Hay
Date
Dec. 6, 2024, 3:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.319477] ==================================================================
[   30.320972] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   30.321931] Write of size 1 at addr fff00000c0c134f0 by task kunit_try_catch/145
[   30.323337] 
[   30.323735] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.324966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.325549] Hardware name: linux,dummy-virt (DT)
[   30.326223] Call trace:
[   30.326613]  show_stack+0x20/0x38 (C)
[   30.327260]  dump_stack_lvl+0x8c/0xd0
[   30.327908]  print_report+0x118/0x5e0
[   30.328482]  kasan_report+0xc8/0x118
[   30.329318]  __asan_report_store1_noabort+0x20/0x30
[   30.329956]  krealloc_more_oob_helper+0x5c8/0x680
[   30.330972]  krealloc_more_oob+0x20/0x38
[   30.331554]  kunit_try_run_case+0x14c/0x3d0
[   30.332236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.332900]  kthread+0x24c/0x2d0
[   30.333484]  ret_from_fork+0x10/0x20
[   30.334141] 
[   30.334783] Allocated by task 145:
[   30.335287]  kasan_save_stack+0x3c/0x68
[   30.335924]  kasan_save_track+0x20/0x40
[   30.336465]  kasan_save_alloc_info+0x40/0x58
[   30.337150]  __kasan_krealloc+0x118/0x178
[   30.337800]  krealloc_noprof+0x128/0x360
[   30.338653]  krealloc_more_oob_helper+0x168/0x680
[   30.339292]  krealloc_more_oob+0x20/0x38
[   30.339922]  kunit_try_run_case+0x14c/0x3d0
[   30.340541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.341238]  kthread+0x24c/0x2d0
[   30.341781]  ret_from_fork+0x10/0x20
[   30.343170] 
[   30.343423] The buggy address belongs to the object at fff00000c0c13400
[   30.343423]  which belongs to the cache kmalloc-256 of size 256
[   30.344756] The buggy address is located 5 bytes to the right of
[   30.344756]  allocated 235-byte region [fff00000c0c13400, fff00000c0c134eb)
[   30.345936] 
[   30.346635] The buggy address belongs to the physical page:
[   30.347338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.348270] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.349059] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.349928] page_type: f5(slab)
[   30.350715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.351640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.352534] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.353468] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.354389] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.355341] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.356219] page dumped because: kasan: bad access detected
[   30.356823] 
[   30.357193] Memory state around the buggy address:
[   30.357854]  fff00000c0c13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.359090]  fff00000c0c13400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.359862] >fff00000c0c13480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.360725]                                                              ^
[   30.361531]  fff00000c0c13500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.362344]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.363027] ==================================================================
[   30.273328] ==================================================================
[   30.274086] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   30.275399] Write of size 1 at addr fff00000c0c134eb by task kunit_try_catch/145
[   30.276057] 
[   30.276399] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.277466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.278056] Hardware name: linux,dummy-virt (DT)
[   30.278957] Call trace:
[   30.279379]  show_stack+0x20/0x38 (C)
[   30.280037]  dump_stack_lvl+0x8c/0xd0
[   30.280914]  print_report+0x118/0x5e0
[   30.281450]  kasan_report+0xc8/0x118
[   30.282094]  __asan_report_store1_noabort+0x20/0x30
[   30.283045]  krealloc_more_oob_helper+0x614/0x680
[   30.283767]  krealloc_more_oob+0x20/0x38
[   30.284413]  kunit_try_run_case+0x14c/0x3d0
[   30.285098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.285832]  kthread+0x24c/0x2d0
[   30.286737]  ret_from_fork+0x10/0x20
[   30.287285] 
[   30.287682] Allocated by task 145:
[   30.288174]  kasan_save_stack+0x3c/0x68
[   30.288828]  kasan_save_track+0x20/0x40
[   30.289307]  kasan_save_alloc_info+0x40/0x58
[   30.289993]  __kasan_krealloc+0x118/0x178
[   30.291013]  krealloc_noprof+0x128/0x360
[   30.291648]  krealloc_more_oob_helper+0x168/0x680
[   30.292260]  krealloc_more_oob+0x20/0x38
[   30.292870]  kunit_try_run_case+0x14c/0x3d0
[   30.293419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.294208]  kthread+0x24c/0x2d0
[   30.294775]  ret_from_fork+0x10/0x20
[   30.295273] 
[   30.295681] The buggy address belongs to the object at fff00000c0c13400
[   30.295681]  which belongs to the cache kmalloc-256 of size 256
[   30.297864] The buggy address is located 0 bytes to the right of
[   30.297864]  allocated 235-byte region [fff00000c0c13400, fff00000c0c134eb)
[   30.299638] 
[   30.299980] The buggy address belongs to the physical page:
[   30.300648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.301505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.302282] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.303535] page_type: f5(slab)
[   30.304076] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.304915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.305838] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.307165] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.308133] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.308978] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.309824] page dumped because: kasan: bad access detected
[   30.310974] 
[   30.311340] Memory state around the buggy address:
[   30.312013]  fff00000c0c13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.312842]  fff00000c0c13400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.313623] >fff00000c0c13480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.314350]                                                           ^
[   30.315578]  fff00000c0c13500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.316531]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.317465] ==================================================================
[   30.618766] ==================================================================
[   30.619998] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   30.620963] Write of size 1 at addr fff00000c62220eb by task kunit_try_catch/149
[   30.621631] 
[   30.622041] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.623881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.624535] Hardware name: linux,dummy-virt (DT)
[   30.625151] Call trace:
[   30.625806]  show_stack+0x20/0x38 (C)
[   30.626550]  dump_stack_lvl+0x8c/0xd0
[   30.627386]  print_report+0x118/0x5e0
[   30.627961]  kasan_report+0xc8/0x118
[   30.628584]  __asan_report_store1_noabort+0x20/0x30
[   30.629220]  krealloc_more_oob_helper+0x614/0x680
[   30.629937]  krealloc_large_more_oob+0x20/0x38
[   30.630667]  kunit_try_run_case+0x14c/0x3d0
[   30.631310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.632127]  kthread+0x24c/0x2d0
[   30.632835]  ret_from_fork+0x10/0x20
[   30.633557] 
[   30.633942] The buggy address belongs to the physical page:
[   30.635017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.635950] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.636843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.637802] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.639248] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.640205] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.641102] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.641850] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.643064] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.644128] page dumped because: kasan: bad access detected
[   30.644795] 
[   30.645149] Memory state around the buggy address:
[   30.646166]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.647391]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.648334] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.649176]                                                           ^
[   30.649906]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.650674]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.651500] ==================================================================
[   30.653378] ==================================================================
[   30.654563] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   30.655912] Write of size 1 at addr fff00000c62220f0 by task kunit_try_catch/149
[   30.656735] 
[   30.657172] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.658589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.660245] Hardware name: linux,dummy-virt (DT)
[   30.660995] Call trace:
[   30.661585]  show_stack+0x20/0x38 (C)
[   30.662657]  dump_stack_lvl+0x8c/0xd0
[   30.663154]  print_report+0x118/0x5e0
[   30.664051]  kasan_report+0xc8/0x118
[   30.664715]  __asan_report_store1_noabort+0x20/0x30
[   30.665331]  krealloc_more_oob_helper+0x5c8/0x680
[   30.666072]  krealloc_large_more_oob+0x20/0x38
[   30.666723]  kunit_try_run_case+0x14c/0x3d0
[   30.667650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.668615]  kthread+0x24c/0x2d0
[   30.669195]  ret_from_fork+0x10/0x20
[   30.669805] 
[   30.670142] The buggy address belongs to the physical page:
[   30.671415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.672348] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.673184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.674055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.674959] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.675695] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.676694] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.677697] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.679003] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.679992] page dumped because: kasan: bad access detected
[   30.680798] 
[   30.680971] Memory state around the buggy address:
[   30.681310]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.682249]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.684153] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.685086]                                                              ^
[   30.685954]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.687083]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.688107] ==================================================================

[   23.019386] ==================================================================
[   23.020032] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   23.022772] Write of size 1 at addr ffff888102aba0f0 by task kunit_try_catch/168
[   23.023476] 
[   23.024357] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   23.025612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.026801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.028252] Call Trace:
[   23.029018]  <TASK>
[   23.029234]  dump_stack_lvl+0x73/0xb0
[   23.029506]  print_report+0xd1/0x640
[   23.030247]  ? __virt_addr_valid+0x1db/0x2d0
[   23.030846]  ? kasan_addr_to_slab+0x11/0xa0
[   23.031317]  kasan_report+0x102/0x140
[   23.031719]  ? krealloc_more_oob_helper+0x7ed/0x930
[   23.032223]  ? krealloc_more_oob_helper+0x7ed/0x930
[   23.032728]  __asan_report_store1_noabort+0x1b/0x30
[   23.034567]  krealloc_more_oob_helper+0x7ed/0x930
[   23.035860]  ? __schedule+0xc70/0x27e0
[   23.036731]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.037352]  ? finish_task_switch.isra.0+0x153/0x700
[   23.037827]  ? __switch_to+0x5d9/0xf60
[   23.038807]  ? __schedule+0xc70/0x27e0
[   23.040018]  ? __pfx_read_tsc+0x10/0x10
[   23.040523]  krealloc_large_more_oob+0x1c/0x30
[   23.041584]  kunit_try_run_case+0x1b3/0x490
[   23.042644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.043084]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.044120]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.044910]  ? __kthread_parkme+0x82/0x160
[   23.045278]  ? preempt_count_sub+0x50/0x80
[   23.045999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.046400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.047320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.048557]  kthread+0x257/0x310
[   23.049146]  ? __pfx_kthread+0x10/0x10
[   23.049582]  ret_from_fork+0x41/0x80
[   23.049950]  ? __pfx_kthread+0x10/0x10
[   23.050311]  ret_from_fork_asm+0x1a/0x30
[   23.050744]  </TASK>
[   23.051333] 
[   23.052170] The buggy address belongs to the physical page:
[   23.052992] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8
[   23.053927] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.054867] flags: 0x200000000000040(head|node=0|zone=2)
[   23.056092] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.056695] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.057272] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.059071] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.060587] head: 0200000000000002 ffffea00040aae01 ffffffffffffffff 0000000000000000
[   23.061079] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.062642] page dumped because: kasan: bad access detected
[   23.064024] 
[   23.064386] Memory state around the buggy address:
[   23.064877]  ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.065525]  ffff888102aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.066273] >ffff888102aba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.067329]                                                              ^
[   23.068602]  ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.069458]  ffff888102aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.070559] ==================================================================
[   22.458416] ==================================================================
[   22.459282] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   22.459730] Write of size 1 at addr ffff8881009a4aeb by task kunit_try_catch/164
[   22.460193] 
[   22.460475] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   22.462356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.463218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.464286] Call Trace:
[   22.465466]  <TASK>
[   22.466196]  dump_stack_lvl+0x73/0xb0
[   22.466857]  print_report+0xd1/0x640
[   22.467427]  ? __virt_addr_valid+0x1db/0x2d0
[   22.468028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.468966]  kasan_report+0x102/0x140
[   22.469552]  ? krealloc_more_oob_helper+0x823/0x930
[   22.470358]  ? krealloc_more_oob_helper+0x823/0x930
[   22.470734]  __asan_report_store1_noabort+0x1b/0x30
[   22.471356]  krealloc_more_oob_helper+0x823/0x930
[   22.471880]  ? __schedule+0xc70/0x27e0
[   22.473017]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.473446]  ? finish_task_switch.isra.0+0x153/0x700
[   22.474076]  ? __switch_to+0x5d9/0xf60
[   22.475003]  ? __schedule+0xc70/0x27e0
[   22.475830]  ? __pfx_read_tsc+0x10/0x10
[   22.477384]  krealloc_more_oob+0x1c/0x30
[   22.478063]  kunit_try_run_case+0x1b3/0x490
[   22.478915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.479736]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.480629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.482062]  ? __kthread_parkme+0x82/0x160
