825729]  krealloc_more_oob_helper+0x60c/0x678
[   18.825835]  krealloc_large_more_oob+0x20/0x38
[   18.825938]  kunit_try_run_case+0x170/0x3f0
[   18.826431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.826616]  kthread+0x328/0x630
[   18.826704]  ret_from_fork+0x10/0x20
[   18.826966] 
[   18.827019] The buggy address belongs to the physical page:
[   18.827092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   18.827269] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.827387] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.827506] page_type: f8(unknown)
[   18.827592] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.827705] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.827816] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.827933] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.828042] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   18.828145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.828241] page dumped because: kasan: bad access detected
[   18.828312] 
[   18.828351] Memory state around the buggy address:
[   18.828434]  fff00000c7851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.828540]  fff00000c7852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.828639] >fff00000c7852080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   18.828724]                                                           ^
[   18.828814]  fff00000c7852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.828923]  fff00000c7852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.829006] ==================================================================
[   18.831248] ==================================================================
[   18.831435] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   18.831548] Write of size 1 at addr fff00000c78520f0 by task kunit_try_catch/161
[   18.831659] 
[   18.831726] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.831884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.832115] Hardware name: linux,dummy-virt (DT)
[   18.832205] Call trace:
[   18.832252]  show_stack+0x20/0x38 (C)
[   18.832460]  dump_stack_lvl+0x8c/0xd0
[   18.832647]  print_report+0x118/0x608
[   18.832818]  kasan_report+0xdc/0x128
[   18.832996]  __asan_report_store1_noabort+0x20/0x30
[   18.833095]  krealloc_more_oob_helper+0x5c0/0x678
[   18.833512]  krealloc_large_more_oob+0x20/0x38
[   18.833632]  kunit_try_run_case+0x170/0x3f0
[   18.833834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.833957]  kthread+0x328/0x630
[   18.834138]  ret_from_fork+0x10/0x20
[   18.834322] 
[   18.834388] The buggy address belongs to the physical page:
[   18.834467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   18.834559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.834648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.834748] page_type: f8(unknown)
[   18.834833] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.834945] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.835056] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.835439] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.835699] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   18.835817] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.836107] page dumped because: kasan: bad access detected
[   18.836226] 
[   18.836516] Memory state around the buggy address:
[   18.836641]  fff00000c7851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.836756]  fff00000c7852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.836846] >fff00000c7852080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   18.836933]                                                              ^
[   18.837024]  fff00000c7852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.837390]  fff00000c7852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.837634] ==================================================================
[   18.713855] ==================================================================
[   18.714163] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   18.714292] Write of size 1 at addr fff00000c091f6f0 by task kunit_try_catch/157
[   18.714424] 
[   18.714507] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.714675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.714727] Hardware name: linux,dummy-virt (DT)
[   18.714781] Call trace:
[   18.714817]  show_stack+0x20/0x38 (C)
[   18.714910]  dump_stack_lvl+0x8c/0xd0
[   18.715009]  print_report+0x118/0x608
[   18.715114]  kasan_report+0xdc/0x128
[   18.715216]  __asan_report_store1_noabort+0x20/0x30
[   18.715821]  krealloc_more_oob_helper+0x5c0/0x678
[   18.716023]  krealloc_more_oob+0x20/0x38
[   18.716217]  kunit_try_run_case+0x170/0x3f0
[   18.716435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.716654]  kthread+0x328/0x630
[   18.716846]  ret_from_fork+0x10/0x20
[   18.717185] 
[   18.717234] Allocated by task 157:
[   18.717397]  kasan_save_stack+0x3c/0x68
[   18.717585]  kasan_save_track+0x20/0x40
[   18.717661]  kasan_save_alloc_info+0x40/0x58
[   18.717980]  __kasan_krealloc+0x118/0x178
[   18.718133]  krealloc_noprof+0x128/0x360
[   18.718298]  krealloc_more_oob_helper+0x168/0x678
[   18.718489]  krealloc_more_oob+0x20/0x38
[   18.718787]  kunit_try_run_case+0x170/0x3f0
