Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.799555] ==================================================================
[   16.799603] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.799653] Write of size 1 at addr fff00000c4519af0 by task kunit_try_catch/156
[   16.799835] 
[   16.799953] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.800048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.800075] Hardware name: linux,dummy-virt (DT)
[   16.800209] Call trace:
[   16.800290]  show_stack+0x20/0x38 (C)
[   16.800383]  dump_stack_lvl+0x8c/0xd0
[   16.800443]  print_report+0x118/0x608
[   16.800529]  kasan_report+0xdc/0x128
[   16.800600]  __asan_report_store1_noabort+0x20/0x30
[   16.800697]  krealloc_more_oob_helper+0x5c0/0x678
[   16.800747]  krealloc_more_oob+0x20/0x38
[   16.800822]  kunit_try_run_case+0x170/0x3f0
[   16.801023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.801336]  kthread+0x328/0x630
[   16.801421]  ret_from_fork+0x10/0x20
[   16.801477] 
[   16.801546] Allocated by task 156:
[   16.801905]  kasan_save_stack+0x3c/0x68
[   16.801960]  kasan_save_track+0x20/0x40
[   16.802000]  kasan_save_alloc_info+0x40/0x58
[   16.802048]  __kasan_krealloc+0x118/0x178
[   16.802230]  krealloc_noprof+0x128/0x360
[   16.802291]  krealloc_more_oob_helper+0x168/0x678
[   16.802333]  krealloc_more_oob+0x20/0x38
[   16.802569]  kunit_try_run_case+0x170/0x3f0
[   16.802667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.802835]  kthread+0x328/0x630
[   16.802966]  ret_from_fork+0x10/0x20
[   16.803044] 
[   16.803063] The buggy address belongs to the object at fff00000c4519a00
[   16.803063]  which belongs to the cache kmalloc-256 of size 256
[   16.803157] The buggy address is located 5 bytes to the right of
[   16.803157]  allocated 235-byte region [fff00000c4519a00, fff00000c4519aeb)
[   16.803221] 
[   16.803240] The buggy address belongs to the physical page:
[   16.803286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.803342] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.803549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.803652] page_type: f5(slab)
[   16.803785] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.803890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.804072] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.804234] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.804427] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.804661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.804707] page dumped because: kasan: bad access detected
[   16.804757] 
[   16.804774] Memory state around the buggy address:
[   16.804813]  fff00000c4519980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.804866]  fff00000c4519a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.804908] >fff00000c4519a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.804945]                                                              ^
[   16.804983]  fff00000c4519b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.805296]  fff00000c4519b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.805428] ==================================================================
[   16.866796] ==================================================================
[   16.866886] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.866970] Write of size 1 at addr fff00000c77e20eb by task kunit_try_catch/160
[   16.867021] 
[   16.867053] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.867294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.867332] Hardware name: linux,dummy-virt (DT)
[   16.867365] Call trace:
[   16.867388]  show_stack+0x20/0x38 (C)
[   16.867459]  dump_stack_lvl+0x8c/0xd0
[   16.867514]  print_report+0x118/0x608
[   16.867561]  kasan_report+0xdc/0x128
[   16.867608]  __asan_report_store1_noabort+0x20/0x30
[   16.867676]  krealloc_more_oob_helper+0x60c/0x678
[   16.867765]  krealloc_large_more_oob+0x20/0x38
[   16.867831]  kunit_try_run_case+0x170/0x3f0
[   16.867886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.867946]  kthread+0x328/0x630
[   16.867989]  ret_from_fork+0x10/0x20
[   16.868044] 
[   16.868063] The buggy address belongs to the physical page:
[   16.868105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   16.868160] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.868382] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.868444] page_type: f8(unknown)
[   16.868488] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.868551] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.868612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.868685] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.868741] head: 0bfffe0000000002 ffffc1ffc31df801 00000000ffffffff 00000000ffffffff
[   16.868806] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.868847] page dumped because: kasan: bad access detected
[   16.868877] 
[   16.868894] Memory state around the buggy address:
[   16.868941]  fff00000c77e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.868998]  fff00000c77e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.869044] >fff00000c77e2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.869099]                                                           ^
[   16.869145]  fff00000c77e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.869190]  fff00000c77e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.869230] ==================================================================
