Hay
Date
March 19, 2025, 10:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.863989] ==================================================================
[   33.865666] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   33.865845] Write of size 1 at addr fff00000c774e0eb by task kunit_try_catch/162
[   33.865995] 
[   33.866104] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.868702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.869150] Hardware name: linux,dummy-virt (DT)
[   33.869454] Call trace:
[   33.869725]  show_stack+0x20/0x38 (C)
[   33.870105]  dump_stack_lvl+0x8c/0xd0
[   33.870629]  print_report+0x118/0x5f0
[   33.870947]  kasan_report+0xc8/0x118
[   33.872037]  __asan_report_store1_noabort+0x20/0x30
[   33.873146]  krealloc_more_oob_helper+0x614/0x680
[   33.873486]  krealloc_large_more_oob+0x20/0x38
[   33.874831]  kunit_try_run_case+0x14c/0x3d0
[   33.875042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.875655]  kthread+0x318/0x618
[   33.875844]  ret_from_fork+0x10/0x20
[   33.875995] 
[   33.876074] The buggy address belongs to the physical page:
[   33.876172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.876338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.877783] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.878089] page_type: f8(unknown)
[   33.878208] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.878839] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.879016] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.879192] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.879349] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.879500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.879643] page dumped because: kasan: bad access detected
[   33.879753] 
[   33.879865] Memory state around the buggy address:
[   33.880014]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.880178]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.880318] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   33.880579]                                                           ^
[   33.881002]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.881907]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.882048] ==================================================================
[   33.698289] ==================================================================
[   33.698468] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   33.698619] Write of size 1 at addr fff00000c4a4a4eb by task kunit_try_catch/158
[   33.698795] 
[   33.698887] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.699235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.699375] Hardware name: linux,dummy-virt (DT)
[   33.699480] Call trace:
[   33.699550]  show_stack+0x20/0x38 (C)
[   33.699707]  dump_stack_lvl+0x8c/0xd0
[   33.699851]  print_report+0x118/0x5f0
[   33.699987]  kasan_report+0xc8/0x118
[   33.700165]  __asan_report_store1_noabort+0x20/0x30
[   33.700438]  krealloc_more_oob_helper+0x614/0x680
[   33.700621]  krealloc_more_oob+0x20/0x38
[   33.700825]  kunit_try_run_case+0x14c/0x3d0
[   33.701360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.701985]  kthread+0x318/0x618
[   33.702174]  ret_from_fork+0x10/0x20
[   33.702470] 
[   33.702533] Allocated by task 158:
[   33.702662]  kasan_save_stack+0x3c/0x68
[   33.702964]  kasan_save_track+0x20/0x40
[   33.703378]  kasan_save_alloc_info+0x40/0x58
[   33.703752]  __kasan_krealloc+0x118/0x178
[   33.704202]  krealloc_noprof+0x128/0x360
[   33.705028]  krealloc_more_oob_helper+0x168/0x680
[   33.705733]  krealloc_more_oob+0x20/0x38
[   33.706529]  kunit_try_run_case+0x14c/0x3d0
[   33.707044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.707225]  kthread+0x318/0x618
[   33.707521]  ret_from_fork+0x10/0x20
[   33.708026] 
[   33.708158] The buggy address belongs to the object at fff00000c4a4a400
[   33.708158]  which belongs to the cache kmalloc-256 of size 256
[   33.708582] The buggy address is located 0 bytes to the right of
[   33.708582]  allocated 235-byte region [fff00000c4a4a400, fff00000c4a4a4eb)
[   33.708807] 
[   33.709001] The buggy address belongs to the physical page:
[   33.709256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.709803] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.709969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.710153] page_type: f5(slab)
[   33.710424] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.710590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.710880] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.711344] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.712001] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.712447] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.712596] page dumped because: kasan: bad access detected
[   33.712722] 
[   33.712810] Memory state around the buggy address:
[   33.712933]  fff00000c4a4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.713096]  fff00000c4a4a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.713239] >fff00000c4a4a480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   33.713366]                                                           ^
[   33.713491]  fff00000c4a4a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.713629]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.713865] ==================================================================