[   18.718913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.719020]  kthread+0x328/0x630
[   18.719172]  ret_from_fork+0x10/0x20
[   18.719294] 
[   18.719343] The buggy address belongs to the object at fff00000c091f600
[   18.719343]  which belongs to the cache kmalloc-256 of size 256
[   18.719465] The buggy address is located 5 bytes to the right of
[   18.719465]  allocated 235-byte region [fff00000c091f600, fff00000c091f6eb)
[   18.719596] 
[   18.719639] The buggy address belongs to the physical page:
[   18.719970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   18.720154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.720489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.720608] page_type: f5(slab)
[   18.720770] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.720972] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.721168] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.721269] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.721591] head: 0bfffe0000000001 ffffc1ffc3024781 00000000ffffffff 00000000ffffffff
[   18.721694] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.721870] page dumped because: kasan: bad access detected
[   18.722170] 
[   18.722215] Memory state around the buggy address:
[   18.722298]  fff00000c091f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.722542]  fff00000c091f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.722748] >fff00000c091f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.722871]                                                              ^
[   18.722956]  fff00000c091f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.723053]  fff00000c091f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.723140] ==================================================================
[   18.700922] ==================================================================
[   18.701219] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   18.701334] Write of size 1 at addr fff00000c091f6eb by task kunit_try_catch/157
[   18.701454] 
[   18.701525] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.701640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.701668] Hardware name: linux,dummy-virt (DT)
[   18.701700] Call trace:
[   18.701723]  show_stack+0x20/0x38 (C)
[   18.701774]  dump_stack_lvl+0x8c/0xd0
[   18.701822]  print_report+0x118/0x608
[   18.701867]  kasan_report+0xdc/0x128
[   18.701912]  __asan_report_store1_noabort+0x20/0x30
[   18.701959]  krealloc_more_oob_helper+0x60c/0x678
[   18.702037]  krealloc_more_oob+0x20/0x38
[   18.702134]  kunit_try_run_case+0x170/0x3f0
[   18.702365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.702516]  kthread+0x328/0x630
[   18.702620]  ret_from_fork+0x10/0x20
[   18.702843] 
[   18.702888] Allocated by task 157:
[   18.703172]  kasan_save_stack+0x3c/0x68
[   18.703321]  kasan_save_track+0x20/0x40
[   18.703511]  kasan_save_alloc_info+0x40/0x58
[   18.703670]  __kasan_krealloc+0x118/0x178
[   18.703907]  krealloc_noprof+0x128/0x360
[   18.704025]  krealloc_more_oob_helper+0x168/0x678
[   18.704153]  krealloc_more_oob+0x20/0x38
[   18.704499]  kunit_try_run_case+0x170/0x3f0
[   18.704906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.705401]  kthread+0x328/0x630
[   18.705691]  ret_from_fork+0x10/0x20
[   18.705803] 
[   18.705845] The buggy address belongs to the object at fff00000c091f600
[   18.705845]  which belongs to the cache kmalloc-256 of size 256
[   18.706281] The buggy address is located 0 bytes to the right of
[   18.706281]  allocated 235-byte region [fff00000c091f600, fff00000c091f6eb)
[   18.706965] 
[   18.707009] The buggy address belongs to the physical page:
[   18.707069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   18.707173] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.707689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.707817] page_type: f5(slab)
[   18.707897] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.708013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.708163] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.708290] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.708417] head: 0bfffe0000000001 ffffc1ffc3024781 00000000ffffffff 00000000ffffffff
[   18.708517] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.708606] page dumped because: kasan: bad access detected
[   18.708676] 
[   18.708715] Memory state around the buggy address:
[   18.708782]  fff00000c091f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.708878]  fff00000c091f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.708970] >fff00000c091f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.709052]                                                           ^
[   18.710470]  fff00000c091f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.711040]  fff00000c091f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.711239] ==================================================================

[   13.358083] ==================================================================
[   13.358452] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   13.358799] Write of size 1 at addr ffff8881026f20f0 by task kunit_try_catch/177
[   13.359100] 
