Hay
Date
July 10, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.836821] ==================================================================
[   15.837257] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   15.837390] Write of size 1 at addr fff00000c663e0f0 by task kunit_try_catch/160
[   15.837443] 
[   15.837478] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.837689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.837717] Hardware name: linux,dummy-virt (DT)
[   15.838190] Call trace:
[   15.838285]  show_stack+0x20/0x38 (C)
[   15.838505]  dump_stack_lvl+0x8c/0xd0
[   15.838603]  print_report+0x118/0x608
[   15.838727]  kasan_report+0xdc/0x128
[   15.838805]  __asan_report_store1_noabort+0x20/0x30
[   15.839033]  krealloc_more_oob_helper+0x5c0/0x678
[   15.839363]  krealloc_large_more_oob+0x20/0x38
[   15.839422]  kunit_try_run_case+0x170/0x3f0
[   15.839801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.839956]  kthread+0x328/0x630
[   15.840327]  ret_from_fork+0x10/0x20
[   15.840475] 
[   15.840532] The buggy address belongs to the physical page:
[   15.840651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c
[   15.840945] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.841121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.841383] page_type: f8(unknown)
[   15.841492] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.841877] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.841968] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.842381] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.842463] head: 0bfffe0000000002 ffffc1ffc3198f01 00000000ffffffff 00000000ffffffff
[   15.842601] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.842689] page dumped because: kasan: bad access detected
[   15.842882] 
[   15.843044] Memory state around the buggy address:
[   15.844136]  fff00000c663df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.844186]  fff00000c663e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.844227] >fff00000c663e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   15.844263]                                                              ^
[   15.844302]  fff00000c663e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.844342]  fff00000c663e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.844378] ==================================================================
[   15.783071] ==================================================================
[   15.783266] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   15.783321] Write of size 1 at addr fff00000c17b6af0 by task kunit_try_catch/156
[   15.783369] 
[   15.783409] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.783488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.783514] Hardware name: linux,dummy-virt (DT)
[   15.783550] Call trace:
[   15.783580]  show_stack+0x20/0x38 (C)
[   15.783635]  dump_stack_lvl+0x8c/0xd0
[   15.783690]  print_report+0x118/0x608
[   15.783749]  kasan_report+0xdc/0x128
[   15.783795]  __asan_report_store1_noabort+0x20/0x30
[   15.783847]  krealloc_more_oob_helper+0x5c0/0x678
[   15.783902]  krealloc_more_oob+0x20/0x38
[   15.783956]  kunit_try_run_case+0x170/0x3f0
[   15.784012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.784066]  kthread+0x328/0x630
[   15.784135]  ret_from_fork+0x10/0x20
[   15.784191] 
[   15.784209] Allocated by task 156:
[   15.784235]  kasan_save_stack+0x3c/0x68
[   15.784274]  kasan_save_track+0x20/0x40
[   15.784410]  kasan_save_alloc_info+0x40/0x58
[   15.784580]  __kasan_krealloc+0x118/0x178
[   15.784626]  krealloc_noprof+0x128/0x360
[   15.784693]  krealloc_more_oob_helper+0x168/0x678
[   15.784740]  krealloc_more_oob+0x20/0x38
[   15.784776]  kunit_try_run_case+0x170/0x3f0
[   15.784813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.784856]  kthread+0x328/0x630
[   15.784889]  ret_from_fork+0x10/0x20
[   15.784929] 
[   15.784949] The buggy address belongs to the object at fff00000c17b6a00
[   15.784949]  which belongs to the cache kmalloc-256 of size 256
[   15.785003] The buggy address is located 5 bytes to the right of
[   15.785003]  allocated 235-byte region [fff00000c17b6a00, fff00000c17b6aeb)
[   15.785064] 
[   15.785177] The buggy address belongs to the physical page:
[   15.785328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b6
[   15.785384] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.785429] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.785499] page_type: f5(slab)
[   15.785556] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.785623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.785672] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.785719] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.785803] head: 0bfffe0000000001 ffffc1ffc305ed81 00000000ffffffff 00000000ffffffff
[   15.786094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.786165] page dumped because: kasan: bad access detected
[   15.786248] 
[   15.786275] Memory state around the buggy address:
[   15.786306]  fff00000c17b6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.786366]  fff00000c17b6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.786406] >fff00000c17b6a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.786442]                                                              ^
[   15.786701]  fff00000c17b6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.786798]  fff00000c17b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.786857] ==================================================================
