Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.707757] ==================================================================
[   17.708219] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.708390] Write of size 1 at addr fff00000c4480aeb by task kunit_try_catch/158
[   17.708441] 
[   17.708577] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.708718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.708747] Hardware name: linux,dummy-virt (DT)
[   17.708777] Call trace:
[   17.708817]  show_stack+0x20/0x38 (C)
[   17.708953]  dump_stack_lvl+0x8c/0xd0
[   17.709001]  print_report+0x118/0x608
[   17.709045]  kasan_report+0xdc/0x128
[   17.709088]  __asan_report_store1_noabort+0x20/0x30
[   17.709889]  krealloc_more_oob_helper+0x60c/0x678
[   17.710016]  krealloc_more_oob+0x20/0x38
[   17.710119]  kunit_try_run_case+0x170/0x3f0
[   17.710167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.710260]  kthread+0x328/0x630
[   17.710488]  ret_from_fork+0x10/0x20
[   17.710628] 
[   17.710647] Allocated by task 158:
[   17.710718]  kasan_save_stack+0x3c/0x68
[   17.710852]  kasan_save_track+0x20/0x40
[   17.710888]  kasan_save_alloc_info+0x40/0x58
[   17.710925]  __kasan_krealloc+0x118/0x178
[   17.710975]  krealloc_noprof+0x128/0x360
[   17.711013]  krealloc_more_oob_helper+0x168/0x678
[   17.711058]  krealloc_more_oob+0x20/0x38
[   17.711113]  kunit_try_run_case+0x170/0x3f0
[   17.711251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.711345]  kthread+0x328/0x630
[   17.711382]  ret_from_fork+0x10/0x20
[   17.711417] 
[   17.711458] The buggy address belongs to the object at fff00000c4480a00
[   17.711458]  which belongs to the cache kmalloc-256 of size 256
[   17.711516] The buggy address is located 0 bytes to the right of
[   17.711516]  allocated 235-byte region [fff00000c4480a00, fff00000c4480aeb)
[   17.711577] 
[   17.711850] The buggy address belongs to the physical page:
[   17.711968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.712162] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.712417] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.712508] page_type: f5(slab)
[   17.712844] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.712965] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.713013] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.713262] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.713371] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.713655] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.713703] page dumped because: kasan: bad access detected
[   17.713734] 
[   17.713752] Memory state around the buggy address:
[   17.713825]  fff00000c4480980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.713867]  fff00000c4480a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.713907] >fff00000c4480a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.714202]                                                           ^
[   17.714244]  fff00000c4480b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.714285]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.714321] ==================================================================
[   17.766884] ==================================================================
[   17.766930] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.766975] Write of size 1 at addr fff00000c784a0f0 by task kunit_try_catch/162
[   17.767023] 
[   17.767051] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.767128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.767154] Hardware name: linux,dummy-virt (DT)
[   17.767190] Call trace:
[   17.767285]  show_stack+0x20/0x38 (C)
[   17.767637]  dump_stack_lvl+0x8c/0xd0
[   17.767827]  print_report+0x118/0x608
[   17.768002]  kasan_report+0xdc/0x128
[   17.768182]  __asan_report_store1_noabort+0x20/0x30
[   17.768514]  krealloc_more_oob_helper+0x5c0/0x678
[   17.768565]  krealloc_large_more_oob+0x20/0x38
[   17.768611]  kunit_try_run_case+0x170/0x3f0
[   17.768788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.768863]  kthread+0x328/0x630
[   17.768909]  ret_from_fork+0x10/0x20
[   17.768956] 
[   17.769016] The buggy address belongs to the physical page:
[   17.769048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.769198] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.769246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.769371] page_type: f8(unknown)
[   17.769797] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.769850] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.769899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.769972] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.770018] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.770165] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.770392] page dumped because: kasan: bad access detected
[   17.770424] 
[   17.770442] Memory state around the buggy address:
[   17.770473]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.770515]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.770763] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.770918]                                                              ^
[   17.770961]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.771003]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.771040] ==================================================================
[   17.715567] ==================================================================
