Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.679500] ==================================================================
[   16.679928] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.680142] Write of size 1 at addr fff00000c78060eb by task kunit_try_catch/160
[   16.680207] 
[   16.680242] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.680322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.680347] Hardware name: linux,dummy-virt (DT)
[   16.680377] Call trace:
[   16.680708]  show_stack+0x20/0x38 (C)
[   16.680931]  dump_stack_lvl+0x8c/0xd0
[   16.680986]  print_report+0x118/0x608
[   16.681382]  kasan_report+0xdc/0x128
[   16.681479]  __asan_report_store1_noabort+0x20/0x30
[   16.681567]  krealloc_more_oob_helper+0x60c/0x678
[   16.681764]  krealloc_large_more_oob+0x20/0x38
[   16.681963]  kunit_try_run_case+0x170/0x3f0
[   16.682202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.682390]  kthread+0x328/0x630
[   16.682767]  ret_from_fork+0x10/0x20
[   16.683146] 
[   16.683203] The buggy address belongs to the physical page:
[   16.683243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804
[   16.683655] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.683769] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.683893] page_type: f8(unknown)
[   16.684363] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.684462] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.684528] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.684738] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.684998] head: 0bfffe0000000002 ffffc1ffc31e0101 00000000ffffffff 00000000ffffffff
[   16.685087] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.685132] page dumped because: kasan: bad access detected
[   16.685162] 
[   16.685360] Memory state around the buggy address:
[   16.685455]  fff00000c7805f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.685664]  fff00000c7806000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.685759] >fff00000c7806080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.685811]                                                           ^
[   16.685978]  fff00000c7806100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.686191]  fff00000c7806180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.686348] ==================================================================
[   16.600282] ==================================================================
[   16.600423] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.600523] Write of size 1 at addr fff00000c59ab2eb by task kunit_try_catch/156
[   16.600583] 
[   16.600678] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.600758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.600784] Hardware name: linux,dummy-virt (DT)
[   16.601039] Call trace:
[   16.601198]  show_stack+0x20/0x38 (C)
[   16.601291]  dump_stack_lvl+0x8c/0xd0
[   16.601349]  print_report+0x118/0x608
[   16.601396]  kasan_report+0xdc/0x128
[   16.601498]  __asan_report_store1_noabort+0x20/0x30
[   16.601552]  krealloc_more_oob_helper+0x60c/0x678
[   16.601599]  krealloc_more_oob+0x20/0x38
[   16.601658]  kunit_try_run_case+0x170/0x3f0
[   16.601704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.601755]  kthread+0x328/0x630
[   16.601807]  ret_from_fork+0x10/0x20
[   16.601863] 
[   16.601896] Allocated by task 156:
[   16.601939]  kasan_save_stack+0x3c/0x68
[   16.601993]  kasan_save_track+0x20/0x40
[   16.602037]  kasan_save_alloc_info+0x40/0x58
[   16.602076]  __kasan_krealloc+0x118/0x178
[   16.602120]  krealloc_noprof+0x128/0x360
[   16.602161]  krealloc_more_oob_helper+0x168/0x678
[   16.602214]  krealloc_more_oob+0x20/0x38
[   16.602257]  kunit_try_run_case+0x170/0x3f0
[   16.602293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.602334]  kthread+0x328/0x630
[   16.602380]  ret_from_fork+0x10/0x20
[   16.602431] 
[   16.602451] The buggy address belongs to the object at fff00000c59ab200
[   16.602451]  which belongs to the cache kmalloc-256 of size 256
[   16.602514] The buggy address is located 0 bytes to the right of
[   16.602514]  allocated 235-byte region [fff00000c59ab200, fff00000c59ab2eb)
[   16.602574] 
[   16.602593] The buggy address belongs to the physical page:
[   16.602624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa
[   16.602693] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.602752] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.602803] page_type: f5(slab)
[   16.602863] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.602921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.602968] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.603025] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.603282] head: 0bfffe0000000001 ffffc1ffc3166a81 00000000ffffffff 00000000ffffffff
[   16.603898] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.603960] page dumped because: kasan: bad access detected
[   16.604214] 
[   16.604264] Memory state around the buggy address:
[   16.604543]  fff00000c59ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.604648]  fff00000c59ab200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.604694] >fff00000c59ab280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.605668]                                                           ^
[   16.605741]  fff00000c59ab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605876]  fff00000c59ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605945] ==================================================================