[   15.826489] ==================================================================
[   15.826548] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   15.826613] Write of size 1 at addr fff00000c663e0eb by task kunit_try_catch/160
[   15.826672] 
[   15.826710] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.826791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.826817] Hardware name: linux,dummy-virt (DT)
[   15.826848] Call trace:
[   15.826871]  show_stack+0x20/0x38 (C)
[   15.828027]  dump_stack_lvl+0x8c/0xd0
[   15.828124]  print_report+0x118/0x608
[   15.828499]  kasan_report+0xdc/0x128
[   15.828813]  __asan_report_store1_noabort+0x20/0x30
[   15.828958]  krealloc_more_oob_helper+0x60c/0x678
[   15.829294]  krealloc_large_more_oob+0x20/0x38
[   15.829510]  kunit_try_run_case+0x170/0x3f0
[   15.829809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.830021]  kthread+0x328/0x630
[   15.830131]  ret_from_fork+0x10/0x20
[   15.830186] 
[   15.830233] The buggy address belongs to the physical page:
[   15.830671] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c
[   15.830855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.831035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.831108] page_type: f8(unknown)
[   15.831231] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.831283] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.831353] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.831412] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.831468] head: 0bfffe0000000002 ffffc1ffc3198f01 00000000ffffffff 00000000ffffffff
[   15.831516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.831555] page dumped because: kasan: bad access detected
[   15.831595] 
[   15.831613] Memory state around the buggy address:
[   15.831653]  fff00000c663df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.831703]  fff00000c663e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.831744] >fff00000c663e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   15.831808]                                                           ^
[   15.831852]  fff00000c663e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.831893]  fff00000c663e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.831945] ==================================================================
[   15.776455] ==================================================================
[   15.776528] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   15.776645] Write of size 1 at addr fff00000c17b6aeb by task kunit_try_catch/156
[   15.776701] 
[   15.776748] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.776848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.776874] Hardware name: linux,dummy-virt (DT)
[   15.776914] Call trace:
[   15.776954]  show_stack+0x20/0x38 (C)
[   15.777006]  dump_stack_lvl+0x8c/0xd0
[   15.777062]  print_report+0x118/0x608
[   15.777122]  kasan_report+0xdc/0x128
[   15.777168]  __asan_report_store1_noabort+0x20/0x30
[   15.777501]  krealloc_more_oob_helper+0x60c/0x678
[   15.777572]  krealloc_more_oob+0x20/0x38
[   15.777627]  kunit_try_run_case+0x170/0x3f0
[   15.777678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.777732]  kthread+0x328/0x630
[   15.778121]  ret_from_fork+0x10/0x20
[   15.778396] 
[   15.778422] Allocated by task 156:
[   15.778452]  kasan_save_stack+0x3c/0x68
[   15.778497]  kasan_save_track+0x20/0x40
[   15.778533]  kasan_save_alloc_info+0x40/0x58
[   15.778678]  __kasan_krealloc+0x118/0x178
[   15.778873]  krealloc_noprof+0x128/0x360
[   15.779028]  krealloc_more_oob_helper+0x168/0x678
[   15.779130]  krealloc_more_oob+0x20/0x38
[   15.779208]  kunit_try_run_case+0x170/0x3f0
[   15.779277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.779343]  kthread+0x328/0x630
[   15.779406]  ret_from_fork+0x10/0x20
[   15.779464] 
[   15.779535] The buggy address belongs to the object at fff00000c17b6a00
[   15.779535]  which belongs to the cache kmalloc-256 of size 256
[   15.779643] The buggy address is located 0 bytes to the right of
[   15.779643]  allocated 235-byte region [fff00000c17b6a00, fff00000c17b6aeb)
[   15.779705] 
[   15.779750] The buggy address belongs to the physical page:
[   15.779796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b6
[   15.780127] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.780216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.780315] page_type: f5(slab)
[   15.780377] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.780741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.780909] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.781027] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.781094] head: 0bfffe0000000001 ffffc1ffc305ed81 00000000ffffffff 00000000ffffffff
[   15.781141] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.781419] page dumped because: kasan: bad access detected
[   15.781467] 
[   15.781547] Memory state around the buggy address:
[   15.781608]  fff00000c17b6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781672]  fff00000c17b6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.781744] >fff00000c17b6a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.781845]                                                           ^
[   15.781902]  fff00000c17b6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781957]  fff00000c17b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.782016] ==================================================================

