Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.282979] ==================================================================
[   22.283097] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   22.283217] Write of size 1 at addr fff00000c777e0f0 by task kunit_try_catch/164
[   22.283650] 
[   22.283743] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.283950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.284011] Hardware name: linux,dummy-virt (DT)
[   22.284084] Call trace:
[   22.284139]  show_stack+0x20/0x38 (C)
[   22.284505]  dump_stack_lvl+0x8c/0xd0
[   22.284634]  print_report+0x118/0x608
[   22.284773]  kasan_report+0xdc/0x128
[   22.284890]  __asan_report_store1_noabort+0x20/0x30
[   22.285015]  krealloc_more_oob_helper+0x5c0/0x678
[   22.285360]  krealloc_large_more_oob+0x20/0x38
[   22.285540]  kunit_try_run_case+0x170/0x3f0
[   22.285679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.285814]  kthread+0x328/0x630
[   22.286214]  ret_from_fork+0x10/0x20
[   22.286382] 
[   22.286493] The buggy address belongs to the physical page:
[   22.286587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10777c
[   22.286728] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.286841] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.286971] page_type: f8(unknown)
[   22.287107] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.287461] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.287649] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.287787] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.287916] head: 0bfffe0000000002 ffffc1ffc31ddf01 00000000ffffffff 00000000ffffffff
[   22.288044] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.288190] page dumped because: kasan: bad access detected
[   22.288280] 
[   22.288345] Memory state around the buggy address:
[   22.288829]  fff00000c777df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.288951]  fff00000c777e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.289064] >fff00000c777e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.289523]                                                              ^
[   22.289717]  fff00000c777e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.289833]  fff00000c777e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.289926] ==================================================================
[   22.138325] ==================================================================
[   22.138573] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   22.139072] Write of size 1 at addr fff00000c57b0aeb by task kunit_try_catch/160
[   22.139241] 
[   22.139361] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.139598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.139663] Hardware name: linux,dummy-virt (DT)
[   22.139971] Call trace:
[   22.140033]  show_stack+0x20/0x38 (C)
[   22.140180]  dump_stack_lvl+0x8c/0xd0
[   22.140270]  print_report+0x118/0x608
[   22.140363]  kasan_report+0xdc/0x128
[   22.140482]  __asan_report_store1_noabort+0x20/0x30
[   22.140677]  krealloc_more_oob_helper+0x60c/0x678
[   22.140867]  krealloc_more_oob+0x20/0x38
[   22.141026]  kunit_try_run_case+0x170/0x3f0
[   22.141172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.141373]  kthread+0x328/0x630
[   22.141528]  ret_from_fork+0x10/0x20
[   22.141685] 
[   22.141733] Allocated by task 160:
[   22.141838]  kasan_save_stack+0x3c/0x68
[   22.141947]  kasan_save_track+0x20/0x40
[   22.142042]  kasan_save_alloc_info+0x40/0x58
[   22.142176]  __kasan_krealloc+0x118/0x178
[   22.142286]  krealloc_noprof+0x128/0x360
[   22.142458]  krealloc_more_oob_helper+0x168/0x678
[   22.142559]  krealloc_more_oob+0x20/0x38
[   22.142652]  kunit_try_run_case+0x170/0x3f0
[   22.142756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.143124]  kthread+0x328/0x630
[   22.143457]  ret_from_fork+0x10/0x20
[   22.143706] 
[   22.144082] The buggy address belongs to the object at fff00000c57b0a00
[   22.144082]  which belongs to the cache kmalloc-256 of size 256
[   22.144433] The buggy address is located 0 bytes to the right of
[   22.144433]  allocated 235-byte region [fff00000c57b0a00, fff00000c57b0aeb)
[   22.144614] 
[   22.144669] The buggy address belongs to the physical page:
[   22.144774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[   22.144892] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.145004] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.145127] page_type: f5(slab)
[   22.145206] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.145309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.145780] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.145943] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.146072] head: 0bfffe0000000001 ffffc1ffc315ec01 00000000ffffffff 00000000ffffffff
[   22.146203] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.146331] page dumped because: kasan: bad access detected
[   22.146493] 
[   22.146549] Memory state around the buggy address:
[   22.146680]  fff00000c57b0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.146787]  fff00000c57b0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.147123] >fff00000c57b0a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.147335]                                                           ^
[   22.147479]  fff00000c57b0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.147595]  fff00000c57b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.147694] ==================================================================