[   16.691532] ==================================================================
[   16.691584] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.691633] Write of size 1 at addr fff00000c78060f0 by task kunit_try_catch/160
[   16.691681] 
[   16.691711] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.691787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.691832] Hardware name: linux,dummy-virt (DT)
[   16.691867] Call trace:
[   16.691889]  show_stack+0x20/0x38 (C)
[   16.691936]  dump_stack_lvl+0x8c/0xd0
[   16.691980]  print_report+0x118/0x608
[   16.692049]  kasan_report+0xdc/0x128
[   16.692096]  __asan_report_store1_noabort+0x20/0x30
[   16.692143]  krealloc_more_oob_helper+0x5c0/0x678
[   16.692201]  krealloc_large_more_oob+0x20/0x38
[   16.692247]  kunit_try_run_case+0x170/0x3f0
[   16.692292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.692342]  kthread+0x328/0x630
[   16.692382]  ret_from_fork+0x10/0x20
[   16.692428] 
[   16.692453] The buggy address belongs to the physical page:
[   16.692482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804
[   16.693152] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.693250] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.693615] page_type: f8(unknown)
[   16.693934] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.694100] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.694244] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.694367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.694471] head: 0bfffe0000000002 ffffc1ffc31e0101 00000000ffffffff 00000000ffffffff
[   16.694526] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.694731] page dumped because: kasan: bad access detected
[   16.694938] 
[   16.694959] Memory state around the buggy address:
[   16.695023]  fff00000c7805f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.695456]  fff00000c7806000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.695543] >fff00000c7806080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.695701]                                                              ^
[   16.695810]  fff00000c7806100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.695926]  fff00000c7806180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.696128] ==================================================================
[   16.606911] ==================================================================
[   16.607362] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.607430] Write of size 1 at addr fff00000c59ab2f0 by task kunit_try_catch/156
[   16.607717] 
[   16.607811] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.608151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.608272] Hardware name: linux,dummy-virt (DT)
[   16.608456] Call trace:
[   16.608483]  show_stack+0x20/0x38 (C)
[   16.608770]  dump_stack_lvl+0x8c/0xd0
[   16.608830]  print_report+0x118/0x608
[   16.608875]  kasan_report+0xdc/0x128
[   16.608919]  __asan_report_store1_noabort+0x20/0x30
[   16.608964]  krealloc_more_oob_helper+0x5c0/0x678
[   16.609340]  krealloc_more_oob+0x20/0x38
[   16.609440]  kunit_try_run_case+0x170/0x3f0
[   16.609691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.609948]  kthread+0x328/0x630
[   16.610327]  ret_from_fork+0x10/0x20
[   16.610558] 
[   16.610625] Allocated by task 156:
[   16.610799]  kasan_save_stack+0x3c/0x68
[   16.610915]  kasan_save_track+0x20/0x40
[   16.611243]  kasan_save_alloc_info+0x40/0x58
[   16.611336]  __kasan_krealloc+0x118/0x178
[   16.611381]  krealloc_noprof+0x128/0x360
[   16.611562]  krealloc_more_oob_helper+0x168/0x678
[   16.611655]  krealloc_more_oob+0x20/0x38
[   16.611863]  kunit_try_run_case+0x170/0x3f0
[   16.611908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.611995]  kthread+0x328/0x630
[   16.612181]  ret_from_fork+0x10/0x20
[   16.612363] 
[   16.612503] The buggy address belongs to the object at fff00000c59ab200
[   16.612503]  which belongs to the cache kmalloc-256 of size 256
[   16.612587] The buggy address is located 5 bytes to the right of
[   16.612587]  allocated 235-byte region [fff00000c59ab200, fff00000c59ab2eb)
[   16.612676] 
[   16.612705] The buggy address belongs to the physical page:
[   16.613060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa
[   16.613143] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.613272] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.613348] page_type: f5(slab)
[   16.613539] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.613653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.613933] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.614071] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.614655] head: 0bfffe0000000001 ffffc1ffc3166a81 00000000ffffffff 00000000ffffffff
[   16.614801] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.615010] page dumped because: kasan: bad access detected
[   16.615074] 
[   16.615092] Memory state around the buggy address:
[   16.615268]  fff00000c59ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.615472]  fff00000c59ab200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.615578] >fff00000c59ab280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.615618]                                                              ^