[   12.542416] ==================================================================
[   12.542741] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.543008] Write of size 1 at addr ffff8881021160f0 by task kunit_try_catch/177
[   12.543263] 
[   12.543595] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.543640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.543651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.543669] Call Trace:
[   12.543682]  <TASK>
[   12.543695]  dump_stack_lvl+0x73/0xb0
[   12.543724]  print_report+0xd1/0x650
[   12.543746]  ? __virt_addr_valid+0x1db/0x2d0
[   12.543768]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.543791]  ? kasan_addr_to_slab+0x11/0xa0
[   12.543812]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.543836]  kasan_report+0x141/0x180
[   12.543858]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.543886]  __asan_report_store1_noabort+0x1b/0x30
[   12.543912]  krealloc_more_oob_helper+0x7eb/0x930
[   12.543934]  ? __schedule+0x10cc/0x2b60
[   12.543956]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.543980]  ? finish_task_switch.isra.0+0x153/0x700
[   12.544003]  ? __switch_to+0x47/0xf50
[   12.544027]  ? __schedule+0x10cc/0x2b60
[   12.544047]  ? __pfx_read_tsc+0x10/0x10
[   12.544070]  krealloc_large_more_oob+0x1c/0x30
[   12.544093]  kunit_try_run_case+0x1a5/0x480
[   12.544116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.544139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.544161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.544189]  ? __kthread_parkme+0x82/0x180
[   12.544209]  ? preempt_count_sub+0x50/0x80
[   12.544231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.544255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.544278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.544303]  kthread+0x337/0x6f0
[   12.544321]  ? trace_preempt_on+0x20/0xc0
[   12.544344]  ? __pfx_kthread+0x10/0x10
[   12.544429]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.544451]  ? calculate_sigpending+0x7b/0xa0
[   12.544474]  ? __pfx_kthread+0x10/0x10
[   12.544495]  ret_from_fork+0x116/0x1d0
[   12.544513]  ? __pfx_kthread+0x10/0x10
[   12.544533]  ret_from_fork_asm+0x1a/0x30
[   12.544562]  </TASK>
[   12.544571] 
[   12.552404] The buggy address belongs to the physical page:
[   12.552778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102114
[   12.553111] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.553586] flags: 0x200000000000040(head|node=0|zone=2)
[   12.553807] page_type: f8(unknown)
[   12.553932] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.554186] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.554902] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.555407] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.555718] head: 0200000000000002 ffffea0004084501 00000000ffffffff 00000000ffffffff
[   12.555979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.556212] page dumped because: kasan: bad access detected
[   12.556469] 
[   12.556562] Memory state around the buggy address:
[   12.556782]  ffff888102115f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.557130]  ffff888102116000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.557346] >ffff888102116080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.557687]                                                              ^
[   12.557998]  ffff888102116100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.558313]  ffff888102116180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.558638] ==================================================================
[   12.365257] ==================================================================
[   12.365766] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.366154] Write of size 1 at addr ffff8881003586f0 by task kunit_try_catch/173
[   12.366626] 
[   12.366735] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.366807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.366818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.366837] Call Trace:
[   12.366850]  <TASK>
[   12.366864]  dump_stack_lvl+0x73/0xb0
[   12.366891]  print_report+0xd1/0x650
[   12.366913]  ? __virt_addr_valid+0x1db/0x2d0
[   12.366965]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.366988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.367011]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.367035]  kasan_report+0x141/0x180
[   12.367057]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.367117]  __asan_report_store1_noabort+0x1b/0x30
[   12.367143]  krealloc_more_oob_helper+0x7eb/0x930
[   12.367165]  ? __schedule+0x10cc/0x2b60
[   12.367187]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.367211]  ? finish_task_switch.isra.0+0x153/0x700
[   12.367232]  ? __switch_to+0x47/0xf50
[   12.367256]  ? __schedule+0x10cc/0x2b60
[   12.367276]  ? __pfx_read_tsc+0x10/0x10
[   12.367300]  krealloc_more_oob+0x1c/0x30
[   12.367321]  kunit_try_run_case+0x1a5/0x480
[   12.367414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.367457]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.367480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.367504]  ? __kthread_parkme+0x82/0x180
[   12.367523]  ? preempt_count_sub+0x50/0x80