[   22.273078] ==================================================================
[   22.273796] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   22.274348] Write of size 1 at addr fff00000c777e0eb by task kunit_try_catch/164
[   22.274535] 
[   22.274628] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.274805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.275072] Hardware name: linux,dummy-virt (DT)
[   22.275368] Call trace:
[   22.275452]  show_stack+0x20/0x38 (C)
[   22.275616]  dump_stack_lvl+0x8c/0xd0
[   22.275800]  print_report+0x118/0x608
[   22.275921]  kasan_report+0xdc/0x128
[   22.276036]  __asan_report_store1_noabort+0x20/0x30
[   22.276156]  krealloc_more_oob_helper+0x60c/0x678
[   22.276290]  krealloc_large_more_oob+0x20/0x38
[   22.276421]  kunit_try_run_case+0x170/0x3f0
[   22.276874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.277025]  kthread+0x328/0x630
[   22.277499]  ret_from_fork+0x10/0x20
[   22.277675] 
[   22.277727] The buggy address belongs to the physical page:
[   22.277804] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10777c
[   22.277936] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.278436] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.278657] page_type: f8(unknown)
[   22.278813] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.278960] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.279116] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.279290] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.279430] head: 0bfffe0000000002 ffffc1ffc31ddf01 00000000ffffffff 00000000ffffffff
[   22.279550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.280051] page dumped because: kasan: bad access detected
[   22.280279] 
[   22.280350] Memory state around the buggy address:
[   22.280479]  fff00000c777df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.280628]  fff00000c777e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.280819] >fff00000c777e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.280947]                                                           ^
[   22.281139]  fff00000c777e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.281253]  fff00000c777e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.281377] ==================================================================
[   22.150219] ==================================================================
[   22.150374] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   22.150602] Write of size 1 at addr fff00000c57b0af0 by task kunit_try_catch/160
[   22.150732] 
[   22.151165] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.151534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.151596] Hardware name: linux,dummy-virt (DT)
[   22.151660] Call trace:
[   22.151705]  show_stack+0x20/0x38 (C)
[   22.151854]  dump_stack_lvl+0x8c/0xd0
[   22.151964]  print_report+0x118/0x608
[   22.152114]  kasan_report+0xdc/0x128
[   22.152411]  __asan_report_store1_noabort+0x20/0x30
[   22.152531]  krealloc_more_oob_helper+0x5c0/0x678
[   22.152643]  krealloc_more_oob+0x20/0x38
[   22.152752]  kunit_try_run_case+0x170/0x3f0
[   22.152910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.153060]  kthread+0x328/0x630
[   22.153223]  ret_from_fork+0x10/0x20
[   22.153416] 
[   22.153490] Allocated by task 160:
[   22.153605]  kasan_save_stack+0x3c/0x68
[   22.153718]  kasan_save_track+0x20/0x40
[   22.153833]  kasan_save_alloc_info+0x40/0x58
[   22.153939]  __kasan_krealloc+0x118/0x178
[   22.154077]  krealloc_noprof+0x128/0x360
[   22.154208]  krealloc_more_oob_helper+0x168/0x678
[   22.154331]  krealloc_more_oob+0x20/0x38
[   22.154450]  kunit_try_run_case+0x170/0x3f0
[   22.154535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.154642]  kthread+0x328/0x630
[   22.154733]  ret_from_fork+0x10/0x20
[   22.154824] 
[   22.154873] The buggy address belongs to the object at fff00000c57b0a00
[   22.154873]  which belongs to the cache kmalloc-256 of size 256
[   22.155022] The buggy address is located 5 bytes to the right of
[   22.155022]  allocated 235-byte region [fff00000c57b0a00, fff00000c57b0aeb)
[   22.155195] 
[   22.155247] The buggy address belongs to the physical page:
[   22.155328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[   22.155478] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.155605] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.155749] page_type: f5(slab)
[   22.155849] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.156043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.156187] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.156762] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.156903] head: 0bfffe0000000001 ffffc1ffc315ec01 00000000ffffffff 00000000ffffffff
[   22.157028] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.157121] page dumped because: kasan: bad access detected
[   22.157199] 
[   22.157284] Memory state around the buggy address:
[   22.157370]  fff00000c57b0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.157480]  fff00000c57b0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.157564] >fff00000c57b0a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.157829]                                                              ^
[   22.157916]  fff00000c57b0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.158006]  fff00000c57b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.158094] ==================================================================

