Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   41.197351] ==================================================================
[   41.206694] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   41.214240] Write of size 1 at addr ffff0008050620eb by task kunit_try_catch/241
[   41.221618] 
[   41.223104] CPU: 3 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   41.223157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.223173] Hardware name: WinLink E850-96 board (DT)
[   41.223191] Call trace:
[   41.223205]  show_stack+0x20/0x38 (C)
[   41.223238]  dump_stack_lvl+0x8c/0xd0
[   41.223273]  print_report+0x118/0x5d0
[   41.223303]  kasan_report+0xdc/0x128
[   41.223328]  __asan_report_store1_noabort+0x20/0x30
[   41.223362]  krealloc_more_oob_helper+0x60c/0x678
[   41.223394]  krealloc_large_more_oob+0x20/0x38
[   41.223424]  kunit_try_run_case+0x170/0x3f0
[   41.223455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.223490]  kthread+0x328/0x630
[   41.223516]  ret_from_fork+0x10/0x20
[   41.223549] 
[   41.292193] The buggy address belongs to the physical page:
[   41.297750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885060
[   41.305733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.313373] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.320314] page_type: f8(unknown)
[   41.323712] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.331432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.339160] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.346970] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.354783] head: 0bfffe0000000002 fffffdffe0141801 00000000ffffffff 00000000ffffffff
[   41.362595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.370403] page dumped because: kasan: bad access detected
[   41.375956] 
[   41.377431] Memory state around the buggy address:
[   41.382216]  ffff000805061f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.389414]  ffff000805062000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.396621] >ffff000805062080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   41.403820]                                                           ^
[   41.410421]  ffff000805062100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.417626]  ffff000805062180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.424828] ==================================================================
[   41.432329] ==================================================================
[   41.439239] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   41.446790] Write of size 1 at addr ffff0008050620f0 by task kunit_try_catch/241
[   41.454166] 
[   41.455652] CPU: 3 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   41.455704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.455718] Hardware name: WinLink E850-96 board (DT)
[   41.455737] Call trace:
[   41.455750]  show_stack+0x20/0x38 (C)
[   41.455782]  dump_stack_lvl+0x8c/0xd0
[   41.455818]  print_report+0x118/0x5d0
[   41.455847]  kasan_report+0xdc/0x128
[   41.455871]  __asan_report_store1_noabort+0x20/0x30
[   41.455902]  krealloc_more_oob_helper+0x5c0/0x678
[   41.455934]  krealloc_large_more_oob+0x20/0x38
[   41.455966]  kunit_try_run_case+0x170/0x3f0
[   41.455996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.456029]  kthread+0x328/0x630
[   41.456061]  ret_from_fork+0x10/0x20
[   41.456092] 
[   41.524740] The buggy address belongs to the physical page:
[   41.530300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885060
[   41.538282] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.545922] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.552863] page_type: f8(unknown)
[   41.556261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.563980] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.571707] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.579518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.587331] head: 0bfffe0000000002 fffffdffe0141801 00000000ffffffff 00000000ffffffff
[   41.595143] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.602952] page dumped because: kasan: bad access detected
[   41.608504] 
[   41.609980] Memory state around the buggy address:
[   41.614762]  ffff000805061f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.621963]  ffff000805062000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.629168] >ffff000805062080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   41.636369]                                                              ^
[   41.643230]  ffff000805062100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.650435]  ffff000805062180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.657636] ==================================================================
[   39.033478] ==================================================================
[   39.042577] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   39.050125] Write of size 1 at addr ffff0008050582eb by task kunit_try_catch/237
[   39.057501] 
[   39.058987] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   39.059043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.059058] Hardware name: WinLink E850-96 board (DT)
[   39.059079] Call trace:
[   39.059091]  show_stack+0x20/0x38 (C)
[   39.059125]  dump_stack_lvl+0x8c/0xd0
[   39.059159]  print_report+0x118/0x5d0
[   39.059186]  kasan_report+0xdc/0x128
[   39.059212]  __asan_report_store1_noabort+0x20/0x30