[   13.359231] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.359283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.359297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.359321] Call Trace:
[   13.359342]  <TASK>
[   13.359362]  dump_stack_lvl+0x73/0xb0
[   13.359394]  print_report+0xd1/0x650
[   13.359420]  ? __virt_addr_valid+0x1db/0x2d0
[   13.359448]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.359475]  ? kasan_addr_to_slab+0x11/0xa0
[   13.359499]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.359527]  kasan_report+0x141/0x180
[   13.359552]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.359584]  __asan_report_store1_noabort+0x1b/0x30
[   13.359608]  krealloc_more_oob_helper+0x7eb/0x930
[   13.359634]  ? __schedule+0x10cc/0x2b60
[   13.360024]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.360058]  ? finish_task_switch.isra.0+0x153/0x700
[   13.360083]  ? __switch_to+0x47/0xf50
[   13.360113]  ? __schedule+0x10cc/0x2b60
[   13.360137]  ? __pfx_read_tsc+0x10/0x10
[   13.360166]  krealloc_large_more_oob+0x1c/0x30
[   13.360194]  kunit_try_run_case+0x1a5/0x480
[   13.360222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.360247]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.360275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.360301]  ? __kthread_parkme+0x82/0x180
[   13.360326]  ? preempt_count_sub+0x50/0x80
[   13.360352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.360380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.360406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.360432]  kthread+0x337/0x6f0
[   13.360455]  ? trace_preempt_on+0x20/0xc0
[   13.360482]  ? __pfx_kthread+0x10/0x10
[   13.360506]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.360530]  ? calculate_sigpending+0x7b/0xa0
[   13.360558]  ? __pfx_kthread+0x10/0x10
[   13.360583]  ret_from_fork+0x116/0x1d0
[   13.360604]  ? __pfx_kthread+0x10/0x10
[   13.360628]  ret_from_fork_asm+0x1a/0x30
[   13.360681]  </TASK>
[   13.360694] 
[   13.370714] The buggy address belongs to the physical page:
[   13.371063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f0
[   13.371366] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.371741] flags: 0x200000000000040(head|node=0|zone=2)
[   13.372120] page_type: f8(unknown)
[   13.372342] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.372761] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.373196] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.373531] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.373907] head: 0200000000000002 ffffea000409bc01 00000000ffffffff 00000000ffffffff
[   13.374529] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.374850] page dumped because: kasan: bad access detected
[   13.375063] 
[   13.375148] Memory state around the buggy address:
[   13.375440]  ffff8881026f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.375830]  ffff8881026f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.376292] >ffff8881026f2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   13.376579]                                                              ^
[   13.376876]  ffff8881026f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.377305]  ffff8881026f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.377694] ==================================================================
[   13.105201] ==================================================================
[   13.106162] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   13.106580] Write of size 1 at addr ffff8881003414eb by task kunit_try_catch/173
[   13.107095] 
[   13.107252] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.107313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.107350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.107377] Call Trace:
[   13.107409]  <TASK>
[   13.107432]  dump_stack_lvl+0x73/0xb0
[   13.107471]  print_report+0xd1/0x650
[   13.107498]  ? __virt_addr_valid+0x1db/0x2d0
[   13.107527]  ? krealloc_more_oob_helper+0x821/0x930
[   13.107555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.107581]  ? krealloc_more_oob_helper+0x821/0x930
[   13.107609]  kasan_report+0x141/0x180
[   13.107635]  ? krealloc_more_oob_helper+0x821/0x930
[   13.107685]  __asan_report_store1_noabort+0x1b/0x30
[   13.107710]  krealloc_more_oob_helper+0x821/0x930
[   13.107736]  ? __schedule+0x10cc/0x2b60
[   13.107763]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.107791]  ? finish_task_switch.isra.0+0x153/0x700
[   13.107818]  ? __switch_to+0x47/0xf50
[   13.107849]  ? __schedule+0x10cc/0x2b60
[   13.107874]  ? __pfx_read_tsc+0x10/0x10
[   13.107904]  krealloc_more_oob+0x1c/0x30
[   13.107930]  kunit_try_run_case+0x1a5/0x480
[   13.107961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.107986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.108015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.108041]  ? __kthread_parkme+0x82/0x180
[   13.108067]  ? preempt_count_sub+0x50/0x80
[   13.108094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.108121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.108147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.108174]  kthread+0x337/0x6f0
[   13.108197]  ? trace_preempt_on+0x20/0xc0
[   13.108225]  ? __pfx_kthread+0x10/0x10