[   22.482646]  ? preempt_count_sub+0x50/0x80
[   22.483646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.484144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.485509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.486432]  kthread+0x257/0x310
[   22.487099]  ? __pfx_kthread+0x10/0x10
[   22.488485]  ret_from_fork+0x41/0x80
[   22.488961]  ? __pfx_kthread+0x10/0x10
[   22.489947]  ret_from_fork_asm+0x1a/0x30
[   22.490427]  </TASK>
[   22.490967] 
[   22.491167] Allocated by task 164:
[   22.491794]  kasan_save_stack+0x3d/0x60
[   22.492707]  kasan_save_track+0x18/0x40
[   22.494097]  kasan_save_alloc_info+0x3b/0x50
[   22.494585]  __kasan_krealloc+0x190/0x1f0
[   22.495363]  krealloc_noprof+0xf3/0x340
[   22.496079]  krealloc_more_oob_helper+0x1aa/0x930
[   22.496818]  krealloc_more_oob+0x1c/0x30
[   22.497209]  kunit_try_run_case+0x1b3/0x490
[   22.498305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.498755]  kthread+0x257/0x310
[   22.499359]  ret_from_fork+0x41/0x80
[   22.500468]  ret_from_fork_asm+0x1a/0x30
[   22.501290] 
[   22.501469] The buggy address belongs to the object at ffff8881009a4a00
[   22.501469]  which belongs to the cache kmalloc-256 of size 256
[   22.503775] The buggy address is located 0 bytes to the right of
[   22.503775]  allocated 235-byte region [ffff8881009a4a00, ffff8881009a4aeb)
[   22.506154] 
[   22.506599] The buggy address belongs to the physical page:
[   22.507466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a4
[   22.508351] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.509922] flags: 0x200000000000040(head|node=0|zone=2)
[   22.510487] page_type: f5(slab)
[   22.510841] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.511581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.513441] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.514895] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.515707] head: 0200000000000001 ffffea0004026901 ffffffffffffffff 0000000000000000
[   22.516460] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.517907] page dumped because: kasan: bad access detected
[   22.518767] 
[   22.519050] Memory state around the buggy address:
[   22.519910]  ffff8881009a4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.521189]  ffff8881009a4a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.522030] >ffff8881009a4a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.523112]                                                           ^
[   22.524094]  ffff8881009a4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.524950]  ffff8881009a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.526602] ==================================================================
[   22.962852] ==================================================================
[   22.964333] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   22.965633] Write of size 1 at addr ffff888102aba0eb by task kunit_try_catch/168
[   22.966349] 
[   22.966593] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   22.969018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.969710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.971254] Call Trace:
[   22.971574]  <TASK>
[   22.972569]  dump_stack_lvl+0x73/0xb0
[   22.973343]  print_report+0xd1/0x640
[   22.973820]  ? __virt_addr_valid+0x1db/0x2d0
[   22.974445]  ? kasan_addr_to_slab+0x11/0xa0
[   22.975011]  kasan_report+0x102/0x140
[   22.975530]  ? krealloc_more_oob_helper+0x823/0x930
[   22.976104]  ? krealloc_more_oob_helper+0x823/0x930
[   22.976579]  __asan_report_store1_noabort+0x1b/0x30
[   22.978172]  krealloc_more_oob_helper+0x823/0x930
[   22.978824]  ? __schedule+0xc70/0x27e0
[   22.979337]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.980065]  ? finish_task_switch.isra.0+0x153/0x700
[   22.980527]  ? __switch_to+0x5d9/0xf60
[   22.980831]  ? __schedule+0xc70/0x27e0
[   22.981512]  ? __pfx_read_tsc+0x10/0x10
[   22.982997]  krealloc_large_more_oob+0x1c/0x30
[   22.983403]  kunit_try_run_case+0x1b3/0x490
[   22.984504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.985062]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.985618]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.986067]  ? __kthread_parkme+0x82/0x160
[   22.986598]  ? preempt_count_sub+0x50/0x80
[   22.988084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.988826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.990497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.990796]  kthread+0x257/0x310
[   22.990997]  ? __pfx_kthread+0x10/0x10
[   22.991556]  ret_from_fork+0x41/0x80
[   22.993113]  ? __pfx_kthread+0x10/0x10
[   22.994377]  ret_from_fork_asm+0x1a/0x30
[   22.995561]  </TASK>
[   22.995867] 
[   22.996100] The buggy address belongs to the physical page:
[   22.997590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8
[   22.999331] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.001114] flags: 0x200000000000040(head|node=0|zone=2)