[   13.098392] ==================================================================
[   13.099080] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   13.099304] Write of size 1 at addr ffff888100aaf2eb by task kunit_try_catch/176
[   13.099443] 
[   13.099524] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.099597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.099611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.099634] Call Trace:
[   13.099649]  <TASK>
[   13.099680]  dump_stack_lvl+0x73/0xb0
[   13.099712]  print_report+0xd1/0x650
[   13.099736]  ? __virt_addr_valid+0x1db/0x2d0
[   13.099758]  ? krealloc_more_oob_helper+0x821/0x930
[   13.099777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.099799]  ? krealloc_more_oob_helper+0x821/0x930
[   13.099818]  kasan_report+0x141/0x180
[   13.099840]  ? krealloc_more_oob_helper+0x821/0x930
[   13.099863]  __asan_report_store1_noabort+0x1b/0x30
[   13.099883]  krealloc_more_oob_helper+0x821/0x930
[   13.099901]  ? __schedule+0x10cc/0x2b30
[   13.099923]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.099943]  ? finish_task_switch.isra.0+0x153/0x700
[   13.099967]  ? __switch_to+0x5d9/0xf60
[   13.099988]  ? dequeue_task_fair+0x166/0x4e0
[   13.100011]  ? __schedule+0x10cc/0x2b30
[   13.100031]  ? __pfx_read_tsc+0x10/0x10
[   13.100053]  krealloc_more_oob+0x1c/0x30
[   13.100071]  kunit_try_run_case+0x1a5/0x480
[   13.100094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.100114]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.100136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.100157]  ? __kthread_parkme+0x82/0x180
[   13.100178]  ? preempt_count_sub+0x50/0x80
[   13.100201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.100222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.100244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.100265]  kthread+0x337/0x6f0
[   13.100282]  ? trace_preempt_on+0x20/0xc0
[   13.100305]  ? __pfx_kthread+0x10/0x10
[   13.100322]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.100342]  ? calculate_sigpending+0x7b/0xa0
[   13.100363]  ? __pfx_kthread+0x10/0x10
[   13.100381]  ret_from_fork+0x41/0x80
[   13.100401]  ? __pfx_kthread+0x10/0x10
[   13.100418]  ret_from_fork_asm+0x1a/0x30
[   13.100446]  </TASK>
[   13.100458] 
[   13.111458] Allocated by task 176:
[   13.111804]  kasan_save_stack+0x45/0x70
[   13.112165]  kasan_save_track+0x18/0x40
[   13.112453]  kasan_save_alloc_info+0x3b/0x50
[   13.112784]  __kasan_krealloc+0x190/0x1f0
[   13.113027]  krealloc_noprof+0xf3/0x340
[   13.113280]  krealloc_more_oob_helper+0x1a9/0x930
[   13.113592]  krealloc_more_oob+0x1c/0x30
[   13.113905]  kunit_try_run_case+0x1a5/0x480
[   13.114146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.114425]  kthread+0x337/0x6f0
[   13.114729]  ret_from_fork+0x41/0x80
[   13.114967]  ret_from_fork_asm+0x1a/0x30
[   13.115180] 
[   13.115337] The buggy address belongs to the object at ffff888100aaf200
[   13.115337]  which belongs to the cache kmalloc-256 of size 256
[   13.116007] The buggy address is located 0 bytes to the right of
[   13.116007]  allocated 235-byte region [ffff888100aaf200, ffff888100aaf2eb)
[   13.116681] 
[   13.116857] The buggy address belongs to the physical page:
[   13.117181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   13.117601] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.118036] flags: 0x200000000000040(head|node=0|zone=2)
[   13.118453] page_type: f5(slab)
[   13.118729] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.119256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.119622] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.120120] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.120509] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   13.121033] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.121396] page dumped because: kasan: bad access detected
[   13.121760] 
[   13.121868] Memory state around the buggy address:
[   13.122066]  ffff888100aaf180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.122315]  ffff888100aaf200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.122573] >ffff888100aaf280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   13.123075]                                                           ^
[   13.123580]  ffff888100aaf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.124088]  ffff888100aaf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.124583] ==================================================================
[   13.349283] ==================================================================
[   13.350155] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   13.350552] Write of size 1 at addr ffff8881029be0eb by task kunit_try_catch/180
[   13.351609] 
[   13.352054] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.352119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.352132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.352162] Call Trace:
[   13.352187]  <TASK>
[   13.352218]  dump_stack_lvl+0x73/0xb0
[   13.352278]  print_report+0xd1/0x650
[   13.352344]  ? __virt_addr_valid+0x1db/0x2d0
[   13.352376]  ? krealloc_more_oob_helper+0x821/0x930
[   13.352395]  ? kasan_addr_to_slab+0x11/0xa0
[   13.352423]  ? krealloc_more_oob_helper+0x821/0x930
[   13.352456]  kasan_report+0x141/0x180
[   13.352480]  ? krealloc_more_oob_helper+0x821/0x930
[   13.352503]  __asan_report_store1_noabort+0x1b/0x30