[   39.059245]  krealloc_more_oob_helper+0x60c/0x678
[   39.059278]  krealloc_more_oob+0x20/0x38
[   39.059309]  kunit_try_run_case+0x170/0x3f0
[   39.059340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.059374]  kthread+0x328/0x630
[   39.059402]  ret_from_fork+0x10/0x20
[   39.059436] 
[   39.127554] Allocated by task 237:
[   39.130941]  kasan_save_stack+0x3c/0x68
[   39.134757]  kasan_save_track+0x20/0x40
[   39.138576]  kasan_save_alloc_info+0x40/0x58
[   39.142830]  __kasan_krealloc+0x118/0x178
[   39.146824]  krealloc_noprof+0x128/0x360
[   39.150729]  krealloc_more_oob_helper+0x168/0x678
[   39.155416]  krealloc_more_oob+0x20/0x38
[   39.159322]  kunit_try_run_case+0x170/0x3f0
[   39.163489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.168958]  kthread+0x328/0x630
[   39.172170]  ret_from_fork+0x10/0x20
[   39.175728] 
[   39.177207] The buggy address belongs to the object at ffff000805058200
[   39.177207]  which belongs to the cache kmalloc-256 of size 256
[   39.189707] The buggy address is located 0 bytes to the right of
[   39.189707]  allocated 235-byte region [ffff000805058200, ffff0008050582eb)
[   39.202637] 
[   39.204118] The buggy address belongs to the physical page:
[   39.209674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058
[   39.217657] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.225297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.232240] page_type: f5(slab)
[   39.235375] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.243095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.250823] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.258633] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.266446] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff
[   39.274258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.282065] page dumped because: kasan: bad access detected
[   39.287619] 
[   39.289094] Memory state around the buggy address:
[   39.293874]  ffff000805058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.301079]  ffff000805058200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.308282] >ffff000805058280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.315483]                                                           ^
[   39.322084]  ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.329289]  ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.336491] ==================================================================
[   39.343824] ==================================================================
[   39.350903] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   39.358453] Write of size 1 at addr ffff0008050582f0 by task kunit_try_catch/237
[   39.365829] 
[   39.367315] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   39.367369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.367384] Hardware name: WinLink E850-96 board (DT)
[   39.367404] Call trace:
[   39.367418]  show_stack+0x20/0x38 (C)
[   39.367451]  dump_stack_lvl+0x8c/0xd0
[   39.367485]  print_report+0x118/0x5d0
[   39.367512]  kasan_report+0xdc/0x128
[   39.367537]  __asan_report_store1_noabort+0x20/0x30
[   39.367567]  krealloc_more_oob_helper+0x5c0/0x678
[   39.367600]  krealloc_more_oob+0x20/0x38
[   39.367629]  kunit_try_run_case+0x170/0x3f0
[   39.367657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.367690]  kthread+0x328/0x630
[   39.367714]  ret_from_fork+0x10/0x20
[   39.367745] 
[   39.435881] Allocated by task 237:
[   39.439268]  kasan_save_stack+0x3c/0x68
[   39.443086]  kasan_save_track+0x20/0x40
[   39.446905]  kasan_save_alloc_info+0x40/0x58
[   39.451159]  __kasan_krealloc+0x118/0x178
[   39.455152]  krealloc_noprof+0x128/0x360
[   39.459058]  krealloc_more_oob_helper+0x168/0x678
[   39.463745]  krealloc_more_oob+0x20/0x38
[   39.467651]  kunit_try_run_case+0x170/0x3f0
[   39.471818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.477286]  kthread+0x328/0x630
[   39.480498]  ret_from_fork+0x10/0x20
[   39.484057] 
[   39.485534] The buggy address belongs to the object at ffff000805058200
[   39.485534]  which belongs to the cache kmalloc-256 of size 256
[   39.498033] The buggy address is located 5 bytes to the right of
[   39.498033]  allocated 235-byte region [ffff000805058200, ffff0008050582eb)
[   39.510966] 
[   39.512444] The buggy address belongs to the physical page:
[   39.518001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058
[   39.525987] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.533623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.540568] page_type: f5(slab)
[   39.543702] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.551424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.559150] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.566962] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.574775] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff
[   39.582586] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.590392] page dumped because: kasan: bad access detected
[   39.595948] 
[   39.597423] Memory state around the buggy address:
[   39.602204]  ffff000805058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.609406]  ffff000805058200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.616611] >ffff000805058280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.623812]                                                              ^
