Hay
Date
July 9, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.597709] ==================================================================
[   16.597761] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.597958] Write of size 1 at addr fff00000c77220f0 by task kunit_try_catch/160
[   16.598034] 
[   16.598067] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.598208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.598234] Hardware name: linux,dummy-virt (DT)
[   16.598290] Call trace:
[   16.598320]  show_stack+0x20/0x38 (C)
[   16.598578]  dump_stack_lvl+0x8c/0xd0
[   16.598647]  print_report+0x118/0x608
[   16.599054]  kasan_report+0xdc/0x128
[   16.599180]  __asan_report_store1_noabort+0x20/0x30
[   16.599231]  krealloc_more_oob_helper+0x5c0/0x678
[   16.599285]  krealloc_large_more_oob+0x20/0x38
[   16.599331]  kunit_try_run_case+0x170/0x3f0
[   16.599634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.599812]  kthread+0x328/0x630
[   16.599900]  ret_from_fork+0x10/0x20
[   16.600053] 
[   16.600167] The buggy address belongs to the physical page:
[   16.600232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   16.600365] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.600413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.600485] page_type: f8(unknown)
[   16.600530] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.601048] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.601185] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.601319] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.601525] head: 0bfffe0000000002 ffffc1ffc31dc801 00000000ffffffff 00000000ffffffff
[   16.601596] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.602063] page dumped because: kasan: bad access detected
[   16.602187] 
[   16.602326] Memory state around the buggy address:
[   16.602454]  fff00000c7721f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.602500]  fff00000c7722000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.602593] >fff00000c7722080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.602934]                                                              ^
[   16.602980]  fff00000c7722100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.603025]  fff00000c7722180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.603299] ==================================================================
[   16.516591] ==================================================================
[   16.517353] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.517556] Write of size 1 at addr fff00000c461ccf0 by task kunit_try_catch/156
[   16.517774] 
[   16.517815] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.518035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.518073] Hardware name: linux,dummy-virt (DT)
[   16.518224] Call trace:
[   16.518346]  show_stack+0x20/0x38 (C)
[   16.518459]  dump_stack_lvl+0x8c/0xd0
[   16.518549]  print_report+0x118/0x608
[   16.518726]  kasan_report+0xdc/0x128
[   16.518990]  __asan_report_store1_noabort+0x20/0x30
[   16.519059]  krealloc_more_oob_helper+0x5c0/0x678
[   16.519235]  krealloc_more_oob+0x20/0x38
[   16.519296]  kunit_try_run_case+0x170/0x3f0
[   16.519503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.519572]  kthread+0x328/0x630
[   16.519663]  ret_from_fork+0x10/0x20
[   16.519769] 
[   16.519787] Allocated by task 156:
[   16.520032]  kasan_save_stack+0x3c/0x68
[   16.520236]  kasan_save_track+0x20/0x40
[   16.520351]  kasan_save_alloc_info+0x40/0x58
[   16.520508]  __kasan_krealloc+0x118/0x178
[   16.520732]  krealloc_noprof+0x128/0x360
[   16.520976]  krealloc_more_oob_helper+0x168/0x678
[   16.521191]  krealloc_more_oob+0x20/0x38
[   16.521364]  kunit_try_run_case+0x170/0x3f0
[   16.521455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.521675]  kthread+0x328/0x630
[   16.522081]  ret_from_fork+0x10/0x20
[   16.522428] 
[   16.522595] The buggy address belongs to the object at fff00000c461cc00
[   16.522595]  which belongs to the cache kmalloc-256 of size 256
[   16.522713] The buggy address is located 5 bytes to the right of
[   16.522713]  allocated 235-byte region [fff00000c461cc00, fff00000c461cceb)
[   16.523133] 
[   16.523263] The buggy address belongs to the physical page:
[   16.523375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10461c
[   16.523431] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.523561] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.523950] page_type: f5(slab)
[   16.524001] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.524051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.524346] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.524588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.524691] head: 0bfffe0000000001 ffffc1ffc3118701 00000000ffffffff 00000000ffffffff
[   16.524850] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.525036] page dumped because: kasan: bad access detected
[   16.525281] 
[   16.525382] Memory state around the buggy address:
[   16.525517]  fff00000c461cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.525563]  fff00000c461cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.525897] >fff00000c461cc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.526151]                                                              ^
[   16.526315]  fff00000c461cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.526595]  fff00000c461cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.526691] ==================================================================