[   13.352523]  krealloc_more_oob_helper+0x821/0x930
[   13.352541]  ? __schedule+0x10cc/0x2b30
[   13.352584]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.352616]  ? finish_task_switch.isra.0+0x153/0x700
[   13.352658]  ? __switch_to+0x5d9/0xf60
[   13.352693]  ? dequeue_task_fair+0x166/0x4e0
[   13.352740]  ? __schedule+0x10cc/0x2b30
[   13.352775]  ? __pfx_read_tsc+0x10/0x10
[   13.352801]  krealloc_large_more_oob+0x1c/0x30
[   13.352821]  kunit_try_run_case+0x1a5/0x480
[   13.352846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.352867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.352891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.352912]  ? __kthread_parkme+0x82/0x180
[   13.352934]  ? preempt_count_sub+0x50/0x80
[   13.352958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.352980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.353001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.353022]  kthread+0x337/0x6f0
[   13.353039]  ? trace_preempt_on+0x20/0xc0
[   13.353063]  ? __pfx_kthread+0x10/0x10
[   13.353080]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.353100]  ? calculate_sigpending+0x7b/0xa0
[   13.353122]  ? __pfx_kthread+0x10/0x10
[   13.353140]  ret_from_fork+0x41/0x80
[   13.353159]  ? __pfx_kthread+0x10/0x10
[   13.353177]  ret_from_fork_asm+0x1a/0x30
[   13.353206]  </TASK>
[   13.353219] 
[   13.367932] The buggy address belongs to the physical page:
[   13.368683] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029bc
[   13.369337] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.370081] flags: 0x200000000000040(head|node=0|zone=2)
[   13.370549] page_type: f8(unknown)
[   13.370748] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.371265] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.372098] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.372679] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.373402] head: 0200000000000002 ffffea00040a6f01 00000000ffffffff 00000000ffffffff
[   13.373953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.374401] page dumped because: kasan: bad access detected
[   13.374784] 
[   13.374889] Memory state around the buggy address:
[   13.375206]  ffff8881029bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.375636]  ffff8881029be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.375966] >ffff8881029be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   13.376393]                                                           ^
[   13.377671]  ffff8881029be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.378117]  ffff8881029be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.378340] ==================================================================
[   13.378951] ==================================================================
[   13.379219] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   13.379497] Write of size 1 at addr ffff8881029be0f0 by task kunit_try_catch/180
[   13.381193] 
[   13.381384] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.382401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.382425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.382448] Call Trace:
[   13.382466]  <TASK>
[   13.382486]  dump_stack_lvl+0x73/0xb0
[   13.382525]  print_report+0xd1/0x650
[   13.382548]  ? __virt_addr_valid+0x1db/0x2d0
[   13.382596]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.382625]  ? kasan_addr_to_slab+0x11/0xa0
[   13.382657]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.382686]  kasan_report+0x141/0x180
[   13.382717]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.382752]  __asan_report_store1_noabort+0x1b/0x30
[   13.382784]  krealloc_more_oob_helper+0x7eb/0x930
[   13.382810]  ? __schedule+0x10cc/0x2b30
[   13.382832]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.382851]  ? finish_task_switch.isra.0+0x153/0x700
[   13.382875]  ? __switch_to+0x5d9/0xf60
[   13.382895]  ? dequeue_task_fair+0x166/0x4e0
[   13.382917]  ? __schedule+0x10cc/0x2b30
[   13.382937]  ? __pfx_read_tsc+0x10/0x10
[   13.382959]  krealloc_large_more_oob+0x1c/0x30
[   13.382977]  kunit_try_run_case+0x1a5/0x480
[   13.383001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.383021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.383042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.383063]  ? __kthread_parkme+0x82/0x180
[   13.383084]  ? preempt_count_sub+0x50/0x80
[   13.383106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.383128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.383161]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.383185]  kthread+0x337/0x6f0
[   13.383204]  ? trace_preempt_on+0x20/0xc0
[   13.383229]  ? __pfx_kthread+0x10/0x10
[   13.383249]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.383270]  ? calculate_sigpending+0x7b/0xa0
[   13.383294]  ? __pfx_kthread+0x10/0x10
[   13.383312]  ret_from_fork+0x41/0x80
[   13.383332]  ? __pfx_kthread+0x10/0x10
[   13.383349]  ret_from_fork_asm+0x1a/0x30
[   13.383379]  </TASK>
[   13.383392] 
[   13.397308] The buggy address belongs to the physical page:
[   13.398238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029bc
[   13.399047] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.399483] flags: 0x200000000000040(head|node=0|zone=2)
[   13.400074] page_type: f8(unknown)
