Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.102420] ==================================================================
[   19.102704] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.102951] Write of size 1 at addr fff00000c1b1b6eb by task kunit_try_catch/156
[   19.103057] 
[   19.103095] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.103226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.103286] Hardware name: linux,dummy-virt (DT)
[   19.103364] Call trace:
[   19.103385]  show_stack+0x20/0x38 (C)
[   19.103764]  dump_stack_lvl+0x8c/0xd0
[   19.103989]  print_report+0x118/0x608
[   19.104152]  kasan_report+0xdc/0x128
[   19.104249]  __asan_report_store1_noabort+0x20/0x30
[   19.104349]  krealloc_more_oob_helper+0x60c/0x678
[   19.104411]  krealloc_more_oob+0x20/0x38
[   19.104454]  kunit_try_run_case+0x170/0x3f0
[   19.104499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.104688]  kthread+0x328/0x630
[   19.104939]  ret_from_fork+0x10/0x20
[   19.105106] 
[   19.105140] Allocated by task 156:
[   19.105248]  kasan_save_stack+0x3c/0x68
[   19.105291]  kasan_save_track+0x20/0x40
[   19.105326]  kasan_save_alloc_info+0x40/0x58
[   19.105363]  __kasan_krealloc+0x118/0x178
[   19.105400]  krealloc_noprof+0x128/0x360
[   19.105450]  krealloc_more_oob_helper+0x168/0x678
[   19.105496]  krealloc_more_oob+0x20/0x38
[   19.105537]  kunit_try_run_case+0x170/0x3f0
[   19.105588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.105629]  kthread+0x328/0x630
[   19.105669]  ret_from_fork+0x10/0x20
[   19.105747] 
[   19.105875] The buggy address belongs to the object at fff00000c1b1b600
[   19.105875]  which belongs to the cache kmalloc-256 of size 256
[   19.106203] The buggy address is located 0 bytes to the right of
[   19.106203]  allocated 235-byte region [fff00000c1b1b600, fff00000c1b1b6eb)
[   19.106382] 
[   19.106471] The buggy address belongs to the physical page:
[   19.106591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1a
[   19.106674] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.106840] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.107089] page_type: f5(slab)
[   19.107308] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.107427] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.107560] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.107704] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.108145] head: 0bfffe0000000001 ffffc1ffc306c681 00000000ffffffff 00000000ffffffff
[   19.108329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.108663] page dumped because: kasan: bad access detected
[   19.108802] 
[   19.108820] Memory state around the buggy address:
[   19.108899]  fff00000c1b1b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.109272]  fff00000c1b1b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.109328] >fff00000c1b1b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.109488]                                                           ^
[   19.109586]  fff00000c1b1b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.109744]  fff00000c1b1b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.109888] ==================================================================
[   19.180259] ==================================================================
[   19.180317] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.180428] Write of size 1 at addr fff00000c781a0f0 by task kunit_try_catch/160
[   19.180493] 
[   19.180550] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.180738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.180795] Hardware name: linux,dummy-virt (DT)
[   19.180850] Call trace:
[   19.180935]  show_stack+0x20/0x38 (C)
[   19.180984]  dump_stack_lvl+0x8c/0xd0
[   19.181027]  print_report+0x118/0x608
[   19.181199]  kasan_report+0xdc/0x128
[   19.181259]  __asan_report_store1_noabort+0x20/0x30
[   19.181459]  krealloc_more_oob_helper+0x5c0/0x678
[   19.181520]  krealloc_large_more_oob+0x20/0x38
[   19.181565]  kunit_try_run_case+0x170/0x3f0
[   19.181619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.181752]  kthread+0x328/0x630
[   19.181828]  ret_from_fork+0x10/0x20
[   19.181882] 
[   19.181902] The buggy address belongs to the physical page:
[   19.182195] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   19.182379] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.182473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.182624] page_type: f8(unknown)
[   19.182744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.182797] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.183022] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.183175] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.183234] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff
[   19.183640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.184047] page dumped because: kasan: bad access detected
[   19.184117] 
[   19.184154] Memory state around the buggy address:
[   19.184256]  fff00000c7819f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.184371]  fff00000c781a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.184414] >fff00000c781a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.184476]                                                              ^