[   17.716160] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.716267] Write of size 1 at addr fff00000c4480af0 by task kunit_try_catch/158
[   17.716482] 
[   17.716513] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.716591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.716616] Hardware name: linux,dummy-virt (DT)
[   17.716646] Call trace:
[   17.716667]  show_stack+0x20/0x38 (C)
[   17.716715]  dump_stack_lvl+0x8c/0xd0
[   17.716762]  print_report+0x118/0x608
[   17.716807]  kasan_report+0xdc/0x128
[   17.716863]  __asan_report_store1_noabort+0x20/0x30
[   17.716912]  krealloc_more_oob_helper+0x5c0/0x678
[   17.717213]  krealloc_more_oob+0x20/0x38
[   17.717358]  kunit_try_run_case+0x170/0x3f0
[   17.717408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.717461]  kthread+0x328/0x630
[   17.717505]  ret_from_fork+0x10/0x20
[   17.717552] 
[   17.717580] Allocated by task 158:
[   17.717749]  kasan_save_stack+0x3c/0x68
[   17.717905]  kasan_save_track+0x20/0x40
[   17.717942]  kasan_save_alloc_info+0x40/0x58
[   17.717979]  __kasan_krealloc+0x118/0x178
[   17.718014]  krealloc_noprof+0x128/0x360
[   17.718049]  krealloc_more_oob_helper+0x168/0x678
[   17.718598]  krealloc_more_oob+0x20/0x38
[   17.718652]  kunit_try_run_case+0x170/0x3f0
[   17.718691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.718742]  kthread+0x328/0x630
[   17.718778]  ret_from_fork+0x10/0x20
[   17.718812] 
[   17.719068] The buggy address belongs to the object at fff00000c4480a00
[   17.719068]  which belongs to the cache kmalloc-256 of size 256
[   17.719189] The buggy address is located 5 bytes to the right of
[   17.719189]  allocated 235-byte region [fff00000c4480a00, fff00000c4480aeb)
[   17.719252] 
[   17.719562] The buggy address belongs to the physical page:
[   17.719597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.719747] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.719804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.719856] page_type: f5(slab)
[   17.719976] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.720095] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.720201] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.720712] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.720979] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.721088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.721128] page dumped because: kasan: bad access detected
[   17.721158] 
[   17.721176] Memory state around the buggy address:
[   17.721206]  fff00000c4480980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721250]  fff00000c4480a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.721525] >fff00000c4480a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.721635]                                                              ^
[   17.721710]  fff00000c4480b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721762]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721831] ==================================================================
[   17.762068] ==================================================================
[   17.762121] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.762248] Write of size 1 at addr fff00000c784a0eb by task kunit_try_catch/162
[   17.762444] 
[   17.762482] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.762582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.762625] Hardware name: linux,dummy-virt (DT)
[   17.762673] Call trace:
[   17.762701]  show_stack+0x20/0x38 (C)
[   17.762753]  dump_stack_lvl+0x8c/0xd0
[   17.762819]  print_report+0x118/0x608
[   17.762871]  kasan_report+0xdc/0x128
[   17.762914]  __asan_report_store1_noabort+0x20/0x30
[   17.762979]  krealloc_more_oob_helper+0x60c/0x678
[   17.763026]  krealloc_large_more_oob+0x20/0x38
[   17.763187]  kunit_try_run_case+0x170/0x3f0
[   17.763284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.763460]  kthread+0x328/0x630
[   17.763521]  ret_from_fork+0x10/0x20
[   17.763568] 
[   17.763588] The buggy address belongs to the physical page:
[   17.763619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.763670] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.763715] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.763764] page_type: f8(unknown)
[   17.763801] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.763849] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.763897] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.763943] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.763990] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.764036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.764085] page dumped because: kasan: bad access detected
[   17.764116] 
[   17.764133] Memory state around the buggy address:
[   17.764180]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.764253]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.764294] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.764330]                                                           ^
[   17.764452]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.764586]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.764688] ==================================================================

[   10.768682] ==================================================================
