Hay
Date
July 17, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.175310] ==================================================================
[   15.175368] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   15.175480] Write of size 1 at addr fff00000c09198f0 by task kunit_try_catch/157
[   15.175557] 
[   15.175650] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.175755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.175782] Hardware name: linux,dummy-virt (DT)
[   15.175811] Call trace:
[   15.175850]  show_stack+0x20/0x38 (C)
[   15.176163]  dump_stack_lvl+0x8c/0xd0
[   15.176241]  print_report+0x118/0x5d0
[   15.176548]  kasan_report+0xdc/0x128
[   15.176688]  __asan_report_store1_noabort+0x20/0x30
[   15.176753]  krealloc_more_oob_helper+0x5c0/0x678
[   15.176830]  krealloc_more_oob+0x20/0x38
[   15.176974]  kunit_try_run_case+0x170/0x3f0
[   15.177081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.177256]  kthread+0x328/0x630
[   15.177319]  ret_from_fork+0x10/0x20
[   15.177492] 
[   15.177583] Allocated by task 157:
[   15.177662]  kasan_save_stack+0x3c/0x68
[   15.177976]  kasan_save_track+0x20/0x40
[   15.178198]  kasan_save_alloc_info+0x40/0x58
[   15.178726]  __kasan_kmalloc+0xd4/0xd8
[   15.178900]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   15.179057]  krealloc_noprof+0xdc/0x360
[   15.179118]  krealloc_more_oob_helper+0x168/0x678
[   15.179261]  krealloc_more_oob+0x20/0x38
[   15.179402]  kunit_try_run_case+0x170/0x3f0
[   15.179663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.179870]  kthread+0x328/0x630
[   15.179957]  ret_from_fork+0x10/0x20
[   15.180091] 
[   15.180164] The buggy address belongs to the object at fff00000c0919800
[   15.180164]  which belongs to the cache kmalloc-256 of size 256
[   15.180245] The buggy address is located 5 bytes to the right of
[   15.180245]  allocated 235-byte region [fff00000c0919800, fff00000c09198eb)
[   15.180585] 
[   15.180675] The buggy address belongs to the physical page:
[   15.180755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100918
[   15.180831] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.180969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.181184] page_type: f5(slab)
[   15.181437] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.181526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.181654] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.181818] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.181900] head: 0bfffe0000000001 ffffc1ffc3024601 00000000ffffffff 00000000ffffffff
[   15.181956] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.182127] page dumped because: kasan: bad access detected
[   15.182315] 
[   15.182336] Memory state around the buggy address:
[   15.182619]  fff00000c0919780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182791]  fff00000c0919800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.182845] >fff00000c0919880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.182930]                                                              ^
[   15.182970]  fff00000c0919900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.183023]  fff00000c0919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.183060] ==================================================================
[   15.246352] ==================================================================
[   15.246404] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   15.246453] Write of size 1 at addr fff00000c65c60f0 by task kunit_try_catch/161
[   15.246511] 
[   15.246540] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.246618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.246679] Hardware name: linux,dummy-virt (DT)
[   15.246710] Call trace:
[   15.246731]  show_stack+0x20/0x38 (C)
[   15.246778]  dump_stack_lvl+0x8c/0xd0
[   15.246824]  print_report+0x118/0x5d0
[   15.246868]  kasan_report+0xdc/0x128
[   15.246913]  __asan_report_store1_noabort+0x20/0x30
[   15.246974]  krealloc_more_oob_helper+0x5c0/0x678
[   15.247032]  krealloc_large_more_oob+0x20/0x38
[   15.247078]  kunit_try_run_case+0x170/0x3f0
[   15.247131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.247183]  kthread+0x328/0x630
[   15.247224]  ret_from_fork+0x10/0x20
[   15.247269] 
[   15.247287] The buggy address belongs to the physical page:
[   15.247318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4
[   15.247380] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.247438] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.247488] page_type: f8(unknown)
[   15.247524] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.247583] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.247633] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.247681] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.247730] head: 0bfffe0000000002 ffffc1ffc3197101 00000000ffffffff 00000000ffffffff
[   15.247777] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.247825] page dumped because: kasan: bad access detected
[   15.247865] 
[   15.247889] Memory state around the buggy address:
[   15.247919]  fff00000c65c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.247960]  fff00000c65c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.248705] >fff00000c65c6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   15.248749]                                                              ^
