Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.072619] ==================================================================
[   17.073343] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.073500] Write of size 1 at addr fff00000c788e0eb by task kunit_try_catch/162
[   17.073553] 
[   17.073600] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   17.073680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.073706] Hardware name: linux,dummy-virt (DT)
[   17.074053] Call trace:
[   17.074096]  show_stack+0x20/0x38 (C)
[   17.074148]  dump_stack_lvl+0x8c/0xd0
[   17.074195]  print_report+0x118/0x5d0
[   17.074755]  kasan_report+0xdc/0x128
[   17.074878]  __asan_report_store1_noabort+0x20/0x30
[   17.074975]  krealloc_more_oob_helper+0x60c/0x678
[   17.075127]  krealloc_large_more_oob+0x20/0x38
[   17.075223]  kunit_try_run_case+0x170/0x3f0
[   17.075371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.075678]  kthread+0x328/0x630
[   17.075791]  ret_from_fork+0x10/0x20
[   17.075905] 
[   17.075946] The buggy address belongs to the physical page:
[   17.075979] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c
[   17.076031] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.076077] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.076128] page_type: f8(unknown)
[   17.076167] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.076231] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.076322] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.076636] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.076693] head: 0bfffe0000000002 ffffc1ffc31e2301 00000000ffffffff 00000000ffffffff
[   17.077109] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.077203] page dumped because: kasan: bad access detected
[   17.077596] 
[   17.077641] Memory state around the buggy address:
[   17.077692]  fff00000c788df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.077805]  fff00000c788e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.077890] >fff00000c788e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.077968]                                                           ^
[   17.078252]  fff00000c788e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.078525]  fff00000c788e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.078596] ==================================================================
[   17.079707] ==================================================================
[   17.079865] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.079930] Write of size 1 at addr fff00000c788e0f0 by task kunit_try_catch/162
[   17.079978] 
[   17.080006] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   17.080381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.080407] Hardware name: linux,dummy-virt (DT)
[   17.080436] Call trace:
[   17.080457]  show_stack+0x20/0x38 (C)
[   17.081342]  dump_stack_lvl+0x8c/0xd0
[   17.081437]  print_report+0x118/0x5d0
[   17.081508]  kasan_report+0xdc/0x128
[   17.081566]  __asan_report_store1_noabort+0x20/0x30
[   17.081928]  krealloc_more_oob_helper+0x5c0/0x678
[   17.082535]  krealloc_large_more_oob+0x20/0x38
[   17.082631]  kunit_try_run_case+0x170/0x3f0
[   17.082683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.082744]  kthread+0x328/0x630
[   17.082896]  ret_from_fork+0x10/0x20
[   17.083058] 
[   17.083133] The buggy address belongs to the physical page:
[   17.083306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c
[   17.083439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.083604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.083655] page_type: f8(unknown)
[   17.083698] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.083746] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.083793] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.083849] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.083896] head: 0bfffe0000000002 ffffc1ffc31e2301 00000000ffffffff 00000000ffffffff
[   17.083943] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.083982] page dumped because: kasan: bad access detected
[   17.084022] 
[   17.084049] Memory state around the buggy address:
[   17.084078]  fff00000c788df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.084119]  fff00000c788e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.084169] >fff00000c788e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.084211]                                                              ^
[   17.084251]  fff00000c788e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.084549]  fff00000c788e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.084990] ==================================================================
[   16.985608] ==================================================================
[   16.985670] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.985724] Write of size 1 at addr fff00000c09232eb by task kunit_try_catch/158
[   16.986191] 
[   16.986243] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   16.986703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.986834] Hardware name: linux,dummy-virt (DT)
[   16.987004] Call trace:
[   16.987213]  show_stack+0x20/0x38 (C)
[   16.987390]  dump_stack_lvl+0x8c/0xd0
[   16.987477]  print_report+0x118/0x5d0
[   16.987570]  kasan_report+0xdc/0x128
[   16.987757]  __asan_report_store1_noabort+0x20/0x30
[   16.987948]  krealloc_more_oob_helper+0x60c/0x678
[   16.988197]  krealloc_more_oob+0x20/0x38
[   16.988250]  kunit_try_run_case+0x170/0x3f0