[   10.769203] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.769451] Write of size 1 at addr ffff888100355ceb by task kunit_try_catch/176
[   10.770289] 
[   10.770472] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   10.770551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.770564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.770584] Call Trace:
[   10.770597]  <TASK>
[   10.770611]  dump_stack_lvl+0x73/0xb0
[   10.770638]  print_report+0xd1/0x650
[   10.770662]  ? __virt_addr_valid+0x1db/0x2d0
[   10.770685]  ? krealloc_more_oob_helper+0x821/0x930
[   10.770706]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.770729]  ? krealloc_more_oob_helper+0x821/0x930
[   10.770749]  kasan_report+0x141/0x180
[   10.770772]  ? krealloc_more_oob_helper+0x821/0x930
[   10.770797]  __asan_report_store1_noabort+0x1b/0x30
[   10.770819]  krealloc_more_oob_helper+0x821/0x930
[   10.770845]  ? __schedule+0x10cc/0x2b60
[   10.770869]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.770899]  ? finish_task_switch.isra.0+0x153/0x700
[   10.770922]  ? __switch_to+0x5d9/0xf60
[   10.770945]  ? dequeue_task_fair+0x166/0x4e0
[   10.770970]  ? __schedule+0x10cc/0x2b60
[   10.770992]  ? __pfx_read_tsc+0x10/0x10
[   10.771016]  krealloc_more_oob+0x1c/0x30
[   10.771035]  kunit_try_run_case+0x1a5/0x480
[   10.771057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.771076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.771100]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.771124]  ? __kthread_parkme+0x82/0x180
[   10.771146]  ? preempt_count_sub+0x50/0x80
[   10.771170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.771190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.771213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.771236]  kthread+0x337/0x6f0
[   10.771253]  ? trace_preempt_on+0x20/0xc0
[   10.771276]  ? __pfx_kthread+0x10/0x10
[   10.771295]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.771317]  ? calculate_sigpending+0x7b/0xa0
[   10.771338]  ? __pfx_kthread+0x10/0x10
[   10.771357]  ret_from_fork+0x41/0x80
[   10.771378]  ? __pfx_kthread+0x10/0x10
[   10.771396]  ret_from_fork_asm+0x1a/0x30
[   10.771426]  </TASK>
[   10.771437] 
[   10.788317] Allocated by task 176:
[   10.788640]  kasan_save_stack+0x45/0x70
[   10.788918]  kasan_save_track+0x18/0x40
[   10.789414]  kasan_save_alloc_info+0x3b/0x50
[   10.789806]  __kasan_krealloc+0x190/0x1f0
[   10.790331]  krealloc_noprof+0xf3/0x340
[   10.790749]  krealloc_more_oob_helper+0x1a9/0x930
[   10.791261]  krealloc_more_oob+0x1c/0x30
[   10.791460]  kunit_try_run_case+0x1a5/0x480
[   10.791644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.792194]  kthread+0x337/0x6f0
[   10.792515]  ret_from_fork+0x41/0x80
[   10.792860]  ret_from_fork_asm+0x1a/0x30
[   10.793275] 
[   10.793440] The buggy address belongs to the object at ffff888100355c00
[   10.793440]  which belongs to the cache kmalloc-256 of size 256
[   10.794441] The buggy address is located 0 bytes to the right of
[   10.794441]  allocated 235-byte region [ffff888100355c00, ffff888100355ceb)
[   10.795104] 
[   10.795183] The buggy address belongs to the physical page:
[   10.795580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   10.796142] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.796987] flags: 0x200000000000040(head|node=0|zone=2)
[   10.797552] page_type: f5(slab)
[   10.797693] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.797974] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.798209] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.798444] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.799040] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   10.799771] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.800489] page dumped because: kasan: bad access detected
[   10.801037] 
[   10.801216] Memory state around the buggy address:
[   10.801713]  ffff888100355b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.802492]  ffff888100355c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.803354] >ffff888100355c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.804044]                                                           ^
[   10.804622]  ffff888100355d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.805162]  ffff888100355d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.805387] ==================================================================
[   11.025787] ==================================================================
[   11.026094] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.026335] Write of size 1 at addr ffff888102d6a0f0 by task kunit_try_catch/180
[   11.026577] 
[   11.026675] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   11.027050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.027063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.027083] Call Trace:
[   11.027098]  <TASK>
[   11.027112]  dump_stack_lvl+0x73/0xb0
[   11.027140]  print_report+0xd1/0x650
[   11.027163]  ? __virt_addr_valid+0x1db/0x2d0
[   11.027185]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.027206]  ? kasan_addr_to_slab+0x11/0xa0
[   11.027227]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.027248]  kasan_report+0x141/0x180
[   11.027271]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.027297]  __asan_report_store1_noabort+0x1b/0x30
[   11.027318]  krealloc_more_oob_helper+0x7eb/0x930
[   11.027338]  ? __schedule+0x10cc/0x2b60