[   15.248789]  fff00000c65c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.248857]  fff00000c65c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.248904] ==================================================================
[   15.164887] ==================================================================
[   15.165152] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   15.165208] Write of size 1 at addr fff00000c09198eb by task kunit_try_catch/157
[   15.165257] 
[   15.165472] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.165582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.165780] Hardware name: linux,dummy-virt (DT)
[   15.165886] Call trace:
[   15.165915]  show_stack+0x20/0x38 (C)
[   15.166127]  dump_stack_lvl+0x8c/0xd0
[   15.166317]  print_report+0x118/0x5d0
[   15.166420]  kasan_report+0xdc/0x128
[   15.166468]  __asan_report_store1_noabort+0x20/0x30
[   15.166745]  krealloc_more_oob_helper+0x60c/0x678
[   15.166941]  krealloc_more_oob+0x20/0x38
[   15.167000]  kunit_try_run_case+0x170/0x3f0
[   15.167401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.167509]  kthread+0x328/0x630
[   15.167629]  ret_from_fork+0x10/0x20
[   15.167690] 
[   15.167708] Allocated by task 157:
[   15.167737]  kasan_save_stack+0x3c/0x68
[   15.168100]  kasan_save_track+0x20/0x40
[   15.168192]  kasan_save_alloc_info+0x40/0x58
[   15.168301]  __kasan_kmalloc+0xd4/0xd8
[   15.168425]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   15.168491]  krealloc_noprof+0xdc/0x360
[   15.168652]  krealloc_more_oob_helper+0x168/0x678
[   15.168835]  krealloc_more_oob+0x20/0x38
[   15.168904]  kunit_try_run_case+0x170/0x3f0
[   15.169035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.169100]  kthread+0x328/0x630
[   15.169279]  ret_from_fork+0x10/0x20
[   15.169473] 
[   15.169581] The buggy address belongs to the object at fff00000c0919800
[   15.169581]  which belongs to the cache kmalloc-256 of size 256
[   15.169666] The buggy address is located 0 bytes to the right of
[   15.169666]  allocated 235-byte region [fff00000c0919800, fff00000c09198eb)
[   15.169805] 
[   15.169896] The buggy address belongs to the physical page:
[   15.169989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100918
[   15.170294] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.170483] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.170696] page_type: f5(slab)
[   15.170987] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.171053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.171660] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.171824] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.171904] head: 0bfffe0000000001 ffffc1ffc3024601 00000000ffffffff 00000000ffffffff
[   15.172335] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.172675] page dumped because: kasan: bad access detected
[   15.172819] 
[   15.172888] Memory state around the buggy address:
[   15.172999]  fff00000c0919780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.173047]  fff00000c0919800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.173355] >fff00000c0919880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.173481]                                                           ^
[   15.173584]  fff00000c0919900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.173659]  fff00000c0919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174000] ==================================================================
[   15.239016] ==================================================================
[   15.239074] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   15.239478] Write of size 1 at addr fff00000c65c60eb by task kunit_try_catch/161
[   15.239548] 
[   15.239583] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.239664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.239737] Hardware name: linux,dummy-virt (DT)
[   15.239768] Call trace:
[   15.239788]  show_stack+0x20/0x38 (C)
[   15.240058]  dump_stack_lvl+0x8c/0xd0
[   15.240197]  print_report+0x118/0x5d0
[   15.240378]  kasan_report+0xdc/0x128
[   15.240439]  __asan_report_store1_noabort+0x20/0x30
[   15.240490]  krealloc_more_oob_helper+0x60c/0x678
[   15.240538]  krealloc_large_more_oob+0x20/0x38
[   15.240584]  kunit_try_run_case+0x170/0x3f0
[   15.240632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.240683]  kthread+0x328/0x630
[   15.240722]  ret_from_fork+0x10/0x20
[   15.240769] 
[   15.241317] The buggy address belongs to the physical page:
[   15.241462] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4
[   15.241714] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.241775] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.241945] page_type: f8(unknown)
[   15.242055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.242214] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.242300] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.242610] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.242776] head: 0bfffe0000000002 ffffc1ffc3197101 00000000ffffffff 00000000ffffffff
[   15.243126] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.243188] page dumped because: kasan: bad access detected
[   15.243246] 
[   15.243354] Memory state around the buggy address:
[   15.243429]  fff00000c65c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.243592]  fff00000c65c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.243818] >fff00000c65c6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   15.243880]                                                           ^