[   16.988633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.988724]  kthread+0x328/0x630
[   16.989106]  ret_from_fork+0x10/0x20
[   16.989394] 
[   16.989472] Allocated by task 158:
[   16.989895]  kasan_save_stack+0x3c/0x68
[   16.990119]  kasan_save_track+0x20/0x40
[   16.990295]  kasan_save_alloc_info+0x40/0x58
[   16.990546]  __kasan_krealloc+0x118/0x178
[   16.990814]  krealloc_noprof+0x128/0x360
[   16.990951]  krealloc_more_oob_helper+0x168/0x678
[   16.990992]  krealloc_more_oob+0x20/0x38
[   16.991038]  kunit_try_run_case+0x170/0x3f0
[   16.991077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.991587]  kthread+0x328/0x630
[   16.991643]  ret_from_fork+0x10/0x20
[   16.991820] 
[   16.991910] The buggy address belongs to the object at fff00000c0923200
[   16.991910]  which belongs to the cache kmalloc-256 of size 256
[   16.992084] The buggy address is located 0 bytes to the right of
[   16.992084]  allocated 235-byte region [fff00000c0923200, fff00000c09232eb)
[   16.992535] 
[   16.992632] The buggy address belongs to the physical page:
[   16.992722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922
[   16.992794] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.993111] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.993360] page_type: f5(slab)
[   16.993443] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.993548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.993635] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.993892] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.993952] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff
[   16.994093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.994187] page dumped because: kasan: bad access detected
[   16.994235] 
[   16.994253] Memory state around the buggy address:
[   16.994304]  fff00000c0923180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.994350]  fff00000c0923200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.994400] >fff00000c0923280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.994446]                                                           ^
[   16.994485]  fff00000c0923300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.994534]  fff00000c0923380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.994571] ==================================================================
[   16.995182] ==================================================================
[   16.995241] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.995304] Write of size 1 at addr fff00000c09232f0 by task kunit_try_catch/158
[   16.995351] 
[   16.996104] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   16.996199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.996225] Hardware name: linux,dummy-virt (DT)
[   16.996255] Call trace:
[   16.996505]  show_stack+0x20/0x38 (C)
[   16.996580]  dump_stack_lvl+0x8c/0xd0
[   16.996691]  print_report+0x118/0x5d0
[   16.996849]  kasan_report+0xdc/0x128
[   16.997208]  __asan_report_store1_noabort+0x20/0x30
[   16.997343]  krealloc_more_oob_helper+0x5c0/0x678
[   16.997418]  krealloc_more_oob+0x20/0x38
[   16.997476]  kunit_try_run_case+0x170/0x3f0
[   16.997604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.997658]  kthread+0x328/0x630
[   16.997731]  ret_from_fork+0x10/0x20
[   16.997786] 
[   16.997804] Allocated by task 158:
[   16.997830]  kasan_save_stack+0x3c/0x68
[   16.997868]  kasan_save_track+0x20/0x40
[   16.997901]  kasan_save_alloc_info+0x40/0x58
[   16.997938]  __kasan_krealloc+0x118/0x178
[   16.997972]  krealloc_noprof+0x128/0x360
[   16.998007]  krealloc_more_oob_helper+0x168/0x678
[   16.998043]  krealloc_more_oob+0x20/0x38
[   16.998547]  kunit_try_run_case+0x170/0x3f0
[   16.998612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.998653]  kthread+0x328/0x630
[   16.999191]  ret_from_fork+0x10/0x20
[   16.999273] 
[   16.999322] The buggy address belongs to the object at fff00000c0923200
[   16.999322]  which belongs to the cache kmalloc-256 of size 256
[   16.999546] The buggy address is located 5 bytes to the right of
[   16.999546]  allocated 235-byte region [fff00000c0923200, fff00000c09232eb)
[   16.999775] 
[   17.000015] The buggy address belongs to the physical page:
[   17.000099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922
[   17.000233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.000358] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.000445] page_type: f5(slab)
[   17.000560] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.000610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.000893] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.000988] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.001065] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff
[   17.001443] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.001672] page dumped because: kasan: bad access detected
[   17.001774] 
[   17.001880] Memory state around the buggy address:
[   17.001966]  fff00000c0923180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.002189]  fff00000c0923200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.002376] >fff00000c0923280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.002557]                                                              ^
[   17.002690]  fff00000c0923300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.002768]  fff00000c0923380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.002876] ==================================================================