[   39.630673]  ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.637878]  ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.645079] ==================================================================

[   30.451901] ==================================================================
[   30.451976] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.452040] Write of size 1 at addr fff00000c792e8eb by task kunit_try_catch/188
[   30.452089] 
[   30.452126] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.452208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.452233] Hardware name: linux,dummy-virt (DT)
[   30.452264] Call trace:
[   30.452328]  show_stack+0x20/0x38 (C)
[   30.453190]  dump_stack_lvl+0x8c/0xd0
[   30.453256]  print_report+0x118/0x5d0
[   30.453303]  kasan_report+0xdc/0x128
[   30.453346]  __asan_report_store1_noabort+0x20/0x30
[   30.453395]  krealloc_more_oob_helper+0x60c/0x678
[   30.453454]  krealloc_more_oob+0x20/0x38
[   30.453500]  kunit_try_run_case+0x170/0x3f0
[   30.454349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.454422]  kthread+0x328/0x630
[   30.454755]  ret_from_fork+0x10/0x20
[   30.454807] 
[   30.454826] Allocated by task 188:
[   30.454854]  kasan_save_stack+0x3c/0x68
[   30.454899]  kasan_save_track+0x20/0x40
[   30.454938]  kasan_save_alloc_info+0x40/0x58
[   30.454976]  __kasan_krealloc+0x118/0x178
[   30.455011]  krealloc_noprof+0x128/0x360
[   30.455049]  krealloc_more_oob_helper+0x168/0x678
[   30.455090]  krealloc_more_oob+0x20/0x38
[   30.455133]  kunit_try_run_case+0x170/0x3f0
[   30.455168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.455209]  kthread+0x328/0x630
[   30.455240]  ret_from_fork+0x10/0x20
[   30.455275] 
[   30.455295] The buggy address belongs to the object at fff00000c792e800
[   30.455295]  which belongs to the cache kmalloc-256 of size 256
[   30.455351] The buggy address is located 0 bytes to the right of
[   30.455351]  allocated 235-byte region [fff00000c792e800, fff00000c792e8eb)
[   30.455412] 
[   30.455431] The buggy address belongs to the physical page:
[   30.455510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.455699] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.455745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.455798] page_type: f5(slab)
[   30.455838] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.455888] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.455988] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.456555] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.456673] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.456737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.456805] page dumped because: kasan: bad access detected
[   30.456836] 
[   30.456853] Memory state around the buggy address:
[   30.456887]  fff00000c792e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.457071]  fff00000c792e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.457152] >fff00000c792e880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.457239]                                                           ^
[   30.457388]  fff00000c792e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.457517]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.457565] ==================================================================
[   30.503457] ==================================================================
[   30.503523] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.503587] Write of size 1 at addr fff00000c9a5a0eb by task kunit_try_catch/192
[   30.503635] 
[   30.503667] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.503763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.503788] Hardware name: linux,dummy-virt (DT)
[   30.503825] Call trace:
[   30.503846]  show_stack+0x20/0x38 (C)
[   30.503895]  dump_stack_lvl+0x8c/0xd0
[   30.503943]  print_report+0x118/0x5d0
[   30.503987]  kasan_report+0xdc/0x128
[   30.504030]  __asan_report_store1_noabort+0x20/0x30
[   30.504079]  krealloc_more_oob_helper+0x60c/0x678
[   30.504127]  krealloc_large_more_oob+0x20/0x38
[   30.504175]  kunit_try_run_case+0x170/0x3f0
[   30.504229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.504280]  kthread+0x328/0x630
[   30.504322]  ret_from_fork+0x10/0x20
[   30.504368] 
[   30.504393] The buggy address belongs to the physical page:
[   30.504424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.504488] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.504534] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.504582] page_type: f8(unknown)
[   30.504619] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.504667] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.504714] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.504759] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.505134] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.505322] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.505388] page dumped because: kasan: bad access detected
[   30.505451] 
[   30.505469] Memory state around the buggy address:
[   30.505500]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.505547]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.505592] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.505664]                                                           ^
[   30.505745]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.505845]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.505914] ==================================================================