[   15.244077]  fff00000c65c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.244505]  fff00000c65c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.244593] ==================================================================

[   12.841732] ==================================================================
[   12.842475] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.842868] Write of size 1 at addr ffff888102a460f0 by task kunit_try_catch/177
[   12.843559] 
[   12.843674] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.843718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.843730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.843750] Call Trace:
[   12.843762]  <TASK>
[   12.843776]  dump_stack_lvl+0x73/0xb0
[   12.843806]  print_report+0xd1/0x610
[   12.843828]  ? __virt_addr_valid+0x1db/0x2d0
[   12.843851]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.843875]  ? kasan_addr_to_slab+0x11/0xa0
[   12.843896]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.843921]  kasan_report+0x141/0x180
[   12.843942]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.843972]  __asan_report_store1_noabort+0x1b/0x30
[   12.843997]  krealloc_more_oob_helper+0x7eb/0x930
[   12.844020]  ? __schedule+0x10cc/0x2b60
[   12.844047]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.844073]  ? finish_task_switch.isra.0+0x153/0x700
[   12.844096]  ? __switch_to+0x47/0xf50
[   12.844120]  ? __schedule+0x10cc/0x2b60
[   12.844141]  ? __pfx_read_tsc+0x10/0x10
[   12.844165]  krealloc_large_more_oob+0x1c/0x30
[   12.844188]  kunit_try_run_case+0x1a5/0x480
[   12.844214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.844237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.844631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.844657]  ? __kthread_parkme+0x82/0x180
[   12.844679]  ? preempt_count_sub+0x50/0x80
[   12.844703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.844728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.844761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.844786]  kthread+0x337/0x6f0
[   12.844806]  ? trace_preempt_on+0x20/0xc0
[   12.844830]  ? __pfx_kthread+0x10/0x10
[   12.844850]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.844873]  ? calculate_sigpending+0x7b/0xa0
[   12.844897]  ? __pfx_kthread+0x10/0x10
[   12.844918]  ret_from_fork+0x116/0x1d0
[   12.844937]  ? __pfx_kthread+0x10/0x10
[   12.844957]  ret_from_fork_asm+0x1a/0x30
[   12.844988]  </TASK>
[   12.844998] 
[   12.852669] The buggy address belongs to the physical page:
[   12.852887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44
[   12.853133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.853501] flags: 0x200000000000040(head|node=0|zone=2)
[   12.853943] page_type: f8(unknown)
[   12.854086] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.854607] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.854907] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.855138] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.855842] head: 0200000000000002 ffffea00040a9101 00000000ffffffff 00000000ffffffff
[   12.856141] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.856517] page dumped because: kasan: bad access detected
[   12.856782] 
[   12.856867] Memory state around the buggy address:
[   12.857056]  ffff888102a45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.857346]  ffff888102a46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.857609] >ffff888102a46080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.857943]                                                              ^
[   12.858255]  ffff888102a46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.858510]  ffff888102a46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.858776] ==================================================================
[   12.659125] ==================================================================
[   12.659579] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.659979] Write of size 1 at addr ffff8881003428f0 by task kunit_try_catch/173
[   12.660488] 
[   12.660639] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.660697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.660708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.660729] Call Trace:
[   12.660743]  <TASK>
[   12.660759]  dump_stack_lvl+0x73/0xb0
[   12.660788]  print_report+0xd1/0x610
[   12.660810]  ? __virt_addr_valid+0x1db/0x2d0
[   12.660832]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.660856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.660879]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.660904]  kasan_report+0x141/0x180
[   12.660940]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.660969]  __asan_report_store1_noabort+0x1b/0x30
[   12.660994]  krealloc_more_oob_helper+0x7eb/0x930
[   12.661017]  ? __schedule+0x10cc/0x2b60
[   12.661038]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.661063]  ? finish_task_switch.isra.0+0x153/0x700
[   12.661086]  ? __switch_to+0x47/0xf50
[   12.661110]  ? __schedule+0x10cc/0x2b60
[   12.661131]  ? __pfx_read_tsc+0x10/0x10
[   12.661154]  krealloc_more_oob+0x1c/0x30
[   12.661176]  kunit_try_run_case+0x1a5/0x480
[   12.661199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.661222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.661464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.661493]  ? __kthread_parkme+0x82/0x180