[   10.654623] ==================================================================
[   10.655433] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.655882] Write of size 1 at addr ffff888100a9caeb by task kunit_try_catch/176
[   10.656180] 
[   10.656297] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.656342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.656570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.656599] Call Trace:
[   10.656611]  <TASK>
[   10.656626]  dump_stack_lvl+0x73/0xb0
[   10.656653]  print_report+0xd1/0x610
[   10.657239]  ? __virt_addr_valid+0x1db/0x2d0
[   10.657269]  ? krealloc_more_oob_helper+0x821/0x930
[   10.657290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.657312]  ? krealloc_more_oob_helper+0x821/0x930
[   10.657332]  kasan_report+0x141/0x180
[   10.657355]  ? krealloc_more_oob_helper+0x821/0x930
[   10.657380]  __asan_report_store1_noabort+0x1b/0x30
[   10.657400]  krealloc_more_oob_helper+0x821/0x930
[   10.657418]  ? __schedule+0x10c6/0x2b60
[   10.657441]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.657461]  ? finish_task_switch.isra.0+0x153/0x700
[   10.657483]  ? __switch_to+0x5d9/0xf60
[   10.657505]  ? dequeue_task_fair+0x166/0x4e0
[   10.657528]  ? __schedule+0x10c6/0x2b60
[   10.657550]  ? __pfx_read_tsc+0x10/0x10
[   10.657573]  krealloc_more_oob+0x1c/0x30
[   10.657591]  kunit_try_run_case+0x1a5/0x480
[   10.657611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.657630]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.657649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.657673]  ? __kthread_parkme+0x82/0x180
[   10.657693]  ? preempt_count_sub+0x50/0x80
[   10.657716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.657736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.657758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.657780]  kthread+0x337/0x6f0
[   10.657796]  ? trace_preempt_on+0x20/0xc0
[   10.657819]  ? __pfx_kthread+0x10/0x10
[   10.657836]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.657857]  ? calculate_sigpending+0x7b/0xa0
[   10.657878]  ? __pfx_kthread+0x10/0x10
[   10.657895]  ret_from_fork+0x41/0x80
[   10.657916]  ? __pfx_kthread+0x10/0x10
[   10.657933]  ret_from_fork_asm+0x1a/0x30
[   10.657963]  </TASK>
[   10.657973] 
[   10.671211] Allocated by task 176:
[   10.671605]  kasan_save_stack+0x45/0x70
[   10.671886]  kasan_save_track+0x18/0x40
[   10.672071]  kasan_save_alloc_info+0x3b/0x50
[   10.672275]  __kasan_krealloc+0x190/0x1f0
[   10.672868]  krealloc_noprof+0xf3/0x340
[   10.673386]  krealloc_more_oob_helper+0x1a9/0x930
[   10.673748]  krealloc_more_oob+0x1c/0x30
[   10.674086]  kunit_try_run_case+0x1a5/0x480
[   10.674303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.674832]  kthread+0x337/0x6f0
[   10.675063]  ret_from_fork+0x41/0x80
[   10.675254]  ret_from_fork_asm+0x1a/0x30
[   10.675503] 
[   10.675595] The buggy address belongs to the object at ffff888100a9ca00
[   10.675595]  which belongs to the cache kmalloc-256 of size 256
[   10.676627] The buggy address is located 0 bytes to the right of
[   10.676627]  allocated 235-byte region [ffff888100a9ca00, ffff888100a9caeb)
[   10.677331] 
[   10.677497] The buggy address belongs to the physical page:
[   10.678204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9c
[   10.678949] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.679283] flags: 0x200000000000040(head|node=0|zone=2)
[   10.679685] page_type: f5(slab)
[   10.679845] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.680154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.681094] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.681779] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.682308] head: 0200000000000001 ffffea000402a701 00000000ffffffff 00000000ffffffff
[   10.683149] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.683577] page dumped because: kasan: bad access detected
[   10.684076] 
[   10.684175] Memory state around the buggy address:
[   10.684600]  ffff888100a9c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.685057]  ffff888100a9ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.685354] >ffff888100a9ca80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.685647]                                                           ^
[   10.686014]  ffff888100a9cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.686310]  ffff888100a9cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.687183] ==================================================================
[   10.876805] ==================================================================
[   10.877159] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.877576] Write of size 1 at addr ffff888103c860f0 by task kunit_try_catch/180
[   10.878179] 
[   10.878314] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.878372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.878468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.878488] Call Trace:
[   10.878500]  <TASK>
[   10.878516]  dump_stack_lvl+0x73/0xb0
[   10.878555]  print_report+0xd1/0x610
[   10.878578]  ? __virt_addr_valid+0x1db/0x2d0
[   10.878599]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.878646]  ? kasan_addr_to_slab+0x11/0xa0
[   10.878666]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.878685]  kasan_report+0x141/0x180
[   10.878718]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.878802]  __asan_report_store1_noabort+0x1b/0x30