[   33.883979] ==================================================================
[   33.885940] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   33.886335] Write of size 1 at addr fff00000c774e0f0 by task kunit_try_catch/162
[   33.886567] 
[   33.886671] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.887468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.887558] Hardware name: linux,dummy-virt (DT)
[   33.887659] Call trace:
[   33.887727]  show_stack+0x20/0x38 (C)
[   33.887877]  dump_stack_lvl+0x8c/0xd0
[   33.888021]  print_report+0x118/0x5f0
[   33.888185]  kasan_report+0xc8/0x118
[   33.888323]  __asan_report_store1_noabort+0x20/0x30
[   33.888479]  krealloc_more_oob_helper+0x5c8/0x680
[   33.890087]  krealloc_large_more_oob+0x20/0x38
[   33.890314]  kunit_try_run_case+0x14c/0x3d0
[   33.890568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.890775]  kthread+0x318/0x618
[   33.890933]  ret_from_fork+0x10/0x20
[   33.891103] 
[   33.891164] The buggy address belongs to the physical page:
[   33.891275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.891462] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.891608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.891765] page_type: f8(unknown)
[   33.891893] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.892194] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.892438] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.892653] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.892870] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.893072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.893196] page dumped because: kasan: bad access detected
[   33.893353] 
[   33.893414] Memory state around the buggy address:
[   33.893502]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.893639]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.893836] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   33.893987]                                                              ^
[   33.894152]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.894345]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.894537] ==================================================================
[   33.718320] ==================================================================
[   33.718592] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   33.719093] Write of size 1 at addr fff00000c4a4a4f0 by task kunit_try_catch/158
[   33.719684] 
[   33.719809] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.720221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.720340] Hardware name: linux,dummy-virt (DT)
[   33.720991] Call trace:
[   33.721334]  show_stack+0x20/0x38 (C)
[   33.721484]  dump_stack_lvl+0x8c/0xd0
[   33.721622]  print_report+0x118/0x5f0
[   33.721760]  kasan_report+0xc8/0x118
[   33.721898]  __asan_report_store1_noabort+0x20/0x30
[   33.722079]  krealloc_more_oob_helper+0x5c8/0x680
[   33.722523]  krealloc_more_oob+0x20/0x38
[   33.723769]  kunit_try_run_case+0x14c/0x3d0
[   33.724003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.724728]  kthread+0x318/0x618
[   33.724905]  ret_from_fork+0x10/0x20
[   33.725627] 
[   33.725760] Allocated by task 158:
[   33.725962]  kasan_save_stack+0x3c/0x68
[   33.726254]  kasan_save_track+0x20/0x40
[   33.726379]  kasan_save_alloc_info+0x40/0x58
[   33.726615]  __kasan_krealloc+0x118/0x178
[   33.726730]  krealloc_noprof+0x128/0x360
[   33.726847]  krealloc_more_oob_helper+0x168/0x680
[   33.726995]  krealloc_more_oob+0x20/0x38
[   33.727143]  kunit_try_run_case+0x14c/0x3d0
[   33.727266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.727406]  kthread+0x318/0x618
[   33.727587]  ret_from_fork+0x10/0x20
[   33.727697] 
[   33.727756] The buggy address belongs to the object at fff00000c4a4a400
[   33.727756]  which belongs to the cache kmalloc-256 of size 256
[   33.727941] The buggy address is located 5 bytes to the right of
[   33.727941]  allocated 235-byte region [fff00000c4a4a400, fff00000c4a4a4eb)
[   33.728440] 
[   33.728511] The buggy address belongs to the physical page:
[   33.728599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.728758] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.728902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.729099] page_type: f5(slab)
[   33.729398] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.729559] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.729771] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.730024] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.730269] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.730429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.730560] page dumped because: kasan: bad access detected
[   33.730656] 
[   33.730715] Memory state around the buggy address:
[   33.730815]  fff00000c4a4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.730966]  fff00000c4a4a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.731122] >fff00000c4a4a480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   33.731233]                                                              ^