[   12.661526]  ? preempt_count_sub+0x50/0x80
[   12.661557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.661582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.661607]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.661633]  kthread+0x337/0x6f0
[   12.661652]  ? trace_preempt_on+0x20/0xc0
[   12.661676]  ? __pfx_kthread+0x10/0x10
[   12.661696]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.661718]  ? calculate_sigpending+0x7b/0xa0
[   12.661742]  ? __pfx_kthread+0x10/0x10
[   12.661763]  ret_from_fork+0x116/0x1d0
[   12.661781]  ? __pfx_kthread+0x10/0x10
[   12.661801]  ret_from_fork_asm+0x1a/0x30
[   12.661832]  </TASK>
[   12.661841] 
[   12.671078] Allocated by task 173:
[   12.671216]  kasan_save_stack+0x45/0x70
[   12.671366]  kasan_save_track+0x18/0x40
[   12.671500]  kasan_save_alloc_info+0x3b/0x50
[   12.671667]  __kasan_krealloc+0x190/0x1f0
[   12.672108]  krealloc_noprof+0xf3/0x340
[   12.672266]  krealloc_more_oob_helper+0x1a9/0x930
[   12.672429]  krealloc_more_oob+0x1c/0x30
[   12.672595]  kunit_try_run_case+0x1a5/0x480
[   12.672802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.673058]  kthread+0x337/0x6f0
[   12.673228]  ret_from_fork+0x116/0x1d0
[   12.674641]  ret_from_fork_asm+0x1a/0x30
[   12.676428] 
[   12.676519] The buggy address belongs to the object at ffff888100342800
[   12.676519]  which belongs to the cache kmalloc-256 of size 256
[   12.677613] The buggy address is located 5 bytes to the right of
[   12.677613]  allocated 235-byte region [ffff888100342800, ffff8881003428eb)
[   12.678043] 
[   12.678123] The buggy address belongs to the physical page:
[   12.678310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.678568] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.678798] flags: 0x200000000000040(head|node=0|zone=2)
[   12.678974] page_type: f5(slab)
[   12.679097] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.679331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.680032] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.680981] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.682107] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.682708] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.683216] page dumped because: kasan: bad access detected
[   12.683635] 
[   12.683717] Memory state around the buggy address:
[   12.683929]  ffff888100342780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.684777]  ffff888100342800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.685076] >ffff888100342880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.685634]                                                              ^
[   12.685984]  ffff888100342900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.686636]  ffff888100342980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.687086] ==================================================================
[   12.817951] ==================================================================
[   12.818448] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.819014] Write of size 1 at addr ffff888102a460eb by task kunit_try_catch/177
[   12.819300] 
[   12.819413] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.819460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.819566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.819590] Call Trace:
[   12.819603]  <TASK>
[   12.819618]  dump_stack_lvl+0x73/0xb0
[   12.819651]  print_report+0xd1/0x610
[   12.819673]  ? __virt_addr_valid+0x1db/0x2d0
[   12.819698]  ? krealloc_more_oob_helper+0x821/0x930
[   12.819723]  ? kasan_addr_to_slab+0x11/0xa0
[   12.819743]  ? krealloc_more_oob_helper+0x821/0x930
[   12.819768]  kasan_report+0x141/0x180
[   12.819790]  ? krealloc_more_oob_helper+0x821/0x930
[   12.819819]  __asan_report_store1_noabort+0x1b/0x30
[   12.819845]  krealloc_more_oob_helper+0x821/0x930
[   12.819868]  ? __schedule+0x10cc/0x2b60
[   12.819890]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.819916]  ? finish_task_switch.isra.0+0x153/0x700
[   12.819940]  ? __switch_to+0x47/0xf50
[   12.819966]  ? __schedule+0x10cc/0x2b60
[   12.819987]  ? __pfx_read_tsc+0x10/0x10
[   12.820011]  krealloc_large_more_oob+0x1c/0x30
[   12.820035]  kunit_try_run_case+0x1a5/0x480
[   12.820066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.820089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.820113]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.820137]  ? __kthread_parkme+0x82/0x180
[   12.820158]  ? preempt_count_sub+0x50/0x80
[   12.820180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.820205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.820229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.820266]  kthread+0x337/0x6f0
[   12.820285]  ? trace_preempt_on+0x20/0xc0
[   12.820309]  ? __pfx_kthread+0x10/0x10
[   12.820330]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.820351]  ? calculate_sigpending+0x7b/0xa0
[   12.820376]  ? __pfx_kthread+0x10/0x10
[   12.820397]  ret_from_fork+0x116/0x1d0
[   12.820455]  ? __pfx_kthread+0x10/0x10
[   12.820479]  ret_from_fork_asm+0x1a/0x30
[   12.820511]  </TASK>
[   12.820522] 
[   12.830611] The buggy address belongs to the physical page:
[   12.830864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44
[   12.831198] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.831954] flags: 0x200000000000040(head|node=0|zone=2)
[   12.832393] page_type: f8(unknown)