[   10.878859]  krealloc_more_oob_helper+0x7eb/0x930
[   10.878878]  ? __schedule+0x10c6/0x2b60
[   10.878930]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.878951]  ? finish_task_switch.isra.0+0x153/0x700
[   10.878975]  ? __switch_to+0x5d9/0xf60
[   10.878995]  ? dequeue_task_fair+0x166/0x4e0
[   10.879019]  ? __schedule+0x10c6/0x2b60
[   10.879041]  ? __pfx_read_tsc+0x10/0x10
[   10.879064]  krealloc_large_more_oob+0x1c/0x30
[   10.879082]  kunit_try_run_case+0x1a5/0x480
[   10.879103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.879121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.879141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.879189]  ? __kthread_parkme+0x82/0x180
[   10.879211]  ? preempt_count_sub+0x50/0x80
[   10.879251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.879270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.879293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.879316]  kthread+0x337/0x6f0
[   10.879332]  ? trace_preempt_on+0x20/0xc0
[   10.879389]  ? __pfx_kthread+0x10/0x10
[   10.879407]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.879428]  ? calculate_sigpending+0x7b/0xa0
[   10.879460]  ? __pfx_kthread+0x10/0x10
[   10.879477]  ret_from_fork+0x41/0x80
[   10.879498]  ? __pfx_kthread+0x10/0x10
[   10.879515]  ret_from_fork_asm+0x1a/0x30
[   10.879545]  </TASK>
[   10.879554] 
[   10.890023] The buggy address belongs to the physical page:
[   10.890565] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c84
[   10.891041] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.891359] flags: 0x200000000000040(head|node=0|zone=2)
[   10.891651] page_type: f8(unknown)
[   10.892028] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.892360] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.892745] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.893108] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.893519] head: 0200000000000002 ffffea00040f2101 00000000ffffffff 00000000ffffffff
[   10.893925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.894470] page dumped because: kasan: bad access detected
[   10.894822] 
[   10.894916] Memory state around the buggy address:
[   10.895218]  ffff888103c85f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.895574]  ffff888103c86000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.895897] >ffff888103c86080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   10.896208]                                                              ^
[   10.896453]  ffff888103c86100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.897080]  ffff888103c86180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.897328] ==================================================================
[   10.689534] ==================================================================
[   10.689963] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.690302] Write of size 1 at addr ffff888100a9caf0 by task kunit_try_catch/176
[   10.690574] 
[   10.690733] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.690778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.690789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.690809] Call Trace:
[   10.690826]  <TASK>
[   10.690841]  dump_stack_lvl+0x73/0xb0
[   10.690866]  print_report+0xd1/0x610
[   10.690887]  ? __virt_addr_valid+0x1db/0x2d0
[   10.690908]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.690926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.690948]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.690968]  kasan_report+0x141/0x180
[   10.690989]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.691014]  __asan_report_store1_noabort+0x1b/0x30
[   10.691034]  krealloc_more_oob_helper+0x7eb/0x930
[   10.691052]  ? __schedule+0x10c6/0x2b60
[   10.691075]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.691095]  ? finish_task_switch.isra.0+0x153/0x700
[   10.691117]  ? __switch_to+0x5d9/0xf60
[   10.691136]  ? dequeue_task_fair+0x166/0x4e0
[   10.691160]  ? __schedule+0x10c6/0x2b60
[   10.691181]  ? __pfx_read_tsc+0x10/0x10
[   10.691204]  krealloc_more_oob+0x1c/0x30
[   10.691221]  kunit_try_run_case+0x1a5/0x480
[   10.691254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.691283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.691303]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.691326]  ? __kthread_parkme+0x82/0x180
[   10.691347]  ? preempt_count_sub+0x50/0x80
[   10.691379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.691399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.691421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.691443]  kthread+0x337/0x6f0
[   10.691459]  ? trace_preempt_on+0x20/0xc0
[   10.691481]  ? __pfx_kthread+0x10/0x10
[   10.691498]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.691520]  ? calculate_sigpending+0x7b/0xa0
[   10.691540]  ? __pfx_kthread+0x10/0x10
[   10.691558]  ret_from_fork+0x41/0x80
[   10.691577]  ? __pfx_kthread+0x10/0x10
[   10.691595]  ret_from_fork_asm+0x1a/0x30
[   10.691626]  </TASK>
[   10.691635] 
[   10.702461] Allocated by task 176:
[   10.702894]  kasan_save_stack+0x45/0x70
[   10.703190]  kasan_save_track+0x18/0x40
[   10.703490]  kasan_save_alloc_info+0x3b/0x50
[   10.703959]  __kasan_krealloc+0x190/0x1f0
[   10.704320]  krealloc_noprof+0xf3/0x340
[   10.704541]  krealloc_more_oob_helper+0x1a9/0x930
[   10.705031]  krealloc_more_oob+0x1c/0x30
[   10.705181]  kunit_try_run_case+0x1a5/0x480