[   13.400234] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.400447] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.401500] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.402051] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.402796] head: 0200000000000002 ffffea00040a6f01 00000000ffffffff 00000000ffffffff
[   13.403083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.403598] page dumped because: kasan: bad access detected
[   13.404225] 
[   13.404399] Memory state around the buggy address:
[   13.405223]  ffff8881029bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.405571]  ffff8881029be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.406468] >ffff8881029be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   13.406957]                                                              ^
[   13.407196]  ffff8881029be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.408056]  ffff8881029be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.408743] ==================================================================
[   13.127459] ==================================================================
[   13.128032] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   13.128458] Write of size 1 at addr ffff888100aaf2f0 by task kunit_try_catch/176
[   13.129083] 
[   13.129271] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.129360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.129382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.129419] Call Trace:
[   13.129448]  <TASK>
[   13.129486]  dump_stack_lvl+0x73/0xb0
[   13.129543]  print_report+0xd1/0x650
[   13.129595]  ? __virt_addr_valid+0x1db/0x2d0
[   13.130597]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.130639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.130707]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.130744]  kasan_report+0x141/0x180
[   13.130789]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.130837]  __asan_report_store1_noabort+0x1b/0x30
[   13.130879]  krealloc_more_oob_helper+0x7eb/0x930
[   13.130913]  ? __schedule+0x10cc/0x2b30
[   13.130952]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.130986]  ? finish_task_switch.isra.0+0x153/0x700
[   13.131031]  ? __switch_to+0x5d9/0xf60
[   13.131067]  ? dequeue_task_fair+0x166/0x4e0
[   13.131108]  ? __schedule+0x10cc/0x2b30
[   13.131161]  ? __pfx_read_tsc+0x10/0x10
[   13.131207]  krealloc_more_oob+0x1c/0x30
[   13.131247]  kunit_try_run_case+0x1a5/0x480
[   13.131300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.131340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.131378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.131418]  ? __kthread_parkme+0x82/0x180
[   13.131457]  ? preempt_count_sub+0x50/0x80
[   13.131502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.131543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.131597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.131636]  kthread+0x337/0x6f0
[   13.131696]  ? trace_preempt_on+0x20/0xc0
[   13.131742]  ? __pfx_kthread+0x10/0x10
[   13.131778]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.131819]  ? calculate_sigpending+0x7b/0xa0
[   13.131862]  ? __pfx_kthread+0x10/0x10
[   13.131891]  ret_from_fork+0x41/0x80
[   13.131915]  ? __pfx_kthread+0x10/0x10
[   13.131932]  ret_from_fork_asm+0x1a/0x30
[   13.131961]  </TASK>
[   13.131975] 
[   13.142177] Allocated by task 176:
[   13.142480]  kasan_save_stack+0x45/0x70
[   13.142852]  kasan_save_track+0x18/0x40
[   13.143148]  kasan_save_alloc_info+0x3b/0x50
[   13.143345]  __kasan_krealloc+0x190/0x1f0
[   13.143549]  krealloc_noprof+0xf3/0x340
[   13.143895]  krealloc_more_oob_helper+0x1a9/0x930
[   13.144268]  krealloc_more_oob+0x1c/0x30
[   13.144532]  kunit_try_run_case+0x1a5/0x480
[   13.144905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.145169]  kthread+0x337/0x6f0
[   13.145398]  ret_from_fork+0x41/0x80
[   13.145723]  ret_from_fork_asm+0x1a/0x30
[   13.145947] 
[   13.146095] The buggy address belongs to the object at ffff888100aaf200
[   13.146095]  which belongs to the cache kmalloc-256 of size 256
[   13.146624] The buggy address is located 5 bytes to the right of
[   13.146624]  allocated 235-byte region [ffff888100aaf200, ffff888100aaf2eb)
[   13.147228] 
[   13.147414] The buggy address belongs to the physical page:
[   13.147680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   13.147989] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.148332] flags: 0x200000000000040(head|node=0|zone=2)
[   13.148785] page_type: f5(slab)
[   13.149064] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.149589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.150140] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.150478] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.150884] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   13.151255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.151788] page dumped because: kasan: bad access detected
[   13.152133] 
[   13.152289] Memory state around the buggy address:
[   13.152477]  ffff888100aaf180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.152918]  ffff888100aaf200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.153280] >ffff888100aaf280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   13.153676]                                                              ^
[   13.153927]  ffff888100aaf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.154159]  ffff888100aaf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.154394] ==================================================================