[   16.592880] ==================================================================
[   16.593198] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.593375] Write of size 1 at addr fff00000c77220eb by task kunit_try_catch/160
[   16.593427] 
[   16.593464] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.593705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.593910] Hardware name: linux,dummy-virt (DT)
[   16.593988] Call trace:
[   16.594035]  show_stack+0x20/0x38 (C)
[   16.594098]  dump_stack_lvl+0x8c/0xd0
[   16.594425]  print_report+0x118/0x608
[   16.594503]  kasan_report+0xdc/0x128
[   16.594586]  __asan_report_store1_noabort+0x20/0x30
[   16.594639]  krealloc_more_oob_helper+0x60c/0x678
[   16.594698]  krealloc_large_more_oob+0x20/0x38
[   16.594753]  kunit_try_run_case+0x170/0x3f0
[   16.594802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.594854]  kthread+0x328/0x630
[   16.594895]  ret_from_fork+0x10/0x20
[   16.594943] 
[   16.594964] The buggy address belongs to the physical page:
[   16.595005] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   16.595066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.595124] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.595178] page_type: f8(unknown)
[   16.595217] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.595266] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.595314] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.595362] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.595410] head: 0bfffe0000000002 ffffc1ffc31dc801 00000000ffffffff 00000000ffffffff
[   16.595456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.595502] page dumped because: kasan: bad access detected
[   16.595541] 
[   16.595558] Memory state around the buggy address:
[   16.595597]  fff00000c7721f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.595640]  fff00000c7722000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.596289] >fff00000c7722080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.596441]                                                           ^
[   16.596489]  fff00000c7722100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.596532]  fff00000c7722180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.596732] ==================================================================
[   16.507095] ==================================================================
[   16.507309] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.507411] Write of size 1 at addr fff00000c461cceb by task kunit_try_catch/156
[   16.507526] 
[   16.507613] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.507818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.507845] Hardware name: linux,dummy-virt (DT)
[   16.507899] Call trace:
[   16.507923]  show_stack+0x20/0x38 (C)
[   16.507978]  dump_stack_lvl+0x8c/0xd0
[   16.508444]  print_report+0x118/0x608
[   16.508578]  kasan_report+0xdc/0x128
[   16.508741]  __asan_report_store1_noabort+0x20/0x30
[   16.508902]  krealloc_more_oob_helper+0x60c/0x678
[   16.509473]  krealloc_more_oob+0x20/0x38
[   16.509666]  kunit_try_run_case+0x170/0x3f0
[   16.510502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.510573]  kthread+0x328/0x630
[   16.511041]  ret_from_fork+0x10/0x20
[   16.511196] 
[   16.511663] Allocated by task 156:
[   16.511727]  kasan_save_stack+0x3c/0x68
[   16.511775]  kasan_save_track+0x20/0x40
[   16.511811]  kasan_save_alloc_info+0x40/0x58
[   16.511849]  __kasan_krealloc+0x118/0x178
[   16.512197]  krealloc_noprof+0x128/0x360
[   16.512366]  krealloc_more_oob_helper+0x168/0x678
[   16.512446]  krealloc_more_oob+0x20/0x38
[   16.512656]  kunit_try_run_case+0x170/0x3f0
[   16.512822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.512869]  kthread+0x328/0x630
[   16.513083]  ret_from_fork+0x10/0x20
[   16.513516] 
[   16.513612] The buggy address belongs to the object at fff00000c461cc00
[   16.513612]  which belongs to the cache kmalloc-256 of size 256
[   16.513808] The buggy address is located 0 bytes to the right of
[   16.513808]  allocated 235-byte region [fff00000c461cc00, fff00000c461cceb)
[   16.513953] 
[   16.514025] The buggy address belongs to the physical page:
[   16.514211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10461c
[   16.514407] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.514480] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.514882] page_type: f5(slab)
[   16.514934] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.514983] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.515075] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.515152] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.515209] head: 0bfffe0000000001 ffffc1ffc3118701 00000000ffffffff 00000000ffffffff
[   16.515256] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.515305] page dumped because: kasan: bad access detected
[   16.515341] 
[   16.515359] Memory state around the buggy address:
[   16.515392]  fff00000c461cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.515433]  fff00000c461cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.515483] >fff00000c461cc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.515521]                                                           ^