[   33.731361]  fff00000c4a4a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.731501]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.731620] ==================================================================

[   20.914632] ==================================================================
[   20.915261] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   20.916029] Write of size 1 at addr ffff8881003380f0 by task kunit_try_catch/177
[   20.916838] 
[   20.917452] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   20.917580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.917612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.917657] Call Trace:
[   20.917685]  <TASK>
[   20.918030]  dump_stack_lvl+0x73/0xb0
[   20.918188]  print_report+0xd1/0x660
[   20.918431]  ? __virt_addr_valid+0x1db/0x2d0
[   20.918581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.918657]  kasan_report+0x104/0x140
[   20.918717]  ? krealloc_more_oob_helper+0x7eb/0x930
[   20.918788]  ? krealloc_more_oob_helper+0x7eb/0x930
[   20.918919]  __asan_report_store1_noabort+0x1b/0x30
[   20.919504]  krealloc_more_oob_helper+0x7eb/0x930
[   20.919550]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.919584]  ? irqentry_exit+0x2a/0x60
[   20.919642]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   20.919685]  ? __pfx_krealloc_more_oob+0x10/0x10
[   20.919735]  krealloc_more_oob+0x1c/0x30
[   20.919768]  kunit_try_run_case+0x1b2/0x490
[   20.919804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.919836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.919868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.919900]  ? __kthread_parkme+0x82/0x160
[   20.919932]  ? preempt_count_sub+0x50/0x80
[   20.919978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.920011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.920043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.920075]  kthread+0x323/0x710
[   20.920104]  ? trace_preempt_on+0x20/0xc0
[   20.920436]  ? __pfx_kthread+0x10/0x10
[   20.920507]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.920566]  ? calculate_sigpending+0x7b/0xa0
[   20.920627]  ? __pfx_kthread+0x10/0x10
[   20.920726]  ret_from_fork+0x41/0x80
[   20.920790]  ? __pfx_kthread+0x10/0x10
[   20.920825]  ret_from_fork_asm+0x1a/0x30
[   20.920873]  </TASK>
[   20.920889] 
[   20.939509] Allocated by task 177:
[   20.940033]  kasan_save_stack+0x3d/0x60
[   20.940967]  kasan_save_track+0x18/0x40
[   20.941463]  kasan_save_alloc_info+0x3b/0x50
[   20.942206]  __kasan_krealloc+0x190/0x1f0
[   20.942713]  krealloc_noprof+0xf4/0x370
[   20.943278]  krealloc_more_oob_helper+0x1a9/0x930
[   20.943575]  krealloc_more_oob+0x1c/0x30
[   20.944236]  kunit_try_run_case+0x1b2/0x490
[   20.944664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.945348]  kthread+0x323/0x710
[   20.945900]  ret_from_fork+0x41/0x80
[   20.946302]  ret_from_fork_asm+0x1a/0x30
[   20.947147] 
[   20.947356] The buggy address belongs to the object at ffff888100338000
[   20.947356]  which belongs to the cache kmalloc-256 of size 256
[   20.948243] The buggy address is located 5 bytes to the right of
[   20.948243]  allocated 235-byte region [ffff888100338000, ffff8881003380eb)
[   20.949035] 
[   20.949286] The buggy address belongs to the physical page:
[   20.949786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100338
[   20.950648] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.951959] flags: 0x200000000000040(head|node=0|zone=2)
[   20.952393] page_type: f5(slab)
[   20.952947] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   20.953479] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.954390] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   20.955385] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.956100] head: 0200000000000001 ffffea000400ce01 00000000ffffffff 00000000ffffffff
[   20.956988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.957638] page dumped because: kasan: bad access detected
[   20.958354] 
[   20.958556] Memory state around the buggy address:
[   20.959377]  ffff888100337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.960162]  ffff888100338000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.960931] >ffff888100338080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.961365]                                                              ^
[   20.962204]  ffff888100338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963067]  ffff888100338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963943] ==================================================================
[   20.858607] ==================================================================
[   20.859793] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   20.860509] Write of size 1 at addr ffff8881003380eb by task kunit_try_catch/177
[   20.861647] 
[   20.862169] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   20.862361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.862427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.862495] Call Trace:
[   20.862526]  <TASK>
[   20.862561]  dump_stack_lvl+0x73/0xb0
[   20.862635]  print_report+0xd1/0x660
[   20.863086]  ? __virt_addr_valid+0x1db/0x2d0
[   20.863266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.863343]  kasan_report+0x104/0x140
[   20.863380]  ? krealloc_more_oob_helper+0x821/0x930