[   16.615686]  fff00000c59ab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.615877]  fff00000c59ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.616056] ==================================================================

[   11.273264] ==================================================================
[   11.274298] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.274830] Write of size 1 at addr ffff8881029fe0eb by task kunit_try_catch/178
[   11.275058] 
[   11.275160] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.275215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.275227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.275247] Call Trace:
[   11.275260]  <TASK>
[   11.275276]  dump_stack_lvl+0x73/0xb0
[   11.275304]  print_report+0xd1/0x650
[   11.275327]  ? __virt_addr_valid+0x1db/0x2d0
[   11.275349]  ? krealloc_more_oob_helper+0x821/0x930
[   11.275372]  ? kasan_addr_to_slab+0x11/0xa0
[   11.275391]  ? krealloc_more_oob_helper+0x821/0x930
[   11.275414]  kasan_report+0x141/0x180
[   11.275435]  ? krealloc_more_oob_helper+0x821/0x930
[   11.275462]  __asan_report_store1_noabort+0x1b/0x30
[   11.275482]  krealloc_more_oob_helper+0x821/0x930
[   11.275503]  ? __schedule+0x10cc/0x2b60
[   11.275524]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.275547]  ? finish_task_switch.isra.0+0x153/0x700
[   11.275569]  ? __switch_to+0x47/0xf50
[   11.275593]  ? __schedule+0x10cc/0x2b60
[   11.275613]  ? __pfx_read_tsc+0x10/0x10
[   11.275637]  krealloc_large_more_oob+0x1c/0x30
[   11.275659]  kunit_try_run_case+0x1a5/0x480
[   11.275683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.275705]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.275727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.275749]  ? __kthread_parkme+0x82/0x180
[   11.275769]  ? preempt_count_sub+0x50/0x80
[   11.275791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.275813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.275834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.275856]  kthread+0x337/0x6f0
[   11.275874]  ? trace_preempt_on+0x20/0xc0
[   11.275897]  ? __pfx_kthread+0x10/0x10
[   11.275917]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.275937]  ? calculate_sigpending+0x7b/0xa0
[   11.275960]  ? __pfx_kthread+0x10/0x10
[   11.275980]  ret_from_fork+0x116/0x1d0
[   11.275997]  ? __pfx_kthread+0x10/0x10
[   11.276017]  ret_from_fork_asm+0x1a/0x30
[   11.276046]  </TASK>
[   11.276057] 
[   11.284061] The buggy address belongs to the physical page:
[   11.284315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fc
[   11.284695] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.285069] flags: 0x200000000000040(head|node=0|zone=2)
[   11.285316] page_type: f8(unknown)
[   11.285505] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.285738] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.286133] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.286508] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.286942] head: 0200000000000002 ffffea00040a7f01 00000000ffffffff 00000000ffffffff
[   11.287310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.287540] page dumped because: kasan: bad access detected
[   11.287936] 
[   11.288122] Memory state around the buggy address:
[   11.288322]  ffff8881029fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.288598]  ffff8881029fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.288817] >ffff8881029fe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.289034]                                                           ^
[   11.289407]  ffff8881029fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.289746]  ffff8881029fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.290031] ==================================================================
[   11.090875] ==================================================================
[   11.091481] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.091833] Write of size 1 at addr ffff888100aa82f0 by task kunit_try_catch/174
[   11.092253] 
[   11.092347] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.092387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.092397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.092416] Call Trace:
[   11.092430]  <TASK>
[   11.092445]  dump_stack_lvl+0x73/0xb0
[   11.092470]  print_report+0xd1/0x650
[   11.092491]  ? __virt_addr_valid+0x1db/0x2d0
[   11.092511]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.092533]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.092553]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.092576]  kasan_report+0x141/0x180
[   11.092596]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.092624]  __asan_report_store1_noabort+0x1b/0x30
[   11.092643]  krealloc_more_oob_helper+0x7eb/0x930
[   11.092664]  ? __schedule+0x10cc/0x2b60
[   11.092685]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.092707]  ? finish_task_switch.isra.0+0x153/0x700
[   11.092727]  ? __switch_to+0x47/0xf50
[   11.092750]  ? __schedule+0x10cc/0x2b60
[   11.092769]  ? __pfx_read_tsc+0x10/0x10
[   11.092792]  krealloc_more_oob+0x1c/0x30
[   11.092812]  kunit_try_run_case+0x1a5/0x480
[   11.092834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.092855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.092876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.092898]  ? __kthread_parkme+0x82/0x180
[   11.092916]  ? preempt_count_sub+0x50/0x80