[   12.832719] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.833210] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.833819] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.834146] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.834466] head: 0200000000000002 ffffea00040a9101 00000000ffffffff 00000000ffffffff
[   12.835548] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.835984] page dumped because: kasan: bad access detected
[   12.836596] 
[   12.836697] Memory state around the buggy address:
[   12.836918]  ffff888102a45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.837191]  ffff888102a46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.837877] >ffff888102a46080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.838177]                                                           ^
[   12.838779]  ffff888102a46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.839076]  ffff888102a46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.839364] ==================================================================
[   12.621477] ==================================================================
[   12.622000] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.622252] Write of size 1 at addr ffff8881003428eb by task kunit_try_catch/173
[   12.623255] 
[   12.623773] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.623820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.623831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.623851] Call Trace:
[   12.623863]  <TASK>
[   12.623877]  dump_stack_lvl+0x73/0xb0
[   12.623908]  print_report+0xd1/0x610
[   12.623930]  ? __virt_addr_valid+0x1db/0x2d0
[   12.623952]  ? krealloc_more_oob_helper+0x821/0x930
[   12.623977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.624000]  ? krealloc_more_oob_helper+0x821/0x930
[   12.624025]  kasan_report+0x141/0x180
[   12.624051]  ? krealloc_more_oob_helper+0x821/0x930
[   12.624080]  __asan_report_store1_noabort+0x1b/0x30
[   12.624105]  krealloc_more_oob_helper+0x821/0x930
[   12.624128]  ? __schedule+0x10cc/0x2b60
[   12.624150]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.624175]  ? finish_task_switch.isra.0+0x153/0x700
[   12.624198]  ? __switch_to+0x47/0xf50
[   12.624224]  ? __schedule+0x10cc/0x2b60
[   12.624372]  ? __pfx_read_tsc+0x10/0x10
[   12.624398]  krealloc_more_oob+0x1c/0x30
[   12.624421]  kunit_try_run_case+0x1a5/0x480
[   12.624446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.624469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.624493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.624517]  ? __kthread_parkme+0x82/0x180
[   12.624538]  ? preempt_count_sub+0x50/0x80
[   12.624571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.624595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.624619]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.624645]  kthread+0x337/0x6f0
[   12.624663]  ? trace_preempt_on+0x20/0xc0
[   12.624686]  ? __pfx_kthread+0x10/0x10
[   12.624706]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.624728]  ? calculate_sigpending+0x7b/0xa0
[   12.624751]  ? __pfx_kthread+0x10/0x10
[   12.624772]  ret_from_fork+0x116/0x1d0
[   12.624791]  ? __pfx_kthread+0x10/0x10
[   12.624811]  ret_from_fork_asm+0x1a/0x30
[   12.624841]  </TASK>
[   12.624852] 
[   12.642822] Allocated by task 173:
[   12.643270]  kasan_save_stack+0x45/0x70
[   12.643729]  kasan_save_track+0x18/0x40
[   12.643881]  kasan_save_alloc_info+0x3b/0x50
[   12.644033]  __kasan_krealloc+0x190/0x1f0
[   12.644196]  krealloc_noprof+0xf3/0x340
[   12.644773]  krealloc_more_oob_helper+0x1a9/0x930
[   12.645153]  krealloc_more_oob+0x1c/0x30
[   12.645712]  kunit_try_run_case+0x1a5/0x480
[   12.646218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.646825]  kthread+0x337/0x6f0
[   12.647149]  ret_from_fork+0x116/0x1d0
[   12.647610]  ret_from_fork_asm+0x1a/0x30
[   12.648034] 
[   12.648120] The buggy address belongs to the object at ffff888100342800
[   12.648120]  which belongs to the cache kmalloc-256 of size 256
[   12.649580] The buggy address is located 0 bytes to the right of
[   12.649580]  allocated 235-byte region [ffff888100342800, ffff8881003428eb)
[   12.650271] 
[   12.650467] The buggy address belongs to the physical page:
[   12.651334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.651938] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.652181] flags: 0x200000000000040(head|node=0|zone=2)
[   12.652740] page_type: f5(slab)
[   12.653062] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.653954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.654534] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.654789] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.655024] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.655330] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.655680] page dumped because: kasan: bad access detected
[   12.655895] 
[   12.656009] Memory state around the buggy address:
[   12.656231]  ffff888100342780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.656605]  ffff888100342800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.657057] >ffff888100342880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.657381]                                                           ^
[   12.657825]  ffff888100342900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.658101]  ffff888100342980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.658526] ==================================================================