[   16.515558]  fff00000c461cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.515599]  fff00000c461cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.515644] ==================================================================

[   12.341056] ==================================================================
[   12.342451] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.343411] Write of size 1 at addr ffff8881028ca0eb by task kunit_try_catch/177
[   12.344372] 
[   12.344560] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.344604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.344615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.344635] Call Trace:
[   12.344647]  <TASK>
[   12.344663]  dump_stack_lvl+0x73/0xb0
[   12.344694]  print_report+0xd1/0x650
[   12.344834]  ? __virt_addr_valid+0x1db/0x2d0
[   12.344858]  ? krealloc_more_oob_helper+0x821/0x930
[   12.344882]  ? kasan_addr_to_slab+0x11/0xa0
[   12.344909]  ? krealloc_more_oob_helper+0x821/0x930
[   12.344933]  kasan_report+0x141/0x180
[   12.344956]  ? krealloc_more_oob_helper+0x821/0x930
[   12.344985]  __asan_report_store1_noabort+0x1b/0x30
[   12.345010]  krealloc_more_oob_helper+0x821/0x930
[   12.345039]  ? __schedule+0x10cc/0x2b60
[   12.345061]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.345086]  ? finish_task_switch.isra.0+0x153/0x700
[   12.345109]  ? __switch_to+0x47/0xf50
[   12.345133]  ? __schedule+0x10cc/0x2b60
[   12.345153]  ? __pfx_read_tsc+0x10/0x10
[   12.345178]  krealloc_large_more_oob+0x1c/0x30
[   12.345201]  kunit_try_run_case+0x1a5/0x480
[   12.345225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.345247]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.345270]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.345293]  ? __kthread_parkme+0x82/0x180
[   12.345314]  ? preempt_count_sub+0x50/0x80
[   12.345338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.345362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.345386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.345411]  kthread+0x337/0x6f0
[   12.345430]  ? trace_preempt_on+0x20/0xc0
[   12.345454]  ? __pfx_kthread+0x10/0x10
[   12.345474]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.345496]  ? calculate_sigpending+0x7b/0xa0
[   12.345519]  ? __pfx_kthread+0x10/0x10
[   12.345540]  ret_from_fork+0x116/0x1d0
[   12.345558]  ? __pfx_kthread+0x10/0x10
[   12.345577]  ret_from_fork_asm+0x1a/0x30
[   12.345607]  </TASK>
[   12.345618] 
[   12.357855] The buggy address belongs to the physical page:
[   12.358118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c8
[   12.358762] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.359083] flags: 0x200000000000040(head|node=0|zone=2)
[   12.359656] page_type: f8(unknown)
[   12.359828] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.360407] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.360742] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.361063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.361601] head: 0200000000000002 ffffea00040a3201 00000000ffffffff 00000000ffffffff
[   12.362092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.362503] page dumped because: kasan: bad access detected
[   12.362832] 
[   12.362918] Memory state around the buggy address:
[   12.363479]  ffff8881028c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.363801]  ffff8881028ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.364173] >ffff8881028ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.364632]                                                           ^
[   12.365029]  ffff8881028ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.365490]  ffff8881028ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.365887] ==================================================================
[   12.366384] ==================================================================
[   12.366672] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.367012] Write of size 1 at addr ffff8881028ca0f0 by task kunit_try_catch/177
[   12.367479] 
[   12.367574] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.367614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.367626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.367645] Call Trace:
[   12.367656]  <TASK>
[   12.367668]  dump_stack_lvl+0x73/0xb0
[   12.367696]  print_report+0xd1/0x650
[   12.367733]  ? __virt_addr_valid+0x1db/0x2d0
[   12.367755]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.367779]  ? kasan_addr_to_slab+0x11/0xa0
[   12.367799]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.367824]  kasan_report+0x141/0x180
[   12.367846]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.367875]  __asan_report_store1_noabort+0x1b/0x30
[   12.367900]  krealloc_more_oob_helper+0x7eb/0x930
[   12.367923]  ? __schedule+0x10cc/0x2b60
[   12.367944]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.367969]  ? finish_task_switch.isra.0+0x153/0x700
[   12.367992]  ? __switch_to+0x47/0xf50
[   12.368016]  ? __schedule+0x10cc/0x2b60
[   12.368052]  ? __pfx_read_tsc+0x10/0x10
[   12.368076]  krealloc_large_more_oob+0x1c/0x30
[   12.368099]  kunit_try_run_case+0x1a5/0x480
[   12.368123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.368146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.368169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.368192]  ? __kthread_parkme+0x82/0x180
[   12.368212]  ? preempt_count_sub+0x50/0x80