[   20.863418]  ? krealloc_more_oob_helper+0x821/0x930
[   20.863462]  __asan_report_store1_noabort+0x1b/0x30
[   20.863493]  krealloc_more_oob_helper+0x821/0x930
[   20.863531]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.863564]  ? irqentry_exit+0x2a/0x60
[   20.863604]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   20.863665]  ? __pfx_krealloc_more_oob+0x10/0x10
[   20.863793]  krealloc_more_oob+0x1c/0x30
[   20.863851]  kunit_try_run_case+0x1b2/0x490
[   20.863891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.863924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.863967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.863999]  ? __kthread_parkme+0x82/0x160
[   20.864030]  ? preempt_count_sub+0x50/0x80
[   20.864065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.864098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.864156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.864189]  kthread+0x323/0x710
[   20.864219]  ? trace_preempt_on+0x20/0xc0
[   20.864253]  ? __pfx_kthread+0x10/0x10
[   20.864284]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.864313]  ? calculate_sigpending+0x7b/0xa0
[   20.864343]  ? __pfx_kthread+0x10/0x10
[   20.864375]  ret_from_fork+0x41/0x80
[   20.864406]  ? __pfx_kthread+0x10/0x10
[   20.864437]  ret_from_fork_asm+0x1a/0x30
[   20.864483]  </TASK>
[   20.864498] 
[   20.884701] Allocated by task 177:
[   20.885730]  kasan_save_stack+0x3d/0x60
[   20.886607]  kasan_save_track+0x18/0x40
[   20.887271]  kasan_save_alloc_info+0x3b/0x50
[   20.887724]  __kasan_krealloc+0x190/0x1f0
[   20.888307]  krealloc_noprof+0xf4/0x370
[   20.889047]  krealloc_more_oob_helper+0x1a9/0x930
[   20.889648]  krealloc_more_oob+0x1c/0x30
[   20.890457]  kunit_try_run_case+0x1b2/0x490
[   20.891199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.891705]  kthread+0x323/0x710
[   20.892373]  ret_from_fork+0x41/0x80
[   20.893275]  ret_from_fork_asm+0x1a/0x30
[   20.893618] 
[   20.894201] The buggy address belongs to the object at ffff888100338000
[   20.894201]  which belongs to the cache kmalloc-256 of size 256
[   20.896203] The buggy address is located 0 bytes to the right of
[   20.896203]  allocated 235-byte region [ffff888100338000, ffff8881003380eb)
[   20.896969] 
[   20.897217] The buggy address belongs to the physical page:
[   20.897718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100338
[   20.898586] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.899419] flags: 0x200000000000040(head|node=0|zone=2)
[   20.900219] page_type: f5(slab)
[   20.900585] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   20.901307] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.902236] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   20.903307] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.904215] head: 0200000000000001 ffffea000400ce01 00000000ffffffff 00000000ffffffff
[   20.904742] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.905801] page dumped because: kasan: bad access detected
[   20.906342] 
[   20.906645] Memory state around the buggy address:
[   20.907505]  ffff888100337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.908645]  ffff888100338000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.909190] >ffff888100338080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.909626]                                                           ^
[   20.910230]  ffff888100338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.911224]  ffff888100338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.912206] ==================================================================
[   21.294479] ==================================================================
[   21.295820] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   21.296220] Write of size 1 at addr ffff8881032460f0 by task kunit_try_catch/181
[   21.296703] 
[   21.296921] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   21.297043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.297078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.297184] Call Trace:
[   21.298079]  <TASK>
[   21.298140]  dump_stack_lvl+0x73/0xb0
[   21.298193]  print_report+0xd1/0x660
[   21.298227]  ? __virt_addr_valid+0x1db/0x2d0
[   21.298292]  ? kasan_addr_to_slab+0x11/0xa0
[   21.298326]  kasan_report+0x104/0x140
[   21.298355]  ? krealloc_more_oob_helper+0x7eb/0x930
[   21.298392]  ? krealloc_more_oob_helper+0x7eb/0x930
[   21.298434]  __asan_report_store1_noabort+0x1b/0x30
[   21.298464]  krealloc_more_oob_helper+0x7eb/0x930
[   21.298496]  ? __schedule+0xd46/0x29c0
[   21.298526]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.298561]  ? finish_task_switch.isra.0+0x153/0x730
[   21.298592]  ? __switch_to+0x5d9/0xf70
[   21.298629]  ? __schedule+0xd46/0x29c0
[   21.298656]  ? irqentry_exit+0x2a/0x60
[   21.298728]  ? __pfx_read_tsc+0x10/0x10
[   21.298799]  krealloc_large_more_oob+0x1c/0x30
[   21.298878]  kunit_try_run_case+0x1b2/0x490
[   21.298942]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.298977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.299010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.299053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.299087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.299142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.299177]  kthread+0x323/0x710