[   23.001703] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.002449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.004473] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.004969] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.006585] head: 0200000000000002 ffffea00040aae01 ffffffffffffffff 0000000000000000
[   23.007247] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.008358] page dumped because: kasan: bad access detected
[   23.009733] 
[   23.009924] Memory state around the buggy address:
[   23.011025]  ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.012224]  ffff888102aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.013828] >ffff888102aba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.014754]                                                           ^
[   23.015771]  ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.017487]  ffff888102aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.018151] ==================================================================
[   22.529015] ==================================================================
[   22.530668] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   22.532085] Write of size 1 at addr ffff8881009a4af0 by task kunit_try_catch/164
[   22.532698] 
[   22.532920] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   22.535672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.535988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.537658] Call Trace:
[   22.538012]  <TASK>
[   22.538389]  dump_stack_lvl+0x73/0xb0
[   22.540132]  print_report+0xd1/0x640
[   22.540604]  ? __virt_addr_valid+0x1db/0x2d0
[   22.541426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.542469]  kasan_report+0x102/0x140
[   22.542748]  ? krealloc_more_oob_helper+0x7ed/0x930
[   22.543026]  ? krealloc_more_oob_helper+0x7ed/0x930
[   22.544899]  __asan_report_store1_noabort+0x1b/0x30
[   22.545687]  krealloc_more_oob_helper+0x7ed/0x930
[   22.546761]  ? __schedule+0xc70/0x27e0
[   22.547847]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.548822]  ? finish_task_switch.isra.0+0x153/0x700
[   22.549819]  ? __switch_to+0x5d9/0xf60
[   22.550354]  ? __schedule+0xc70/0x27e0
[   22.550805]  ? __pfx_read_tsc+0x10/0x10
[   22.551907]  krealloc_more_oob+0x1c/0x30
[   22.552926]  kunit_try_run_case+0x1b3/0x490
[   22.553415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.554530]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.555547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.556501]  ? __kthread_parkme+0x82/0x160
[   22.557471]  ? preempt_count_sub+0x50/0x80
[   22.558156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.558652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.559792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.561323]  kthread+0x257/0x310
[   22.562348]  ? __pfx_kthread+0x10/0x10
[   22.562638]  ret_from_fork+0x41/0x80
[   22.563559]  ? __pfx_kthread+0x10/0x10
[   22.564304]  ret_from_fork_asm+0x1a/0x30
[   22.564849]  </TASK>
[   22.565360] 
[   22.565650] Allocated by task 164:
[   22.566309]  kasan_save_stack+0x3d/0x60
[   22.567216]  kasan_save_track+0x18/0x40
[   22.568286]  kasan_save_alloc_info+0x3b/0x50
[   22.569051]  __kasan_krealloc+0x190/0x1f0
[   22.570575]  krealloc_noprof+0xf3/0x340
[   22.571053]  krealloc_more_oob_helper+0x1aa/0x930
[   22.572539]  krealloc_more_oob+0x1c/0x30
[   22.573365]  kunit_try_run_case+0x1b3/0x490
[   22.573643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.574521]  kthread+0x257/0x310
[   22.574981]  ret_from_fork+0x41/0x80
[   22.575363]  ret_from_fork_asm+0x1a/0x30
[   22.576548] 
[   22.576854] The buggy address belongs to the object at ffff8881009a4a00
[   22.576854]  which belongs to the cache kmalloc-256 of size 256
[   22.579321] The buggy address is located 5 bytes to the right of
[   22.579321]  allocated 235-byte region [ffff8881009a4a00, ffff8881009a4aeb)
[   22.580628] 
[   22.581668] The buggy address belongs to the physical page:
[   22.583687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a4
[   22.584427] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.586062] flags: 0x200000000000040(head|node=0|zone=2)
[   22.586823] page_type: f5(slab)
[   22.587353] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.588398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.589713] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.590866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.592185] head: 0200000000000001 ffffea0004026901 ffffffffffffffff 0000000000000000
[   22.592822] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.594829] page dumped because: kasan: bad access detected
[   22.595303] 
[   22.595495] Memory state around the buggy address:
[   22.596714]  ffff8881009a4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.598112]  ffff8881009a4a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.600328] >ffff8881009a4a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.601523]                                                              ^
[   22.603849]  ffff8881009a4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.605802]  ffff8881009a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.607475] ==================================================================