[   30.458780] ==================================================================
[   30.458828] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.458878] Write of size 1 at addr fff00000c792e8f0 by task kunit_try_catch/188
[   30.458925] 
[   30.458956] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.459036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.459121] Hardware name: linux,dummy-virt (DT)
[   30.459165] Call trace:
[   30.459231]  show_stack+0x20/0x38 (C)
[   30.459287]  dump_stack_lvl+0x8c/0xd0
[   30.459339]  print_report+0x118/0x5d0
[   30.459451]  kasan_report+0xdc/0x128
[   30.459801]  __asan_report_store1_noabort+0x20/0x30
[   30.459953]  krealloc_more_oob_helper+0x5c0/0x678
[   30.460114]  krealloc_more_oob+0x20/0x38
[   30.460161]  kunit_try_run_case+0x170/0x3f0
[   30.460206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.460257]  kthread+0x328/0x630
[   30.460299]  ret_from_fork+0x10/0x20
[   30.460346] 
[   30.460364] Allocated by task 188:
[   30.461658]  kasan_save_stack+0x3c/0x68
[   30.461883]  kasan_save_track+0x20/0x40
[   30.461922]  kasan_save_alloc_info+0x40/0x58
[   30.461960]  __kasan_krealloc+0x118/0x178
[   30.462600]  krealloc_noprof+0x128/0x360
[   30.462651]  krealloc_more_oob_helper+0x168/0x678
[   30.462692]  krealloc_more_oob+0x20/0x38
[   30.462729]  kunit_try_run_case+0x170/0x3f0
[   30.462765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.462807]  kthread+0x328/0x630
[   30.462838]  ret_from_fork+0x10/0x20
[   30.462874] 
[   30.462893] The buggy address belongs to the object at fff00000c792e800
[   30.462893]  which belongs to the cache kmalloc-256 of size 256
[   30.462948] The buggy address is located 5 bytes to the right of
[   30.462948]  allocated 235-byte region [fff00000c792e800, fff00000c792e8eb)
[   30.463009] 
[   30.463028] The buggy address belongs to the physical page:
[   30.463058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.463138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.463285] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.463365] page_type: f5(slab)
[   30.463468] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.463782] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.464015] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.464121] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.464186] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.464240] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.464279] page dumped because: kasan: bad access detected
[   30.464326] 
[   30.464343] Memory state around the buggy address:
[   30.464382]  fff00000c792e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464423]  fff00000c792e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.464476] >fff00000c792e880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.464534]                                                              ^
[   30.464571]  fff00000c792e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464619]  fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464665] ==================================================================
[   30.506356] ==================================================================
[   30.506401] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.506482] Write of size 1 at addr fff00000c9a5a0f0 by task kunit_try_catch/192
[   30.506557] 
[   30.506606] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.506726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.506751] Hardware name: linux,dummy-virt (DT)
[   30.506780] Call trace:
[   30.506799]  show_stack+0x20/0x38 (C)
[   30.506846]  dump_stack_lvl+0x8c/0xd0
[   30.506892]  print_report+0x118/0x5d0
[   30.507079]  kasan_report+0xdc/0x128
[   30.507168]  __asan_report_store1_noabort+0x20/0x30
[   30.507223]  krealloc_more_oob_helper+0x5c0/0x678
[   30.507273]  krealloc_large_more_oob+0x20/0x38
[   30.507320]  kunit_try_run_case+0x170/0x3f0
[   30.507365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.507417]  kthread+0x328/0x630
[   30.507497]  ret_from_fork+0x10/0x20
[   30.507545] 
[   30.507582] The buggy address belongs to the physical page:
[   30.507728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   30.507860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.507910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.507959] page_type: f8(unknown)
[   30.507995] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.508235] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.508354] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.508410] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.508477] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff
[   30.508543] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.508620] page dumped because: kasan: bad access detected
[   30.508650] 
[   30.508703] Memory state around the buggy address:
[   30.508751]  fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.508797]  fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.508838] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.508898]                                                              ^
[   30.508954]  fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.509184]  fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.509271] ==================================================================