[   12.368235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.368259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.368283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.368308]  kthread+0x337/0x6f0
[   12.368336]  ? trace_preempt_on+0x20/0xc0
[   12.368360]  ? __pfx_kthread+0x10/0x10
[   12.368380]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.368402]  ? calculate_sigpending+0x7b/0xa0
[   12.368425]  ? __pfx_kthread+0x10/0x10
[   12.368446]  ret_from_fork+0x116/0x1d0
[   12.368464]  ? __pfx_kthread+0x10/0x10
[   12.368484]  ret_from_fork_asm+0x1a/0x30
[   12.368515]  </TASK>
[   12.368524] 
[   12.376471] The buggy address belongs to the physical page:
[   12.376653] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c8
[   12.376981] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.377309] flags: 0x200000000000040(head|node=0|zone=2)
[   12.377565] page_type: f8(unknown)
[   12.377713] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.377944] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.378680] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.379017] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.379443] head: 0200000000000002 ffffea00040a3201 00000000ffffffff 00000000ffffffff
[   12.379720] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.380231] page dumped because: kasan: bad access detected
[   12.380458] 
[   12.380554] Memory state around the buggy address:
[   12.380751]  ffff8881028c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.381129]  ffff8881028ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.381407] >ffff8881028ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.381679]                                                              ^
[   12.381955]  ffff8881028ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.382405]  ffff8881028ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.382628] ==================================================================
[   12.170057] ==================================================================
[   12.170439] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.170685] Write of size 1 at addr ffff8881003508eb by task kunit_try_catch/173
[   12.171316] 
[   12.171415] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.171456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.171468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.171486] Call Trace:
[   12.172150]  <TASK>
[   12.172175]  dump_stack_lvl+0x73/0xb0
[   12.172207]  print_report+0xd1/0x650
[   12.172229]  ? __virt_addr_valid+0x1db/0x2d0
[   12.172251]  ? krealloc_more_oob_helper+0x821/0x930
[   12.172276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.172299]  ? krealloc_more_oob_helper+0x821/0x930
[   12.172332]  kasan_report+0x141/0x180
[   12.172353]  ? krealloc_more_oob_helper+0x821/0x930
[   12.172381]  __asan_report_store1_noabort+0x1b/0x30
[   12.172406]  krealloc_more_oob_helper+0x821/0x930
[   12.172429]  ? __schedule+0x10cc/0x2b60
[   12.172450]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.172475]  ? finish_task_switch.isra.0+0x153/0x700
[   12.172497]  ? __switch_to+0x47/0xf50
[   12.172523]  ? __schedule+0x10cc/0x2b60
[   12.172544]  ? __pfx_read_tsc+0x10/0x10
[   12.172567]  krealloc_more_oob+0x1c/0x30
[   12.172589]  kunit_try_run_case+0x1a5/0x480
[   12.172612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.172634]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.172658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.172683]  ? __kthread_parkme+0x82/0x180
[   12.172716]  ? preempt_count_sub+0x50/0x80
[   12.172738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.172762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.172798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.172842]  kthread+0x337/0x6f0
[   12.172862]  ? trace_preempt_on+0x20/0xc0
[   12.172885]  ? __pfx_kthread+0x10/0x10
[   12.172906]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.172927]  ? calculate_sigpending+0x7b/0xa0
[   12.172950]  ? __pfx_kthread+0x10/0x10
[   12.172971]  ret_from_fork+0x116/0x1d0
[   12.172989]  ? __pfx_kthread+0x10/0x10
[   12.173044]  ret_from_fork_asm+0x1a/0x30
[   12.173089]  </TASK>
[   12.173099] 
[   12.183713] Allocated by task 173:
[   12.184161]  kasan_save_stack+0x45/0x70
[   12.184461]  kasan_save_track+0x18/0x40
[   12.184624]  kasan_save_alloc_info+0x3b/0x50
[   12.184991]  __kasan_krealloc+0x190/0x1f0
[   12.185488]  krealloc_noprof+0xf3/0x340
[   12.185760]  krealloc_more_oob_helper+0x1a9/0x930
[   12.186144]  krealloc_more_oob+0x1c/0x30
[   12.186473]  kunit_try_run_case+0x1a5/0x480
[   12.186801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.187212]  kthread+0x337/0x6f0
[   12.187494]  ret_from_fork+0x116/0x1d0
[   12.187641]  ret_from_fork_asm+0x1a/0x30
[   12.187854] 
[   12.187951] The buggy address belongs to the object at ffff888100350800
[   12.187951]  which belongs to the cache kmalloc-256 of size 256
[   12.188454] The buggy address is located 0 bytes to the right of
[   12.188454]  allocated 235-byte region [ffff888100350800, ffff8881003508eb)
[   12.188951] 
[   12.189047] The buggy address belongs to the physical page:
[   12.189278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   12.189634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.190647] flags: 0x200000000000040(head|node=0|zone=2)
[   12.191136] page_type: f5(slab)