[   11.092937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.092959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.092981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.093002]  kthread+0x337/0x6f0
[   11.093020]  ? trace_preempt_on+0x20/0xc0
[   11.093042]  ? __pfx_kthread+0x10/0x10
[   11.093062]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.093081]  ? calculate_sigpending+0x7b/0xa0
[   11.093103]  ? __pfx_kthread+0x10/0x10
[   11.093136]  ret_from_fork+0x116/0x1d0
[   11.093153]  ? __pfx_kthread+0x10/0x10
[   11.093173]  ret_from_fork_asm+0x1a/0x30
[   11.093202]  </TASK>
[   11.093212] 
[   11.101064] Allocated by task 174:
[   11.101333]  kasan_save_stack+0x45/0x70
[   11.101562]  kasan_save_track+0x18/0x40
[   11.101760]  kasan_save_alloc_info+0x3b/0x50
[   11.101922]  __kasan_krealloc+0x190/0x1f0
[   11.102134]  krealloc_noprof+0xf3/0x340
[   11.102423]  krealloc_more_oob_helper+0x1a9/0x930
[   11.102593]  krealloc_more_oob+0x1c/0x30
[   11.102741]  kunit_try_run_case+0x1a5/0x480
[   11.102946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.103437]  kthread+0x337/0x6f0
[   11.103638]  ret_from_fork+0x116/0x1d0
[   11.103785]  ret_from_fork_asm+0x1a/0x30
[   11.103984] 
[   11.104081] The buggy address belongs to the object at ffff888100aa8200
[   11.104081]  which belongs to the cache kmalloc-256 of size 256
[   11.104597] The buggy address is located 5 bytes to the right of
[   11.104597]  allocated 235-byte region [ffff888100aa8200, ffff888100aa82eb)
[   11.105236] 
[   11.105338] The buggy address belongs to the physical page:
[   11.105614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa8
[   11.105915] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.106281] flags: 0x200000000000040(head|node=0|zone=2)
[   11.106488] page_type: f5(slab)
[   11.106639] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.106980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.107555] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.107863] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.108264] head: 0200000000000001 ffffea000402aa01 00000000ffffffff 00000000ffffffff
[   11.108544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.108889] page dumped because: kasan: bad access detected
[   11.109218] 
[   11.109294] Memory state around the buggy address:
[   11.109505]  ffff888100aa8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.109788]  ffff888100aa8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.110098] >ffff888100aa8280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.110433]                                                              ^
[   11.110740]  ffff888100aa8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.111027]  ffff888100aa8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.111321] ==================================================================
[   11.069948] ==================================================================
[   11.070391] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.070708] Write of size 1 at addr ffff888100aa82eb by task kunit_try_catch/174
[   11.071012] 
[   11.071152] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.071196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.071212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.071232] Call Trace:
[   11.071244]  <TASK>
[   11.071258]  dump_stack_lvl+0x73/0xb0
[   11.071288]  print_report+0xd1/0x650
[   11.071310]  ? __virt_addr_valid+0x1db/0x2d0
[   11.071352]  ? krealloc_more_oob_helper+0x821/0x930
[   11.071375]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.071396]  ? krealloc_more_oob_helper+0x821/0x930
[   11.071419]  kasan_report+0x141/0x180
[   11.071439]  ? krealloc_more_oob_helper+0x821/0x930
[   11.071466]  __asan_report_store1_noabort+0x1b/0x30
[   11.071486]  krealloc_more_oob_helper+0x821/0x930
[   11.071507]  ? __schedule+0x10cc/0x2b60
[   11.071528]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.071551]  ? finish_task_switch.isra.0+0x153/0x700
[   11.071574]  ? __switch_to+0x47/0xf50
[   11.071600]  ? __schedule+0x10cc/0x2b60
[   11.071620]  ? __pfx_read_tsc+0x10/0x10
[   11.071644]  krealloc_more_oob+0x1c/0x30
[   11.071664]  kunit_try_run_case+0x1a5/0x480
[   11.071689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.071709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.071731]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.071752]  ? __kthread_parkme+0x82/0x180
[   11.071772]  ? preempt_count_sub+0x50/0x80
[   11.071794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.071815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.071837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.071858]  kthread+0x337/0x6f0
[   11.071876]  ? trace_preempt_on+0x20/0xc0
[   11.071899]  ? __pfx_kthread+0x10/0x10
[   11.071919]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.071938]  ? calculate_sigpending+0x7b/0xa0
[   11.071961]  ? __pfx_kthread+0x10/0x10
[   11.071981]  ret_from_fork+0x116/0x1d0
[   11.071998]  ? __pfx_kthread+0x10/0x10
[   11.072017]  ret_from_fork_asm+0x1a/0x30
[   11.072047]  </TASK>
[   11.072058] 
[   11.080317] Allocated by task 174:
[   11.080509]  kasan_save_stack+0x45/0x70
[   11.080705]  kasan_save_track+0x18/0x40
[   11.080890]  kasan_save_alloc_info+0x3b/0x50
[   11.081092]  __kasan_krealloc+0x190/0x1f0
[   11.081403]  krealloc_noprof+0xf3/0x340
[   11.081575]  krealloc_more_oob_helper+0x1a9/0x930
[   11.081770]  krealloc_more_oob+0x1c/0x30
[   11.081957]  kunit_try_run_case+0x1a5/0x480