[   23.882481] ==================================================================
[   23.883380] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   23.884063] Write of size 1 at addr ffff8881061120f0 by task kunit_try_catch/208
[   23.884303] 
[   23.884386] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   23.884430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.884442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.884461] Call Trace:
[   23.884474]  <TASK>
[   23.884489]  dump_stack_lvl+0x73/0xb0
[   23.884530]  print_report+0xd1/0x610
[   23.884553]  ? __virt_addr_valid+0x1db/0x2d0
[   23.884577]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.884599]  ? kasan_addr_to_slab+0x11/0xa0
[   23.884619]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.884642]  kasan_report+0x141/0x180
[   23.884665]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.884693]  __asan_report_store1_noabort+0x1b/0x30
[   23.884717]  krealloc_more_oob_helper+0x7eb/0x930
[   23.884739]  ? __schedule+0x10cc/0x2b60
[   23.884760]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.884784]  ? finish_task_switch.isra.0+0x153/0x700
[   23.884805]  ? __switch_to+0x47/0xf80
[   23.884831]  ? __schedule+0x10cc/0x2b60
[   23.884851]  ? __pfx_read_tsc+0x10/0x10
[   23.884876]  krealloc_large_more_oob+0x1c/0x30
[   23.884898]  kunit_try_run_case+0x1a5/0x480
[   23.884985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.885008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.885031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.885053]  ? __kthread_parkme+0x82/0x180
[   23.885073]  ? preempt_count_sub+0x50/0x80
[   23.885096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.885118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.885144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.885170]  kthread+0x337/0x6f0
[   23.885189]  ? trace_preempt_on+0x20/0xc0
[   23.885212]  ? __pfx_kthread+0x10/0x10
[   23.885232]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.885256]  ? calculate_sigpending+0x7b/0xa0
[   23.885279]  ? __pfx_kthread+0x10/0x10
[   23.885300]  ret_from_fork+0x116/0x1d0
[   23.885320]  ? __pfx_kthread+0x10/0x10
[   23.885340]  ret_from_fork_asm+0x1a/0x30
[   23.885371]  </TASK>
[   23.885382] 
[   23.895843] The buggy address belongs to the physical page:
[   23.896056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106110
[   23.896362] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.896648] flags: 0x200000000000040(head|node=0|zone=2)
[   23.897261] page_type: f8(unknown)
[   23.897394] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.897634] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.897943] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.898278] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.898786] head: 0200000000000002 ffffea0004184401 00000000ffffffff 00000000ffffffff
[   23.899031] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.899285] page dumped because: kasan: bad access detected
[   23.899544] 
[   23.899697] Memory state around the buggy address:
[   23.899924]  ffff888106111f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.900233]  ffff888106112000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.900793] >ffff888106112080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.901069]                                                              ^
[   23.901327]  ffff888106112100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.901659]  ffff888106112180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.901898] ==================================================================
[   23.702440] ==================================================================
[   23.702767] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   23.703269] Write of size 1 at addr ffff888104b460f0 by task kunit_try_catch/204
[   23.703601] 
[   23.703708] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   23.703769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.703783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.703805] Call Trace:
[   23.703820]  <TASK>
[   23.703836]  dump_stack_lvl+0x73/0xb0
[   23.703868]  print_report+0xd1/0x610
[   23.703895]  ? __virt_addr_valid+0x1db/0x2d0
[   23.703923]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.703950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.703981]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.704010]  kasan_report+0x141/0x180
[   23.704037]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.704073]  __asan_report_store1_noabort+0x1b/0x30
[   23.704101]  krealloc_more_oob_helper+0x7eb/0x930
[   23.704128]  ? __schedule+0x10cc/0x2b60
[   23.704155]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.704184]  ? finish_task_switch.isra.0+0x153/0x700
[   23.704209]  ? __switch_to+0x47/0xf80
[   23.704241]  ? __schedule+0x10cc/0x2b60
[   23.704267]  ? __pfx_read_tsc+0x10/0x10
[   23.704503]  krealloc_more_oob+0x1c/0x30
[   23.704551]  kunit_try_run_case+0x1a5/0x480
[   23.704743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.704776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.704804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.704850]  ? __kthread_parkme+0x82/0x180
[   23.704875]  ? preempt_count_sub+0x50/0x80
[   23.704904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.704932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.704962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.704993]  kthread+0x337/0x6f0