[   16.869280] ==================================================================
[   16.869323] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.869367] Write of size 1 at addr fff00000c77e20f0 by task kunit_try_catch/160
[   16.869423] 
[   16.869450] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.869528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.869554] Hardware name: linux,dummy-virt (DT)
[   16.869583] Call trace:
[   16.869603]  show_stack+0x20/0x38 (C)
[   16.869650]  dump_stack_lvl+0x8c/0xd0
[   16.869749]  print_report+0x118/0x608
[   16.870005]  kasan_report+0xdc/0x128
[   16.870063]  __asan_report_store1_noabort+0x20/0x30
[   16.870130]  krealloc_more_oob_helper+0x5c0/0x678
[   16.870179]  krealloc_large_more_oob+0x20/0x38
[   16.870283]  kunit_try_run_case+0x170/0x3f0
[   16.870440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.870526]  kthread+0x328/0x630
[   16.870637]  ret_from_fork+0x10/0x20
[   16.870775] 
[   16.870826] The buggy address belongs to the physical page:
[   16.870871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   16.870932] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.871013] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.871099] page_type: f8(unknown)
[   16.871142] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.871198] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.871271] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.871324] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.871525] head: 0bfffe0000000002 ffffc1ffc31df801 00000000ffffffff 00000000ffffffff
[   16.871595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.871672] page dumped because: kasan: bad access detected
[   16.871730] 
[   16.871747] Memory state around the buggy address:
[   16.871794]  fff00000c77e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.871881]  fff00000c77e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.871987] >fff00000c77e2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.872047]                                                              ^
[   16.872109]  fff00000c77e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.872164]  fff00000c77e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.872233] ==================================================================
[   16.791036] ==================================================================
[   16.791112] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.791169] Write of size 1 at addr fff00000c4519aeb by task kunit_try_catch/156
[   16.791219] 
[   16.791253] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.791336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.791604] Hardware name: linux,dummy-virt (DT)
[   16.791882] Call trace:
[   16.792015]  show_stack+0x20/0x38 (C)
[   16.792587]  dump_stack_lvl+0x8c/0xd0
[   16.792788]  print_report+0x118/0x608
[   16.792943]  kasan_report+0xdc/0x128
[   16.793109]  __asan_report_store1_noabort+0x20/0x30
[   16.793161]  krealloc_more_oob_helper+0x60c/0x678
[   16.793210]  krealloc_more_oob+0x20/0x38
[   16.793493]  kunit_try_run_case+0x170/0x3f0
[   16.793674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.793853]  kthread+0x328/0x630
[   16.794276]  ret_from_fork+0x10/0x20
[   16.794470] 
[   16.794491] Allocated by task 156:
[   16.794540]  kasan_save_stack+0x3c/0x68
[   16.794583]  kasan_save_track+0x20/0x40
[   16.794621]  kasan_save_alloc_info+0x40/0x58
[   16.794661]  __kasan_krealloc+0x118/0x178
[   16.794699]  krealloc_noprof+0x128/0x360
[   16.794907]  krealloc_more_oob_helper+0x168/0x678
[   16.795017]  krealloc_more_oob+0x20/0x38
[   16.795053]  kunit_try_run_case+0x170/0x3f0
[   16.795103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.795166]  kthread+0x328/0x630
[   16.795286]  ret_from_fork+0x10/0x20
[   16.795322] 
[   16.795341] The buggy address belongs to the object at fff00000c4519a00
[   16.795341]  which belongs to the cache kmalloc-256 of size 256
[   16.795402] The buggy address is located 0 bytes to the right of
[   16.795402]  allocated 235-byte region [fff00000c4519a00, fff00000c4519aeb)
[   16.795466] 
[   16.795486] The buggy address belongs to the physical page:
[   16.795518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.795571] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.795626] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.795720] page_type: f5(slab)
[   16.795832] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.795935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.796074] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.796325] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.796546] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.797004] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.797145] page dumped because: kasan: bad access detected
[   16.797188] 
[   16.797206] Memory state around the buggy address:
[   16.797238]  fff00000c4519980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.797280]  fff00000c4519a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.797332] >fff00000c4519a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.797466]                                                           ^
[   16.797522]  fff00000c4519b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.797565]  fff00000c4519b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.797775] ==================================================================