[   13.108249]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.108273]  ? calculate_sigpending+0x7b/0xa0
[   13.108302]  ? __pfx_kthread+0x10/0x10
[   13.108327]  ret_from_fork+0x116/0x1d0
[   13.108348]  ? __pfx_kthread+0x10/0x10
[   13.108372]  ret_from_fork_asm+0x1a/0x30
[   13.108410]  </TASK>
[   13.108424] 
[   13.119555] Allocated by task 173:
[   13.119740]  kasan_save_stack+0x45/0x70
[   13.121381]  kasan_save_track+0x18/0x40
[   13.122103]  kasan_save_alloc_info+0x3b/0x50
[   13.122327]  __kasan_krealloc+0x190/0x1f0
[   13.122503]  krealloc_noprof+0xf3/0x340
[   13.122999]  krealloc_more_oob_helper+0x1a9/0x930
[   13.123911]  krealloc_more_oob+0x1c/0x30
[   13.124412]  kunit_try_run_case+0x1a5/0x480
[   13.125125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.125926]  kthread+0x337/0x6f0
[   13.126487]  ret_from_fork+0x116/0x1d0
[   13.127024]  ret_from_fork_asm+0x1a/0x30
[   13.127454] 
[   13.127551] The buggy address belongs to the object at ffff888100341400
[   13.127551]  which belongs to the cache kmalloc-256 of size 256
[   13.128486] The buggy address is located 0 bytes to the right of
[   13.128486]  allocated 235-byte region [ffff888100341400, ffff8881003414eb)
[   13.130028] 
[   13.130235] The buggy address belongs to the physical page:
[   13.130875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.131212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.131487] flags: 0x200000000000040(head|node=0|zone=2)
[   13.132053] page_type: f5(slab)
[   13.132416] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.132784] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.133579] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.134262] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.135247] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.135544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.135853] page dumped because: kasan: bad access detected
[   13.136063] 
[   13.136152] Memory state around the buggy address:
[   13.136345]  ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.137707]  ffff888100341400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.139296] >ffff888100341480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   13.140425]                                                           ^
[   13.141739]  ffff888100341500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.143066]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.144191] ==================================================================
[   13.336874] ==================================================================
[   13.337436] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   13.338114] Write of size 1 at addr ffff8881026f20eb by task kunit_try_catch/177
[   13.338455] 
[   13.338579] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.338634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.338663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.338691] Call Trace:
[   13.338706]  <TASK>
[   13.338728]  dump_stack_lvl+0x73/0xb0
[   13.338764]  print_report+0xd1/0x650
[   13.338790]  ? __virt_addr_valid+0x1db/0x2d0
[   13.338818]  ? krealloc_more_oob_helper+0x821/0x930
[   13.338845]  ? kasan_addr_to_slab+0x11/0xa0
[   13.338869]  ? krealloc_more_oob_helper+0x821/0x930
[   13.338897]  kasan_report+0x141/0x180
[   13.338923]  ? krealloc_more_oob_helper+0x821/0x930
[   13.338956]  __asan_report_store1_noabort+0x1b/0x30
[   13.338980]  krealloc_more_oob_helper+0x821/0x930
[   13.339006]  ? __schedule+0x10cc/0x2b60
[   13.339032]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.339060]  ? finish_task_switch.isra.0+0x153/0x700
[   13.339086]  ? __switch_to+0x47/0xf50
[   13.339117]  ? __schedule+0x10cc/0x2b60
[   13.339142]  ? __pfx_read_tsc+0x10/0x10
[   13.339171]  krealloc_large_more_oob+0x1c/0x30
[   13.339197]  kunit_try_run_case+0x1a5/0x480
[   13.339227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.339252]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.339280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.339306]  ? __kthread_parkme+0x82/0x180
[   13.339329]  ? preempt_count_sub+0x50/0x80
[   13.339355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.339383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.339409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.339435]  kthread+0x337/0x6f0
[   13.339458]  ? trace_preempt_on+0x20/0xc0
[   13.339486]  ? __pfx_kthread+0x10/0x10
[   13.339510]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.339534]  ? calculate_sigpending+0x7b/0xa0
[   13.339562]  ? __pfx_kthread+0x10/0x10
[   13.339587]  ret_from_fork+0x116/0x1d0
[   13.339608]  ? __pfx_kthread+0x10/0x10
[   13.339658]  ret_from_fork_asm+0x1a/0x30
[   13.339697]  </TASK>
[   13.339712] 
[   13.349373] The buggy address belongs to the physical page:
[   13.350035] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f0
[   13.350414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.350799] flags: 0x200000000000040(head|node=0|zone=2)
[   13.351079] page_type: f8(unknown)
[   13.351261] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.351575] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.352037] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.352426] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.352719] head: 0200000000000002 ffffea000409bc01 00000000ffffffff 00000000ffffffff