[   23.705019]  ? trace_preempt_on+0x20/0xc0
[   23.705048]  ? __pfx_kthread+0x10/0x10
[   23.705074]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.705294]  ? calculate_sigpending+0x7b/0xa0
[   23.705337]  ? __pfx_kthread+0x10/0x10
[   23.705365]  ret_from_fork+0x116/0x1d0
[   23.705389]  ? __pfx_kthread+0x10/0x10
[   23.705414]  ret_from_fork_asm+0x1a/0x30
[   23.705453]  </TASK>
[   23.705465] 
[   23.713923] Allocated by task 204:
[   23.714048]  kasan_save_stack+0x45/0x70
[   23.714192]  kasan_save_track+0x18/0x40
[   23.714323]  kasan_save_alloc_info+0x3b/0x50
[   23.714472]  __kasan_krealloc+0x190/0x1f0
[   23.714718]  krealloc_noprof+0xf3/0x340
[   23.715242]  krealloc_more_oob_helper+0x1a9/0x930
[   23.715474]  krealloc_more_oob+0x1c/0x30
[   23.715823]  kunit_try_run_case+0x1a5/0x480
[   23.716029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.716348]  kthread+0x337/0x6f0
[   23.716541]  ret_from_fork+0x116/0x1d0
[   23.716790]  ret_from_fork_asm+0x1a/0x30
[   23.717017] 
[   23.717125] The buggy address belongs to the object at ffff888104b46000
[   23.717125]  which belongs to the cache kmalloc-256 of size 256
[   23.717676] The buggy address is located 5 bytes to the right of
[   23.717676]  allocated 235-byte region [ffff888104b46000, ffff888104b460eb)
[   23.718138] 
[   23.718203] The buggy address belongs to the physical page:
[   23.718369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b46
[   23.718775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.719056] flags: 0x200000000000040(head|node=0|zone=2)
[   23.719283] page_type: f5(slab)
[   23.719429] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.719765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.720064] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.720370] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.721474] head: 0200000000000001 ffffea000412d181 00000000ffffffff 00000000ffffffff
[   23.721815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.722129] page dumped because: kasan: bad access detected
[   23.722366] 
[   23.722472] Memory state around the buggy address:
[   23.722877]  ffff888104b45f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.723216]  ffff888104b46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.723506] >ffff888104b46080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.723906]                                                              ^
[   23.724217]  ffff888104b46100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.724534]  ffff888104b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.724923] ==================================================================
[   23.861428] ==================================================================
[   23.862502] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   23.863166] Write of size 1 at addr ffff8881061120eb by task kunit_try_catch/208
[   23.863849] 
[   23.864081] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   23.864147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.864160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.864179] Call Trace:
[   23.864191]  <TASK>
[   23.864207]  dump_stack_lvl+0x73/0xb0
[   23.864235]  print_report+0xd1/0x610
[   23.864258]  ? __virt_addr_valid+0x1db/0x2d0
[   23.864280]  ? krealloc_more_oob_helper+0x821/0x930
[   23.864303]  ? kasan_addr_to_slab+0x11/0xa0
[   23.864323]  ? krealloc_more_oob_helper+0x821/0x930
[   23.864346]  kasan_report+0x141/0x180
[   23.864368]  ? krealloc_more_oob_helper+0x821/0x930
[   23.864396]  __asan_report_store1_noabort+0x1b/0x30
[   23.864420]  krealloc_more_oob_helper+0x821/0x930
[   23.864442]  ? __schedule+0x10cc/0x2b60
[   23.864463]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.864487]  ? finish_task_switch.isra.0+0x153/0x700
[   23.864508]  ? __switch_to+0x47/0xf80
[   23.864545]  ? __schedule+0x10cc/0x2b60
[   23.864566]  ? __pfx_read_tsc+0x10/0x10
[   23.864655]  krealloc_large_more_oob+0x1c/0x30
[   23.864679]  kunit_try_run_case+0x1a5/0x480
[   23.864702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.864723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.864745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.864767]  ? __kthread_parkme+0x82/0x180
[   23.864787]  ? preempt_count_sub+0x50/0x80
[   23.864809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.864832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.864857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.864883]  kthread+0x337/0x6f0
[   23.864902]  ? trace_preempt_on+0x20/0xc0
[   23.864925]  ? __pfx_kthread+0x10/0x10
[   23.864945]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.864969]  ? calculate_sigpending+0x7b/0xa0
[   23.864992]  ? __pfx_kthread+0x10/0x10
[   23.865013]  ret_from_fork+0x116/0x1d0
[   23.865032]  ? __pfx_kthread+0x10/0x10
[   23.865052]  ret_from_fork_asm+0x1a/0x30
[   23.865083]  </TASK>
[   23.865094] 
[   23.874601] The buggy address belongs to the physical page:
[   23.874952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106110
[   23.875345] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.875643] flags: 0x200000000000040(head|node=0|zone=2)
[   23.875861] page_type: f8(unknown)