[   12.321482] ==================================================================
[   12.321972] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.322242] Write of size 1 at addr ffff8881003416eb by task kunit_try_catch/173
[   12.322468] 
[   12.322564] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.322623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.322634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.322655] Call Trace:
[   12.322667]  <TASK>
[   12.322683]  dump_stack_lvl+0x73/0xb0
[   12.322715]  print_report+0xd1/0x650
[   12.322737]  ? __virt_addr_valid+0x1db/0x2d0
[   12.322761]  ? krealloc_more_oob_helper+0x821/0x930
[   12.322782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.322803]  ? krealloc_more_oob_helper+0x821/0x930
[   12.322832]  kasan_report+0x141/0x180
[   12.322852]  ? krealloc_more_oob_helper+0x821/0x930
[   12.322879]  __asan_report_store1_noabort+0x1b/0x30
[   12.322901]  krealloc_more_oob_helper+0x821/0x930
[   12.322923]  ? __schedule+0x10cc/0x2b60
[   12.322943]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.322966]  ? finish_task_switch.isra.0+0x153/0x700
[   12.322989]  ? __switch_to+0x47/0xf50
[   12.323015]  ? __schedule+0x10cc/0x2b60
[   12.323034]  ? __pfx_read_tsc+0x10/0x10
[   12.323058]  krealloc_more_oob+0x1c/0x30
[   12.323078]  kunit_try_run_case+0x1a5/0x480
[   12.323103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.323123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.323146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.323169]  ? __kthread_parkme+0x82/0x180
[   12.323190]  ? preempt_count_sub+0x50/0x80
[   12.323211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.323233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.323255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.323277]  kthread+0x337/0x6f0
[   12.323295]  ? trace_preempt_on+0x20/0xc0
[   12.323318]  ? __pfx_kthread+0x10/0x10
[   12.323337]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.323356]  ? calculate_sigpending+0x7b/0xa0
[   12.323379]  ? __pfx_kthread+0x10/0x10
[   12.323398]  ret_from_fork+0x116/0x1d0
[   12.323415]  ? __pfx_kthread+0x10/0x10
[   12.323434]  ret_from_fork_asm+0x1a/0x30
[   12.323464]  </TASK>
[   12.323474] 
[   12.340571] Allocated by task 173:
[   12.341035]  kasan_save_stack+0x45/0x70
[   12.341421]  kasan_save_track+0x18/0x40
[   12.341555]  kasan_save_alloc_info+0x3b/0x50
[   12.341714]  __kasan_krealloc+0x190/0x1f0
[   12.342090]  krealloc_noprof+0xf3/0x340
[   12.342565]  krealloc_more_oob_helper+0x1a9/0x930
[   12.343266]  krealloc_more_oob+0x1c/0x30
[   12.343672]  kunit_try_run_case+0x1a5/0x480
[   12.344137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.344360]  kthread+0x337/0x6f0
[   12.344482]  ret_from_fork+0x116/0x1d0
[   12.344626]  ret_from_fork_asm+0x1a/0x30
[   12.344766] 
[   12.345093] The buggy address belongs to the object at ffff888100341600
[   12.345093]  which belongs to the cache kmalloc-256 of size 256
[   12.346259] The buggy address is located 0 bytes to the right of
[   12.346259]  allocated 235-byte region [ffff888100341600, ffff8881003416eb)
[   12.347587] 
[   12.347845] The buggy address belongs to the physical page:
[   12.348359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   12.348634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.349179] flags: 0x200000000000040(head|node=0|zone=2)
[   12.349693] page_type: f5(slab)
[   12.350090] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.350798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.351484] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.351734] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.352372] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   12.353208] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.354134] page dumped because: kasan: bad access detected
[   12.354316] 
[   12.354386] Memory state around the buggy address:
[   12.354543]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.354835]  ffff888100341600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.355481] >ffff888100341680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.356230]                                                           ^
[   12.356433]  ffff888100341700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.356662]  ffff888100341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.357164] ==================================================================
[   12.357975] ==================================================================
[   12.358806] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.359229] Write of size 1 at addr ffff8881003416f0 by task kunit_try_catch/173
[   12.359792] 
[   12.360095] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.360239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.360252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.360272] Call Trace:
[   12.360288]  <TASK>
[   12.360307]  dump_stack_lvl+0x73/0xb0
[   12.360341]  print_report+0xd1/0x650
[   12.360364]  ? __virt_addr_valid+0x1db/0x2d0
[   12.360388]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.360411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.360434]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.360457]  kasan_report+0x141/0x180