[   13.353010] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.353588] page dumped because: kasan: bad access detected
[   13.354411] 
[   13.354508] Memory state around the buggy address:
[   13.354714]  ffff8881026f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.355037]  ffff8881026f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.355684] >ffff8881026f2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   13.356128]                                                           ^
[   13.356601]  ffff8881026f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.357021]  ffff8881026f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.357425] ==================================================================
[   13.145926] ==================================================================
[   13.148227] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   13.148602] Write of size 1 at addr ffff8881003414f0 by task kunit_try_catch/173
[   13.149268] 
[   13.149491] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.149547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.149562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.149588] Call Trace:
[   13.149606]  <TASK>
[   13.149629]  dump_stack_lvl+0x73/0xb0
[   13.149681]  print_report+0xd1/0x650
[   13.149707]  ? __virt_addr_valid+0x1db/0x2d0
[   13.149735]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.150076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.150115]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.150143]  kasan_report+0x141/0x180
[   13.150170]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.150203]  __asan_report_store1_noabort+0x1b/0x30
[   13.150226]  krealloc_more_oob_helper+0x7eb/0x930
[   13.150251]  ? __schedule+0x10cc/0x2b60
[   13.150278]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.150305]  ? finish_task_switch.isra.0+0x153/0x700
[   13.150332]  ? __switch_to+0x47/0xf50
[   13.150362]  ? __schedule+0x10cc/0x2b60
[   13.150386]  ? __pfx_read_tsc+0x10/0x10
[   13.150414]  krealloc_more_oob+0x1c/0x30
[   13.150447]  kunit_try_run_case+0x1a5/0x480
[   13.150476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.150500]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.150528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.150554]  ? __kthread_parkme+0x82/0x180
[   13.150577]  ? preempt_count_sub+0x50/0x80
[   13.150603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.150630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.150671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.150697]  kthread+0x337/0x6f0
[   13.150719]  ? trace_preempt_on+0x20/0xc0
[   13.150747]  ? __pfx_kthread+0x10/0x10
[   13.150865]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.150891]  ? calculate_sigpending+0x7b/0xa0
[   13.150919]  ? __pfx_kthread+0x10/0x10
[   13.150943]  ret_from_fork+0x116/0x1d0
[   13.150965]  ? __pfx_kthread+0x10/0x10
[   13.150988]  ret_from_fork_asm+0x1a/0x30
[   13.151023]  </TASK>
[   13.151037] 
[   13.164351] Allocated by task 173:
[   13.164582]  kasan_save_stack+0x45/0x70
[   13.164811]  kasan_save_track+0x18/0x40
[   13.165159]  kasan_save_alloc_info+0x3b/0x50
[   13.165400]  __kasan_krealloc+0x190/0x1f0
[   13.165640]  krealloc_noprof+0xf3/0x340
[   13.165866]  krealloc_more_oob_helper+0x1a9/0x930
[   13.166721]  krealloc_more_oob+0x1c/0x30
[   13.167064]  kunit_try_run_case+0x1a5/0x480
[   13.167302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.167600]  kthread+0x337/0x6f0
[   13.167896]  ret_from_fork+0x116/0x1d0
[   13.168100]  ret_from_fork_asm+0x1a/0x30
[   13.168358] 
[   13.168480] The buggy address belongs to the object at ffff888100341400
[   13.168480]  which belongs to the cache kmalloc-256 of size 256
[   13.169685] The buggy address is located 5 bytes to the right of
[   13.169685]  allocated 235-byte region [ffff888100341400, ffff8881003414eb)
[   13.171119] 
[   13.171263] The buggy address belongs to the physical page:
[   13.171669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.172190] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.172545] flags: 0x200000000000040(head|node=0|zone=2)
[   13.173005] page_type: f5(slab)
[   13.173217] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.173572] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.173923] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.174564] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.174953] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.175477] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.175930] page dumped because: kasan: bad access detected
[   13.176403] 
[   13.176525] Memory state around the buggy address:
[   13.176793]  ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.177323]  ffff888100341400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.177719] >ffff888100341480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   13.178111]                                                              ^
[   13.178486]  ffff888100341500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.179004]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.179360] ==================================================================