[   23.876296] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.876672] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.877147] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.877384] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.877935] head: 0200000000000002 ffffea0004184401 00000000ffffffff 00000000ffffffff
[   23.878307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.878770] page dumped because: kasan: bad access detected
[   23.878944] 
[   23.879033] Memory state around the buggy address:
[   23.879292]  ffff888106111f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.879689]  ffff888106112000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.879911] >ffff888106112080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.880226]                                                           ^
[   23.880507]  ffff888106112100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.880967]  ffff888106112180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.881220] ==================================================================
[   23.680145] ==================================================================
[   23.680861] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   23.681167] Write of size 1 at addr ffff888104b460eb by task kunit_try_catch/204
[   23.681528] 
[   23.681860] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   23.681917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.681957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.681979] Call Trace:
[   23.681993]  <TASK>
[   23.682009]  dump_stack_lvl+0x73/0xb0
[   23.682063]  print_report+0xd1/0x610
[   23.682091]  ? __virt_addr_valid+0x1db/0x2d0
[   23.682119]  ? krealloc_more_oob_helper+0x821/0x930
[   23.682147]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.682178]  ? krealloc_more_oob_helper+0x821/0x930
[   23.682207]  kasan_report+0x141/0x180
[   23.682234]  ? krealloc_more_oob_helper+0x821/0x930
[   23.682269]  __asan_report_store1_noabort+0x1b/0x30
[   23.682297]  krealloc_more_oob_helper+0x821/0x930
[   23.682324]  ? __schedule+0x10cc/0x2b60
[   23.682350]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.682379]  ? finish_task_switch.isra.0+0x153/0x700
[   23.682405]  ? __switch_to+0x47/0xf80
[   23.682438]  ? __schedule+0x10cc/0x2b60
[   23.682473]  ? __pfx_read_tsc+0x10/0x10
[   23.682503]  krealloc_more_oob+0x1c/0x30
[   23.682539]  kunit_try_run_case+0x1a5/0x480
[   23.682568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.682595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.682622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.682649]  ? __kthread_parkme+0x82/0x180
[   23.682674]  ? preempt_count_sub+0x50/0x80
[   23.682774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.682803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.682834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.682865]  kthread+0x337/0x6f0
[   23.682890]  ? trace_preempt_on+0x20/0xc0
[   23.682918]  ? __pfx_kthread+0x10/0x10
[   23.682944]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.682973]  ? calculate_sigpending+0x7b/0xa0
[   23.683001]  ? __pfx_kthread+0x10/0x10
[   23.683028]  ret_from_fork+0x116/0x1d0
[   23.683051]  ? __pfx_kthread+0x10/0x10
[   23.683077]  ret_from_fork_asm+0x1a/0x30
[   23.683117]  </TASK>
[   23.683129] 
[   23.691390] Allocated by task 204:
[   23.691625]  kasan_save_stack+0x45/0x70
[   23.691885]  kasan_save_track+0x18/0x40
[   23.692076]  kasan_save_alloc_info+0x3b/0x50
[   23.692262]  __kasan_krealloc+0x190/0x1f0
[   23.692475]  krealloc_noprof+0xf3/0x340
[   23.692727]  krealloc_more_oob_helper+0x1a9/0x930
[   23.692966]  krealloc_more_oob+0x1c/0x30
[   23.693158]  kunit_try_run_case+0x1a5/0x480
[   23.693363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.693652]  kthread+0x337/0x6f0
[   23.693889]  ret_from_fork+0x116/0x1d0
[   23.694061]  ret_from_fork_asm+0x1a/0x30
[   23.694335] 
[   23.694429] The buggy address belongs to the object at ffff888104b46000
[   23.694429]  which belongs to the cache kmalloc-256 of size 256
[   23.695043] The buggy address is located 0 bytes to the right of
[   23.695043]  allocated 235-byte region [ffff888104b46000, ffff888104b460eb)
[   23.695562] 
[   23.695657] The buggy address belongs to the physical page:
[   23.696014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b46
[   23.696346] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.696576] flags: 0x200000000000040(head|node=0|zone=2)
[   23.696745] page_type: f5(slab)
[   23.696904] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.697231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.697600] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.697985] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.698211] head: 0200000000000001 ffffea000412d181 00000000ffffffff 00000000ffffffff
[   23.698432] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.698966] page dumped because: kasan: bad access detected
[   23.699221] 
[   23.699387] Memory state around the buggy address:
[   23.699828]  ffff888104b45f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.700156]  ffff888104b46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.700486] >ffff888104b46080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.700950]                                                           ^
[   23.701151]  ffff888104b46100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.701484]  ffff888104b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.701827] ==================================================================