[   12.360478]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.360506]  __asan_report_store1_noabort+0x1b/0x30
[   12.360531]  krealloc_more_oob_helper+0x7eb/0x930
[   12.360553]  ? __schedule+0x10cc/0x2b60
[   12.360574]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.360612]  ? finish_task_switch.isra.0+0x153/0x700
[   12.360636]  ? __switch_to+0x47/0xf50
[   12.360661]  ? __schedule+0x10cc/0x2b60
[   12.360681]  ? __pfx_read_tsc+0x10/0x10
[   12.360706]  krealloc_more_oob+0x1c/0x30
[   12.360726]  kunit_try_run_case+0x1a5/0x480
[   12.360750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.360772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.360795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.360879]  ? __kthread_parkme+0x82/0x180
[   12.360900]  ? preempt_count_sub+0x50/0x80
[   12.360923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.360947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.360970]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.360995]  kthread+0x337/0x6f0
[   12.361013]  ? trace_preempt_on+0x20/0xc0
[   12.361038]  ? __pfx_kthread+0x10/0x10
[   12.361060]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.361083]  ? calculate_sigpending+0x7b/0xa0
[   12.361110]  ? __pfx_kthread+0x10/0x10
[   12.361132]  ret_from_fork+0x116/0x1d0
[   12.361150]  ? __pfx_kthread+0x10/0x10
[   12.361170]  ret_from_fork_asm+0x1a/0x30
[   12.361201]  </TASK>
[   12.361211] 
[   12.372661] Allocated by task 173:
[   12.373157]  kasan_save_stack+0x45/0x70
[   12.373383]  kasan_save_track+0x18/0x40
[   12.373571]  kasan_save_alloc_info+0x3b/0x50
[   12.373771]  __kasan_krealloc+0x190/0x1f0
[   12.374442]  krealloc_noprof+0xf3/0x340
[   12.374622]  krealloc_more_oob_helper+0x1a9/0x930
[   12.375122]  krealloc_more_oob+0x1c/0x30
[   12.375279]  kunit_try_run_case+0x1a5/0x480
[   12.375658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.376173]  kthread+0x337/0x6f0
[   12.376327]  ret_from_fork+0x116/0x1d0
[   12.376540]  ret_from_fork_asm+0x1a/0x30
[   12.376717] 
[   12.377148] The buggy address belongs to the object at ffff888100341600
[   12.377148]  which belongs to the cache kmalloc-256 of size 256
[   12.377767] The buggy address is located 5 bytes to the right of
[   12.377767]  allocated 235-byte region [ffff888100341600, ffff8881003416eb)
[   12.378720] 
[   12.379093] The buggy address belongs to the physical page:
[   12.379433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   12.379915] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.380344] flags: 0x200000000000040(head|node=0|zone=2)
[   12.380615] page_type: f5(slab)
[   12.380786] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.381397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.381828] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.382327] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.382683] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   12.383278] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.383517] page dumped because: kasan: bad access detected
[   12.384378] 
[   12.384560] Memory state around the buggy address:
[   12.385226]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.386024]  ffff888100341600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.386873] >ffff888100341680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.387095]                                                              ^
[   12.387297]  ffff888100341700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.387503]  ffff888100341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.387925] ==================================================================
[   12.551002] ==================================================================
[   12.551473] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.551746] Write of size 1 at addr ffff888101eae0eb by task kunit_try_catch/177
[   12.552604] 
[   12.552807] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.552855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.552866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.552886] Call Trace:
[   12.552899]  <TASK>
[   12.552916]  dump_stack_lvl+0x73/0xb0
[   12.552947]  print_report+0xd1/0x650
[   12.552970]  ? __virt_addr_valid+0x1db/0x2d0
[   12.552993]  ? krealloc_more_oob_helper+0x821/0x930
[   12.553016]  ? kasan_addr_to_slab+0x11/0xa0
[   12.553036]  ? krealloc_more_oob_helper+0x821/0x930
[   12.553060]  kasan_report+0x141/0x180
[   12.553081]  ? krealloc_more_oob_helper+0x821/0x930
[   12.553109]  __asan_report_store1_noabort+0x1b/0x30
[   12.553133]  krealloc_more_oob_helper+0x821/0x930
[   12.553156]  ? __schedule+0x10cc/0x2b60
[   12.553177]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.553202]  ? finish_task_switch.isra.0+0x153/0x700
[   12.553226]  ? __switch_to+0x47/0xf50
[   12.553251]  ? __schedule+0x10cc/0x2b60
[   12.553271]  ? __pfx_read_tsc+0x10/0x10
[   12.553295]  krealloc_large_more_oob+0x1c/0x30
[   12.553318]  kunit_try_run_case+0x1a5/0x480
[   12.553343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.553365]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.553390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.553413]  ? __kthread_parkme+0x82/0x180
[   12.553435]  ? preempt_count_sub+0x50/0x80
[   12.553457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.553480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.553504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.553560]  kthread+0x337/0x6f0