[   10.705489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.705970]  kthread+0x337/0x6f0
[   10.706152]  ret_from_fork+0x41/0x80
[   10.706428]  ret_from_fork_asm+0x1a/0x30
[   10.706579] 
[   10.706672] The buggy address belongs to the object at ffff888100a9ca00
[   10.706672]  which belongs to the cache kmalloc-256 of size 256
[   10.707760] The buggy address is located 5 bytes to the right of
[   10.707760]  allocated 235-byte region [ffff888100a9ca00, ffff888100a9caeb)
[   10.708313] 
[   10.708530] The buggy address belongs to the physical page:
[   10.708713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9c
[   10.709141] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.709646] flags: 0x200000000000040(head|node=0|zone=2)
[   10.709859] page_type: f5(slab)
[   10.710036] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.710338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.710650] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.710973] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.711345] head: 0200000000000001 ffffea000402a701 00000000ffffffff 00000000ffffffff
[   10.711648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.712092] page dumped because: kasan: bad access detected
[   10.712300] 
[   10.712380] Memory state around the buggy address:
[   10.712604]  ffff888100a9c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.713036]  ffff888100a9ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.713337] >ffff888100a9ca80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.713570]                                                              ^
[   10.714001]  ffff888100a9cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.714289]  ffff888100a9cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.714687] ==================================================================
[   10.851843] ==================================================================
[   10.853069] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.853916] Write of size 1 at addr ffff888103c860eb by task kunit_try_catch/180
[   10.854622] 
[   10.854719] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.854765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.854776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.854798] Call Trace:
[   10.854811]  <TASK>
[   10.854828]  dump_stack_lvl+0x73/0xb0
[   10.854859]  print_report+0xd1/0x610
[   10.854910]  ? __virt_addr_valid+0x1db/0x2d0
[   10.854934]  ? krealloc_more_oob_helper+0x821/0x930
[   10.854953]  ? kasan_addr_to_slab+0x11/0xa0
[   10.855019]  ? krealloc_more_oob_helper+0x821/0x930
[   10.855067]  kasan_report+0x141/0x180
[   10.855102]  ? krealloc_more_oob_helper+0x821/0x930
[   10.855126]  __asan_report_store1_noabort+0x1b/0x30
[   10.855146]  krealloc_more_oob_helper+0x821/0x930
[   10.855165]  ? __schedule+0x10c6/0x2b60
[   10.855190]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.855211]  ? finish_task_switch.isra.0+0x153/0x700
[   10.855244]  ? __switch_to+0x5d9/0xf60
[   10.855265]  ? dequeue_task_fair+0x166/0x4e0
[   10.855289]  ? __schedule+0x10c6/0x2b60
[   10.855310]  ? __pfx_read_tsc+0x10/0x10
[   10.855334]  krealloc_large_more_oob+0x1c/0x30
[   10.855358]  kunit_try_run_case+0x1a5/0x480
[   10.855380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.855398]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.855419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.855442]  ? __kthread_parkme+0x82/0x180
[   10.855464]  ? preempt_count_sub+0x50/0x80
[   10.855487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.855507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.855529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.855551]  kthread+0x337/0x6f0
[   10.855569]  ? trace_preempt_on+0x20/0xc0
[   10.855592]  ? __pfx_kthread+0x10/0x10
[   10.855610]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.855631]  ? calculate_sigpending+0x7b/0xa0
[   10.855654]  ? __pfx_kthread+0x10/0x10
[   10.855672]  ret_from_fork+0x41/0x80
[   10.855692]  ? __pfx_kthread+0x10/0x10
[   10.855709]  ret_from_fork_asm+0x1a/0x30
[   10.855740]  </TASK>
[   10.855751] 
[   10.868643] The buggy address belongs to the physical page:
[   10.868876] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c84
[   10.869304] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.869969] flags: 0x200000000000040(head|node=0|zone=2)
[   10.870155] page_type: f8(unknown)
[   10.870353] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.870858] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.871248] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.871521] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.872081] head: 0200000000000002 ffffea00040f2101 00000000ffffffff 00000000ffffffff
[   10.872482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.872895] page dumped because: kasan: bad access detected
[   10.873205] 
[   10.873343] Memory state around the buggy address:
[   10.873883]  ffff888103c85f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.874272]  ffff888103c86000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.874649] >ffff888103c86080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   10.874940]                                                           ^
[   10.875244]  ffff888103c86100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.875662]  ffff888103c86180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.875949] ==================================================================