[   11.082242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.082479]  kthread+0x337/0x6f0
[   11.082649]  ret_from_fork+0x116/0x1d0
[   11.082822]  ret_from_fork_asm+0x1a/0x30
[   11.082994] 
[   11.083066] The buggy address belongs to the object at ffff888100aa8200
[   11.083066]  which belongs to the cache kmalloc-256 of size 256
[   11.083734] The buggy address is located 0 bytes to the right of
[   11.083734]  allocated 235-byte region [ffff888100aa8200, ffff888100aa82eb)
[   11.084394] 
[   11.084473] The buggy address belongs to the physical page:
[   11.084651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa8
[   11.084935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.085371] flags: 0x200000000000040(head|node=0|zone=2)
[   11.085626] page_type: f5(slab)
[   11.085797] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.086063] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.086427] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.086789] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.087386] head: 0200000000000001 ffffea000402aa01 00000000ffffffff 00000000ffffffff
[   11.087726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.087994] page dumped because: kasan: bad access detected
[   11.088261] 
[   11.088380] Memory state around the buggy address:
[   11.088608]  ffff888100aa8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.088921]  ffff888100aa8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.089291] >ffff888100aa8280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.089614]                                                           ^
[   11.089818]  ffff888100aa8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.090104]  ffff888100aa8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.090473] ==================================================================
[   11.290589] ==================================================================
[   11.290826] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.291064] Write of size 1 at addr ffff8881029fe0f0 by task kunit_try_catch/178
[   11.291633] 
[   11.291753] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.291792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.291804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.291832] Call Trace:
[   11.291847]  <TASK>
[   11.291861]  dump_stack_lvl+0x73/0xb0
[   11.291886]  print_report+0xd1/0x650
[   11.291907]  ? __virt_addr_valid+0x1db/0x2d0
[   11.291928]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.291950]  ? kasan_addr_to_slab+0x11/0xa0
[   11.291970]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.291993]  kasan_report+0x141/0x180
[   11.292013]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.292041]  __asan_report_store1_noabort+0x1b/0x30
[   11.292061]  krealloc_more_oob_helper+0x7eb/0x930
[   11.292082]  ? __schedule+0x10cc/0x2b60
[   11.292102]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.292136]  ? finish_task_switch.isra.0+0x153/0x700
[   11.292156]  ? __switch_to+0x47/0xf50
[   11.292180]  ? __schedule+0x10cc/0x2b60
[   11.292200]  ? __pfx_read_tsc+0x10/0x10
[   11.292223]  krealloc_large_more_oob+0x1c/0x30
[   11.292245]  kunit_try_run_case+0x1a5/0x480
[   11.292269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.292291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.292314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.292345]  ? __kthread_parkme+0x82/0x180
[   11.292366]  ? preempt_count_sub+0x50/0x80
[   11.292388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.292410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.292432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.292454]  kthread+0x337/0x6f0
[   11.292472]  ? trace_preempt_on+0x20/0xc0
[   11.292495]  ? __pfx_kthread+0x10/0x10
[   11.292515]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.292535]  ? calculate_sigpending+0x7b/0xa0
[   11.292558]  ? __pfx_kthread+0x10/0x10
[   11.292578]  ret_from_fork+0x116/0x1d0
[   11.292596]  ? __pfx_kthread+0x10/0x10
[   11.292615]  ret_from_fork_asm+0x1a/0x30
[   11.292644]  </TASK>
[   11.292654] 
[   11.300964] The buggy address belongs to the physical page:
[   11.301203] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fc
[   11.301828] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.302059] flags: 0x200000000000040(head|node=0|zone=2)
[   11.302486] page_type: f8(unknown)
[   11.302842] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.303146] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.303563] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.303800] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.304035] head: 0200000000000002 ffffea00040a7f01 00000000ffffffff 00000000ffffffff
[   11.304540] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.305121] page dumped because: kasan: bad access detected
[   11.307223] 
[   11.307333] Memory state around the buggy address:
[   11.307547]  ffff8881029fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.308344]  ffff8881029fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.308578] >ffff8881029fe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.308791]                                                              ^
[   11.308995]  ffff8881029fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.309308]  ffff8881029fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.309608] ==================================================================