[   12.553579]  ? trace_preempt_on+0x20/0xc0
[   12.553612]  ? __pfx_kthread+0x10/0x10
[   12.553631]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.553652]  ? calculate_sigpending+0x7b/0xa0
[   12.553677]  ? __pfx_kthread+0x10/0x10
[   12.553697]  ret_from_fork+0x116/0x1d0
[   12.553715]  ? __pfx_kthread+0x10/0x10
[   12.553734]  ret_from_fork_asm+0x1a/0x30
[   12.553782]  </TASK>
[   12.553797] 
[   12.564770] The buggy address belongs to the physical page:
[   12.565047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eac
[   12.565707] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.566497] flags: 0x200000000000040(head|node=0|zone=2)
[   12.567070] page_type: f8(unknown)
[   12.567210] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.567442] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.567719] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.568112] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.568441] head: 0200000000000002 ffffea000407ab01 00000000ffffffff 00000000ffffffff
[   12.568728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.569069] page dumped because: kasan: bad access detected
[   12.569339] 
[   12.569435] Memory state around the buggy address:
[   12.569619]  ffff888101eadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.569919]  ffff888101eae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.570496] >ffff888101eae080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.570893]                                                           ^
[   12.571105]  ffff888101eae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.571424]  ffff888101eae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.571707] ==================================================================
[   12.572501] ==================================================================
[   12.572995] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.573377] Write of size 1 at addr ffff888101eae0f0 by task kunit_try_catch/177
[   12.573670] 
[   12.573788] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.573832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.573842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.573863] Call Trace:
[   12.573876]  <TASK>
[   12.573894]  dump_stack_lvl+0x73/0xb0
[   12.573925]  print_report+0xd1/0x650
[   12.573948]  ? __virt_addr_valid+0x1db/0x2d0
[   12.573973]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.574039]  ? kasan_addr_to_slab+0x11/0xa0
[   12.574061]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.574084]  kasan_report+0x141/0x180
[   12.574105]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.574133]  __asan_report_store1_noabort+0x1b/0x30
[   12.574158]  krealloc_more_oob_helper+0x7eb/0x930
[   12.574180]  ? __schedule+0x10cc/0x2b60
[   12.574202]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.574227]  ? finish_task_switch.isra.0+0x153/0x700
[   12.574252]  ? __switch_to+0x47/0xf50
[   12.574278]  ? __schedule+0x10cc/0x2b60
[   12.574298]  ? __pfx_read_tsc+0x10/0x10
[   12.574323]  krealloc_large_more_oob+0x1c/0x30
[   12.574346]  kunit_try_run_case+0x1a5/0x480
[   12.574372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.574394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.574418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.574441]  ? __kthread_parkme+0x82/0x180
[   12.574462]  ? preempt_count_sub+0x50/0x80
[   12.574484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.574507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.574531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.574556]  kthread+0x337/0x6f0
[   12.574574]  ? trace_preempt_on+0x20/0xc0
[   12.574609]  ? __pfx_kthread+0x10/0x10
[   12.574629]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.574650]  ? calculate_sigpending+0x7b/0xa0
[   12.574674]  ? __pfx_kthread+0x10/0x10
[   12.574695]  ret_from_fork+0x116/0x1d0
[   12.574712]  ? __pfx_kthread+0x10/0x10
[   12.574732]  ret_from_fork_asm+0x1a/0x30
[   12.574762]  </TASK>
[   12.574773] 
[   12.582942] The buggy address belongs to the physical page:
[   12.583195] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eac
[   12.583443] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.583753] flags: 0x200000000000040(head|node=0|zone=2)
[   12.584047] page_type: f8(unknown)
[   12.584221] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.584563] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.585283] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.585577] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.585996] head: 0200000000000002 ffffea000407ab01 00000000ffffffff 00000000ffffffff
[   12.586310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.586558] page dumped because: kasan: bad access detected
[   12.586741] 
[   12.586810] Memory state around the buggy address:
[   12.587028]  ffff888101eadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.587644]  ffff888101eae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.587861] >ffff888101eae080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.588073]                                                              ^
[   12.588681]  ffff888101eae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.589155]  ffff888101eae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.589471] ==================================================================