[   21.299206]  ? trace_preempt_on+0x20/0xc0
[   21.299240]  ? __pfx_kthread+0x10/0x10
[   21.299271]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.299300]  ? calculate_sigpending+0x7b/0xa0
[   21.299330]  ? __pfx_kthread+0x10/0x10
[   21.299361]  ret_from_fork+0x41/0x80
[   21.299391]  ? __pfx_kthread+0x10/0x10
[   21.299422]  ret_from_fork_asm+0x1a/0x30
[   21.299468]  </TASK>
[   21.299483] 
[   21.322288] The buggy address belongs to the physical page:
[   21.322643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103244
[   21.323528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.325026] flags: 0x200000000000040(head|node=0|zone=2)
[   21.325540] page_type: f8(unknown)
[   21.326449] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.327083] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.327684] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.329164] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.329483] head: 0200000000000002 ffffea00040c9101 00000000ffffffff 00000000ffffffff
[   21.329837] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.330749] page dumped because: kasan: bad access detected
[   21.331474] 
[   21.331777] Memory state around the buggy address:
[   21.332637]  ffff888103245f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.333891]  ffff888103246000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.334516] >ffff888103246080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.336173]                                                              ^
[   21.336663]  ffff888103246100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.337845]  ffff888103246180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.338597] ==================================================================
[   21.245360] ==================================================================
[   21.248203] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   21.248966] Write of size 1 at addr ffff8881032460eb by task kunit_try_catch/181
[   21.250475] 
[   21.250676] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   21.252548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.252583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.252643] Call Trace:
[   21.252873]  <TASK>
[   21.252945]  dump_stack_lvl+0x73/0xb0
[   21.253032]  print_report+0xd1/0x660
[   21.253094]  ? __virt_addr_valid+0x1db/0x2d0
[   21.253243]  ? kasan_addr_to_slab+0x11/0xa0
[   21.253306]  kasan_report+0x104/0x140
[   21.253360]  ? krealloc_more_oob_helper+0x821/0x930
[   21.253428]  ? krealloc_more_oob_helper+0x821/0x930
[   21.253502]  __asan_report_store1_noabort+0x1b/0x30
[   21.253571]  krealloc_more_oob_helper+0x821/0x930
[   21.253629]  ? __schedule+0xd46/0x29c0
[   21.253708]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.253794]  ? finish_task_switch.isra.0+0x153/0x730
[   21.253864]  ? __switch_to+0x5d9/0xf70
[   21.253941]  ? __schedule+0xd46/0x29c0
[   21.253996]  ? irqentry_exit+0x2a/0x60
[   21.254053]  ? __pfx_read_tsc+0x10/0x10
[   21.254391]  krealloc_large_more_oob+0x1c/0x30
[   21.254497]  kunit_try_run_case+0x1b2/0x490
[   21.254569]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.254631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.254908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.255017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.255081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.255177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.255238]  kthread+0x323/0x710
[   21.255300]  ? trace_preempt_on+0x20/0xc0
[   21.255369]  ? __pfx_kthread+0x10/0x10
[   21.255431]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.255491]  ? calculate_sigpending+0x7b/0xa0
[   21.255551]  ? __pfx_kthread+0x10/0x10
[   21.255640]  ret_from_fork+0x41/0x80
[   21.255899]  ? __pfx_kthread+0x10/0x10
[   21.255984]  ret_from_fork_asm+0x1a/0x30
[   21.256078]  </TASK>
[   21.256129] 
[   21.276822] The buggy address belongs to the physical page:
[   21.277456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103244
[   21.278672] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.279534] flags: 0x200000000000040(head|node=0|zone=2)
[   21.280351] page_type: f8(unknown)
[   21.280796] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.281831] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.282379] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.283299] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.284386] head: 0200000000000002 ffffea00040c9101 00000000ffffffff 00000000ffffffff
[   21.285552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.286405] page dumped because: kasan: bad access detected
[   21.287051] 
[   21.287328] Memory state around the buggy address:
[   21.288388]  ffff888103245f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.289158]  ffff888103246000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.289871] >ffff888103246080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.290549]                                                           ^
[   21.291440]  ffff888103246100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.292230]  ffff888103246180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.292946] ==================================================================