[   11.027361]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.027382]  ? finish_task_switch.isra.0+0x153/0x700
[   11.027406]  ? __switch_to+0x5d9/0xf60
[   11.027426]  ? dequeue_task_fair+0x166/0x4e0
[   11.027450]  ? __schedule+0x10cc/0x2b60
[   11.027473]  ? __pfx_read_tsc+0x10/0x10
[   11.027497]  krealloc_large_more_oob+0x1c/0x30
[   11.027518]  kunit_try_run_case+0x1a5/0x480
[   11.027539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.027558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.027592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.027616]  ? __kthread_parkme+0x82/0x180
[   11.027638]  ? preempt_count_sub+0x50/0x80
[   11.027662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.027683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.027706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.027730]  kthread+0x337/0x6f0
[   11.027747]  ? trace_preempt_on+0x20/0xc0
[   11.027771]  ? __pfx_kthread+0x10/0x10
[   11.027789]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.027812]  ? calculate_sigpending+0x7b/0xa0
[   11.027833]  ? __pfx_kthread+0x10/0x10
[   11.027930]  ret_from_fork+0x41/0x80
[   11.027952]  ? __pfx_kthread+0x10/0x10
[   11.027971]  ret_from_fork_asm+0x1a/0x30
[   11.028002]  </TASK>
[   11.028013] 
[   11.039928] The buggy address belongs to the physical page:
[   11.040180] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d68
[   11.041311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.041562] flags: 0x200000000000040(head|node=0|zone=2)
[   11.041740] page_type: f8(unknown)
[   11.041868] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.043492] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.044754] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.046073] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.046779] head: 0200000000000002 ffffea00040b5a01 00000000ffffffff 00000000ffffffff
[   11.047718] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.048515] page dumped because: kasan: bad access detected
[   11.049157] 
[   11.049269] Memory state around the buggy address:
[   11.049488]  ffff888102d69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.049787]  ffff888102d6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.050145] >ffff888102d6a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.050436]                                                              ^
[   11.050741]  ffff888102d6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.051142]  ffff888102d6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.051451] ==================================================================
[   10.806023] ==================================================================
[   10.806639] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.807326] Write of size 1 at addr ffff888100355cf0 by task kunit_try_catch/176
[   10.807979] 
[   10.808152] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   10.808195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.808207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.808228] Call Trace:
[   10.808240]  <TASK>
[   10.808256]  dump_stack_lvl+0x73/0xb0
[   10.808281]  print_report+0xd1/0x650
[   10.808305]  ? __virt_addr_valid+0x1db/0x2d0
[   10.808340]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.808371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.808394]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.808415]  kasan_report+0x141/0x180
[   10.808438]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.808464]  __asan_report_store1_noabort+0x1b/0x30
[   10.808485]  krealloc_more_oob_helper+0x7eb/0x930
[   10.808504]  ? __schedule+0x10cc/0x2b60
[   10.808535]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.808556]  ? finish_task_switch.isra.0+0x153/0x700
[   10.808579]  ? __switch_to+0x5d9/0xf60
[   10.808601]  ? dequeue_task_fair+0x166/0x4e0
[   10.808625]  ? __schedule+0x10cc/0x2b60
[   10.808647]  ? __pfx_read_tsc+0x10/0x10
[   10.808671]  krealloc_more_oob+0x1c/0x30
[   10.808690]  kunit_try_run_case+0x1a5/0x480
[   10.808711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.808730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.808754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.808778]  ? __kthread_parkme+0x82/0x180
[   10.808800]  ? preempt_count_sub+0x50/0x80
[   10.808824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.808854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.808888]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.808912]  kthread+0x337/0x6f0
[   10.808929]  ? trace_preempt_on+0x20/0xc0
[   10.808952]  ? __pfx_kthread+0x10/0x10
[   10.808970]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.809003]  ? calculate_sigpending+0x7b/0xa0
[   10.809025]  ? __pfx_kthread+0x10/0x10
[   10.809043]  ret_from_fork+0x41/0x80
[   10.809065]  ? __pfx_kthread+0x10/0x10
[   10.809083]  ret_from_fork_asm+0x1a/0x30
[   10.809113]  </TASK>
[   10.809124] 
[   10.822403] Allocated by task 176:
[   10.822556]  kasan_save_stack+0x45/0x70
[   10.822708]  kasan_save_track+0x18/0x40
[   10.822858]  kasan_save_alloc_info+0x3b/0x50
[   10.823036]  __kasan_krealloc+0x190/0x1f0
[   10.823182]  krealloc_noprof+0xf3/0x340
[   10.823321]  krealloc_more_oob_helper+0x1a9/0x930
[   10.823478]  krealloc_more_oob+0x1c/0x30
[   10.823634]  kunit_try_run_case+0x1a5/0x480
[   10.823781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.823968]  kthread+0x337/0x6f0