[   12.191302] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.191777] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.192247] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.192718] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.193229] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   12.193681] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.194273] page dumped because: kasan: bad access detected
[   12.194605] 
[   12.194691] Memory state around the buggy address:
[   12.195188]  ffff888100350780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.195622]  ffff888100350800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.195941] >ffff888100350880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.196437]                                                           ^
[   12.196832]  ffff888100350900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.197305]  ffff888100350980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.197734] ==================================================================
[   12.198892] ==================================================================
[   12.199528] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.199894] Write of size 1 at addr ffff8881003508f0 by task kunit_try_catch/173
[   12.200573] 
[   12.200781] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.200824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.200835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.200854] Call Trace:
[   12.200864]  <TASK>
[   12.200878]  dump_stack_lvl+0x73/0xb0
[   12.200907]  print_report+0xd1/0x650
[   12.200928]  ? __virt_addr_valid+0x1db/0x2d0
[   12.200951]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.200976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.201000]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.201217]  kasan_report+0x141/0x180
[   12.201241]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.201270]  __asan_report_store1_noabort+0x1b/0x30
[   12.201295]  krealloc_more_oob_helper+0x7eb/0x930
[   12.201318]  ? __schedule+0x10cc/0x2b60
[   12.201340]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.201364]  ? finish_task_switch.isra.0+0x153/0x700
[   12.201388]  ? __switch_to+0x47/0xf50
[   12.201412]  ? __schedule+0x10cc/0x2b60
[   12.201432]  ? __pfx_read_tsc+0x10/0x10
[   12.201455]  krealloc_more_oob+0x1c/0x30
[   12.201476]  kunit_try_run_case+0x1a5/0x480
[   12.201501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.201523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.201546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.201569]  ? __kthread_parkme+0x82/0x180
[   12.201589]  ? preempt_count_sub+0x50/0x80
[   12.201611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.201635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.201659]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.201683]  kthread+0x337/0x6f0
[   12.201718]  ? trace_preempt_on+0x20/0xc0
[   12.201741]  ? __pfx_kthread+0x10/0x10
[   12.201762]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.201783]  ? calculate_sigpending+0x7b/0xa0
[   12.201807]  ? __pfx_kthread+0x10/0x10
[   12.201828]  ret_from_fork+0x116/0x1d0
[   12.201846]  ? __pfx_kthread+0x10/0x10
[   12.201865]  ret_from_fork_asm+0x1a/0x30
[   12.201896]  </TASK>
[   12.201906] 
[   12.213648] Allocated by task 173:
[   12.213898]  kasan_save_stack+0x45/0x70
[   12.214348]  kasan_save_track+0x18/0x40
[   12.214515]  kasan_save_alloc_info+0x3b/0x50
[   12.214864]  __kasan_krealloc+0x190/0x1f0
[   12.215288]  krealloc_noprof+0xf3/0x340
[   12.215468]  krealloc_more_oob_helper+0x1a9/0x930
[   12.215847]  krealloc_more_oob+0x1c/0x30
[   12.216223]  kunit_try_run_case+0x1a5/0x480
[   12.216422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.216632]  kthread+0x337/0x6f0
[   12.216956]  ret_from_fork+0x116/0x1d0
[   12.217195]  ret_from_fork_asm+0x1a/0x30
[   12.217395] 
[   12.217495] The buggy address belongs to the object at ffff888100350800
[   12.217495]  which belongs to the cache kmalloc-256 of size 256
[   12.217992] The buggy address is located 5 bytes to the right of
[   12.217992]  allocated 235-byte region [ffff888100350800, ffff8881003508eb)
[   12.218674] 
[   12.218787] The buggy address belongs to the physical page:
[   12.219088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   12.219425] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.219733] flags: 0x200000000000040(head|node=0|zone=2)
[   12.219958] page_type: f5(slab)
[   12.220209] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.220512] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.220838] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.221211] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.221499] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   12.221856] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.222318] page dumped because: kasan: bad access detected
[   12.222582] 
[   12.222679] Memory state around the buggy address:
[   12.222859]  ffff888100350780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.223259]  ffff888100350800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.223525] >ffff888100350880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.223854]                                                              ^
[   12.224209]  ffff888100350900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.224470]  ffff888100350980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.224796] ==================================================================