[   12.367546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.367570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.367593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.367618]  kthread+0x337/0x6f0
[   12.367676]  ? trace_preempt_on+0x20/0xc0
[   12.367699]  ? __pfx_kthread+0x10/0x10
[   12.367719]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.367740]  ? calculate_sigpending+0x7b/0xa0
[   12.367762]  ? __pfx_kthread+0x10/0x10
[   12.367784]  ret_from_fork+0x116/0x1d0
[   12.367833]  ? __pfx_kthread+0x10/0x10
[   12.367853]  ret_from_fork_asm+0x1a/0x30
[   12.367883]  </TASK>
[   12.367892] 
[   12.382118] Allocated by task 173:
[   12.382522]  kasan_save_stack+0x45/0x70
[   12.382940]  kasan_save_track+0x18/0x40
[   12.383079]  kasan_save_alloc_info+0x3b/0x50
[   12.383228]  __kasan_krealloc+0x190/0x1f0
[   12.383444]  krealloc_noprof+0xf3/0x340
[   12.383889]  krealloc_more_oob_helper+0x1a9/0x930
[   12.384547]  krealloc_more_oob+0x1c/0x30
[   12.384953]  kunit_try_run_case+0x1a5/0x480
[   12.385411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.385993]  kthread+0x337/0x6f0
[   12.386310]  ret_from_fork+0x116/0x1d0
[   12.386776]  ret_from_fork_asm+0x1a/0x30
[   12.386927] 
[   12.387040] The buggy address belongs to the object at ffff888100358600
[   12.387040]  which belongs to the cache kmalloc-256 of size 256
[   12.388150] The buggy address is located 5 bytes to the right of
[   12.388150]  allocated 235-byte region [ffff888100358600, ffff8881003586eb)
[   12.389087] 
[   12.389266] The buggy address belongs to the physical page:
[   12.389797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100358
[   12.390738] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.391238] flags: 0x200000000000040(head|node=0|zone=2)
[   12.391782] page_type: f5(slab)
[   12.392099] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.392850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.393327] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.393936] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.394710] head: 0200000000000001 ffffea000400d601 00000000ffffffff 00000000ffffffff
[   12.394953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.395181] page dumped because: kasan: bad access detected
[   12.395359] 
[   12.395529] Memory state around the buggy address:
[   12.396084]  ffff888100358580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.396844]  ffff888100358600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.397533] >ffff888100358680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.398281]                                                              ^
[   12.399012]  ffff888100358700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.400163]  ffff888100358780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.400859] ==================================================================
[   12.525279] ==================================================================
[   12.526065] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.526346] Write of size 1 at addr ffff8881021160eb by task kunit_try_catch/177
[   12.526784] 
[   12.526939] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.526980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.526991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.527009] Call Trace:
[   12.527020]  <TASK>
[   12.527035]  dump_stack_lvl+0x73/0xb0
[   12.527062]  print_report+0xd1/0x650
[   12.527084]  ? __virt_addr_valid+0x1db/0x2d0
[   12.527105]  ? krealloc_more_oob_helper+0x821/0x930
[   12.527128]  ? kasan_addr_to_slab+0x11/0xa0
[   12.527149]  ? krealloc_more_oob_helper+0x821/0x930
[   12.527172]  kasan_report+0x141/0x180
[   12.527194]  ? krealloc_more_oob_helper+0x821/0x930
[   12.527222]  __asan_report_store1_noabort+0x1b/0x30
[   12.527249]  krealloc_more_oob_helper+0x821/0x930
[   12.527272]  ? __schedule+0x10cc/0x2b60
[   12.527294]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.527318]  ? finish_task_switch.isra.0+0x153/0x700
[   12.527340]  ? __switch_to+0x47/0xf50
[   12.527389]  ? __schedule+0x10cc/0x2b60
[   12.527410]  ? __pfx_read_tsc+0x10/0x10
[   12.527433]  krealloc_large_more_oob+0x1c/0x30
[   12.527456]  kunit_try_run_case+0x1a5/0x480
[   12.527479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.527501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.527524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.527547]  ? __kthread_parkme+0x82/0x180
[   12.527568]  ? preempt_count_sub+0x50/0x80
[   12.527590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.527613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.527637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.527661]  kthread+0x337/0x6f0
[   12.527680]  ? trace_preempt_on+0x20/0xc0
[   12.527702]  ? __pfx_kthread+0x10/0x10
[   12.527722]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.527743]  ? calculate_sigpending+0x7b/0xa0
[   12.527766]  ? __pfx_kthread+0x10/0x10
[   12.527787]  ret_from_fork+0x116/0x1d0
[   12.527805]  ? __pfx_kthread+0x10/0x10
[   12.527825]  ret_from_fork_asm+0x1a/0x30
[   12.527855]  </TASK>
[   12.527864] 
[   12.535550] The buggy address belongs to the physical page:
[   12.535730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102114
[   12.536082] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.536653] flags: 0x200000000000040(head|node=0|zone=2)
[   12.536874] page_type: f8(unknown)