[   10.824090]  ret_from_fork+0x41/0x80
[   10.824401]  ret_from_fork_asm+0x1a/0x30
[   10.824720] 
[   10.824803] The buggy address belongs to the object at ffff888100355c00
[   10.824803]  which belongs to the cache kmalloc-256 of size 256
[   10.825244] The buggy address is located 5 bytes to the right of
[   10.825244]  allocated 235-byte region [ffff888100355c00, ffff888100355ceb)
[   10.826143] 
[   10.826309] The buggy address belongs to the physical page:
[   10.826813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   10.827601] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.828367] flags: 0x200000000000040(head|node=0|zone=2)
[   10.828850] page_type: f5(slab)
[   10.829236] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.830026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.830263] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.830531] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.830997] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   10.831702] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.832455] page dumped because: kasan: bad access detected
[   10.832790] 
[   10.832882] Memory state around the buggy address:
[   10.833349]  ffff888100355b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.834051]  ffff888100355c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.834450] >ffff888100355c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.834676]                                                              ^
[   10.834910]  ffff888100355d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.835265]  ffff888100355d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.835952] ==================================================================
[   10.998620] ==================================================================
[   10.999107] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.999418] Write of size 1 at addr ffff888102d6a0eb by task kunit_try_catch/180
[   10.999896] 
[   11.000054] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   11.000104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.000116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.000139] Call Trace:
[   11.000151]  <TASK>
[   11.000167]  dump_stack_lvl+0x73/0xb0
[   11.000196]  print_report+0xd1/0x650
[   11.000220]  ? __virt_addr_valid+0x1db/0x2d0
[   11.000242]  ? krealloc_more_oob_helper+0x821/0x930
[   11.000262]  ? kasan_addr_to_slab+0x11/0xa0
[   11.000284]  ? krealloc_more_oob_helper+0x821/0x930
[   11.000305]  kasan_report+0x141/0x180
[   11.000327]  ? krealloc_more_oob_helper+0x821/0x930
[   11.000353]  __asan_report_store1_noabort+0x1b/0x30
[   11.000374]  krealloc_more_oob_helper+0x821/0x930
[   11.000394]  ? __schedule+0x10cc/0x2b60
[   11.000418]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.000439]  ? finish_task_switch.isra.0+0x153/0x700
[   11.000464]  ? __switch_to+0x5d9/0xf60
[   11.000484]  ? dequeue_task_fair+0x166/0x4e0
[   11.000508]  ? __schedule+0x10cc/0x2b60
[   11.000532]  ? __pfx_read_tsc+0x10/0x10
[   11.000555]  krealloc_large_more_oob+0x1c/0x30
[   11.000575]  kunit_try_run_case+0x1a5/0x480
[   11.000597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.000616]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.000641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.000665]  ? __kthread_parkme+0x82/0x180
[   11.000687]  ? preempt_count_sub+0x50/0x80
[   11.000711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.000732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.000756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.000779]  kthread+0x337/0x6f0
[   11.000797]  ? trace_preempt_on+0x20/0xc0
[   11.000821]  ? __pfx_kthread+0x10/0x10
[   11.000853]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.000888]  ? calculate_sigpending+0x7b/0xa0
[   11.000910]  ? __pfx_kthread+0x10/0x10
[   11.000929]  ret_from_fork+0x41/0x80
[   11.000949]  ? __pfx_kthread+0x10/0x10
[   11.000967]  ret_from_fork_asm+0x1a/0x30
[   11.000999]  </TASK>
[   11.001010] 
[   11.014428] The buggy address belongs to the physical page:
[   11.015141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d68
[   11.015870] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.016570] flags: 0x200000000000040(head|node=0|zone=2)
[   11.016957] page_type: f8(unknown)
[   11.017309] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.017559] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.018443] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.019306] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.019721] head: 0200000000000002 ffffea00040b5a01 00000000ffffffff 00000000ffffffff
[   11.020464] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.021136] page dumped because: kasan: bad access detected
[   11.021491] 
[   11.021582] Memory state around the buggy address:
[   11.022060]  ffff888102d69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.022393]  ffff888102d6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.022791] >ffff888102d6a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.023499]                                                           ^
[   11.024186]  ffff888102d6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.024502]  ffff888102d6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.025200] ==================================================================