[   12.537032] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.537300] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.537798] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.538101] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.538549] head: 0200000000000002 ffffea0004084501 00000000ffffffff 00000000ffffffff
[   12.538826] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.539049] page dumped because: kasan: bad access detected
[   12.539218] 
[   12.539315] Memory state around the buggy address:
[   12.539544]  ffff888102115f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.539858]  ffff888102116000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.540447] >ffff888102116080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.540658]                                                           ^
[   12.540851]  ffff888102116100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.541479]  ffff888102116180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.541947] ==================================================================
[   12.343024] ==================================================================
[   12.343826] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.344176] Write of size 1 at addr ffff8881003586eb by task kunit_try_catch/173
[   12.344570] 
[   12.344684] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.344735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.344746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.344764] Call Trace:
[   12.344775]  <TASK>
[   12.344800]  dump_stack_lvl+0x73/0xb0
[   12.344837]  print_report+0xd1/0x650
[   12.344859]  ? __virt_addr_valid+0x1db/0x2d0
[   12.344891]  ? krealloc_more_oob_helper+0x821/0x930
[   12.344914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.344937]  ? krealloc_more_oob_helper+0x821/0x930
[   12.344960]  kasan_report+0x141/0x180
[   12.344983]  ? krealloc_more_oob_helper+0x821/0x930
[   12.345011]  __asan_report_store1_noabort+0x1b/0x30
[   12.345038]  krealloc_more_oob_helper+0x821/0x930
[   12.345069]  ? __schedule+0x10cc/0x2b60
[   12.345091]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.345115]  ? finish_task_switch.isra.0+0x153/0x700
[   12.345148]  ? __switch_to+0x47/0xf50
[   12.345174]  ? __schedule+0x10cc/0x2b60
[   12.345194]  ? __pfx_read_tsc+0x10/0x10
[   12.345218]  krealloc_more_oob+0x1c/0x30
[   12.345239]  kunit_try_run_case+0x1a5/0x480
[   12.345272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.345294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.345317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.345402]  ? __kthread_parkme+0x82/0x180
[   12.345426]  ? preempt_count_sub+0x50/0x80
[   12.345461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.345485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.345509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.345534]  kthread+0x337/0x6f0
[   12.345552]  ? trace_preempt_on+0x20/0xc0
[   12.345574]  ? __pfx_kthread+0x10/0x10
[   12.345594]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.345615]  ? calculate_sigpending+0x7b/0xa0
[   12.345638]  ? __pfx_kthread+0x10/0x10
[   12.345659]  ret_from_fork+0x116/0x1d0
[   12.345677]  ? __pfx_kthread+0x10/0x10
[   12.345696]  ret_from_fork_asm+0x1a/0x30
[   12.345726]  </TASK>
[   12.345736] 
[   12.354231] Allocated by task 173:
[   12.354587]  kasan_save_stack+0x45/0x70
[   12.354822]  kasan_save_track+0x18/0x40
[   12.355001]  kasan_save_alloc_info+0x3b/0x50
[   12.355232]  __kasan_krealloc+0x190/0x1f0
[   12.355491]  krealloc_noprof+0xf3/0x340
[   12.355698]  krealloc_more_oob_helper+0x1a9/0x930
[   12.355918]  krealloc_more_oob+0x1c/0x30
[   12.356112]  kunit_try_run_case+0x1a5/0x480
[   12.356327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.356663]  kthread+0x337/0x6f0
[   12.356791]  ret_from_fork+0x116/0x1d0
[   12.356923]  ret_from_fork_asm+0x1a/0x30
[   12.357061] 
[   12.357167] The buggy address belongs to the object at ffff888100358600
[   12.357167]  which belongs to the cache kmalloc-256 of size 256
[   12.357839] The buggy address is located 0 bytes to the right of
[   12.357839]  allocated 235-byte region [ffff888100358600, ffff8881003586eb)
[   12.358320] 
[   12.358401] The buggy address belongs to the physical page:
[   12.358571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100358
[   12.359011] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.359441] flags: 0x200000000000040(head|node=0|zone=2)
[   12.359679] page_type: f5(slab)
[   12.359835] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.360141] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.361322] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.361584] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.361819] head: 0200000000000001 ffffea000400d601 00000000ffffffff 00000000ffffffff
[   12.362049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.362275] page dumped because: kasan: bad access detected
[   12.362453] 
[   12.362523] Memory state around the buggy address:
[   12.362678]  ffff888100358580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.362892]  ffff888100358600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.363103] >ffff888100358680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.363312]                                                           ^
[   12.363722]  ffff888100358700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.364046]  ffff888100358780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.364520] ==================================================================