[   19.184536]  fff00000c781a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.184848]  fff00000c781a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.184918] ==================================================================
[   19.173349] ==================================================================
[   19.173466] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.173517] Write of size 1 at addr fff00000c781a0eb by task kunit_try_catch/160
[   19.173673] 
[   19.173816] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.173902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.174138] Hardware name: linux,dummy-virt (DT)
[   19.174299] Call trace:
[   19.174377]  show_stack+0x20/0x38 (C)
[   19.174430]  dump_stack_lvl+0x8c/0xd0
[   19.174474]  print_report+0x118/0x608
[   19.174608]  kasan_report+0xdc/0x128
[   19.174667]  __asan_report_store1_noabort+0x20/0x30
[   19.174755]  krealloc_more_oob_helper+0x60c/0x678
[   19.175061]  krealloc_large_more_oob+0x20/0x38
[   19.175420]  kunit_try_run_case+0x170/0x3f0
[   19.175547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.175661]  kthread+0x328/0x630
[   19.175826]  ret_from_fork+0x10/0x20
[   19.175871] 
[   19.175891] The buggy address belongs to the physical page:
[   19.176195] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   19.176362] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.176459] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.176638] page_type: f8(unknown)
[   19.176776] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.176884] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.176942] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.177352] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.177500] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff
[   19.177762] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.177909] page dumped because: kasan: bad access detected
[   19.177941] 
[   19.177997] Memory state around the buggy address:
[   19.178069]  fff00000c7819f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.178420]  fff00000c781a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.178585] >fff00000c781a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.178732]                                                           ^
[   19.178847]  fff00000c781a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.178892]  fff00000c781a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.179111] ==================================================================
[   19.112781] ==================================================================
[   19.112865] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.112918] Write of size 1 at addr fff00000c1b1b6f0 by task kunit_try_catch/156
[   19.112974] 
[   19.113146] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.113235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.113299] Hardware name: linux,dummy-virt (DT)
[   19.113537] Call trace:
[   19.113572]  show_stack+0x20/0x38 (C)
[   19.113744]  dump_stack_lvl+0x8c/0xd0
[   19.113799]  print_report+0x118/0x608
[   19.114011]  kasan_report+0xdc/0x128
[   19.114086]  __asan_report_store1_noabort+0x20/0x30
[   19.114137]  krealloc_more_oob_helper+0x5c0/0x678
[   19.114184]  krealloc_more_oob+0x20/0x38
[   19.114226]  kunit_try_run_case+0x170/0x3f0
[   19.114272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.114332]  kthread+0x328/0x630
[   19.114372]  ret_from_fork+0x10/0x20
[   19.114427] 
[   19.114445] Allocated by task 156:
[   19.114472]  kasan_save_stack+0x3c/0x68
[   19.114511]  kasan_save_track+0x20/0x40
[   19.114546]  kasan_save_alloc_info+0x40/0x58
[   19.114586]  __kasan_krealloc+0x118/0x178
[   19.114621]  krealloc_noprof+0x128/0x360
[   19.114656]  krealloc_more_oob_helper+0x168/0x678
[   19.114693]  krealloc_more_oob+0x20/0x38
[   19.114738]  kunit_try_run_case+0x170/0x3f0
[   19.114782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.114824]  kthread+0x328/0x630
[   19.114863]  ret_from_fork+0x10/0x20
[   19.114898] 
[   19.114916] The buggy address belongs to the object at fff00000c1b1b600
[   19.114916]  which belongs to the cache kmalloc-256 of size 256
[   19.114970] The buggy address is located 5 bytes to the right of
[   19.114970]  allocated 235-byte region [fff00000c1b1b600, fff00000c1b1b6eb)
[   19.115032] 
[   19.115050] The buggy address belongs to the physical page:
[   19.115079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1a
[   19.115131] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.115176] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.115225] page_type: f5(slab)
[   19.115261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.115308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.115363] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.115421] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.115581] head: 0bfffe0000000001 ffffc1ffc306c681 00000000ffffffff 00000000ffffffff
[   19.115861] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.115905] page dumped because: kasan: bad access detected
[   19.116658] 
[   19.117427] Memory state around the buggy address:
[   19.117501]  fff00000c1b1b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.117570]  fff00000c1b1b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.117620] >fff00000c1b1b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.117672]                                                              ^
[   19.117770]  fff00000c1b1b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.117827]  fff00000c1b1b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.118022] ==================================================================

[   12.419559] ==================================================================
[   12.419985] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.423312] Write of size 1 at addr ffff8881003464eb by task kunit_try_catch/173
[   12.423569] 
[   12.423670] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.423715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.423727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.423748] Call Trace:
[   12.423762]  <TASK>
[   12.423782]  dump_stack_lvl+0x73/0xb0
[   12.423814]  print_report+0xd1/0x650
[   12.423837]  ? __virt_addr_valid+0x1db/0x2d0
[   12.423859]  ? krealloc_more_oob_helper+0x821/0x930
[   12.423882]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.423906]  ? krealloc_more_oob_helper+0x821/0x930
[   12.423929]  kasan_report+0x141/0x180
[   12.423949]  ? krealloc_more_oob_helper+0x821/0x930
[   12.423977]  __asan_report_store1_noabort+0x1b/0x30
[   12.423999]  krealloc_more_oob_helper+0x821/0x930
[   12.424020]  ? __schedule+0x10cc/0x2b60
[   12.424054]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.424077]  ? finish_task_switch.isra.0+0x153/0x700
[   12.424099]  ? __switch_to+0x47/0xf50
[   12.424127]  ? __schedule+0x10cc/0x2b60
[   12.424147]  ? __pfx_read_tsc+0x10/0x10
[   12.424170]  krealloc_more_oob+0x1c/0x30
[   12.424190]  kunit_try_run_case+0x1a5/0x480
[   12.424214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.424234]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.424257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.424278]  ? __kthread_parkme+0x82/0x180
[   12.424298]  ? preempt_count_sub+0x50/0x80
[   12.424319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.424341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.424363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.424384]  kthread+0x337/0x6f0
[   12.424402]  ? trace_preempt_on+0x20/0xc0
[   12.424424]  ? __pfx_kthread+0x10/0x10
[   12.424443]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.424463]  ? calculate_sigpending+0x7b/0xa0
[   12.424486]  ? __pfx_kthread+0x10/0x10
[   12.424764]  ret_from_fork+0x116/0x1d0
[   12.424793]  ? __pfx_kthread+0x10/0x10
[   12.424814]  ret_from_fork_asm+0x1a/0x30
[   12.424845]  </TASK>
[   12.424857] 
[   12.433062] Allocated by task 173:
[   12.433357]  kasan_save_stack+0x45/0x70
[   12.433522]  kasan_save_track+0x18/0x40
[   12.433719]  kasan_save_alloc_info+0x3b/0x50
[   12.433912]  __kasan_krealloc+0x190/0x1f0
[   12.434165]  krealloc_noprof+0xf3/0x340
[   12.434339]  krealloc_more_oob_helper+0x1a9/0x930
[   12.434520]  krealloc_more_oob+0x1c/0x30
[   12.434661]  kunit_try_run_case+0x1a5/0x480
[   12.434862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.435181]  kthread+0x337/0x6f0
[   12.435357]  ret_from_fork+0x116/0x1d0
[   12.435552]  ret_from_fork_asm+0x1a/0x30
[   12.435722] 
[   12.435795] The buggy address belongs to the object at ffff888100346400
[   12.435795]  which belongs to the cache kmalloc-256 of size 256
[   12.436383] The buggy address is located 0 bytes to the right of
[   12.436383]  allocated 235-byte region [ffff888100346400, ffff8881003464eb)
[   12.436986] 
[   12.437118] The buggy address belongs to the physical page:
[   12.437379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.437825] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.438158] flags: 0x200000000000040(head|node=0|zone=2)
[   12.438422] page_type: f5(slab)
[   12.438587] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.438889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.439266] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.439519] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.439837] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.440357] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.440702] page dumped because: kasan: bad access detected
[   12.440875] 
[   12.440964] Memory state around the buggy address:
[   12.441274]  ffff888100346380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.441605]  ffff888100346400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.441923] >ffff888100346480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.442216]                                                           ^
[   12.442463]  ffff888100346500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.442724]  ffff888100346580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.443003] ==================================================================
[   12.443929] ==================================================================
[   12.444391] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.444777] Write of size 1 at addr ffff8881003464f0 by task kunit_try_catch/173
[   12.445164] 
[   12.445257] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.445301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.445312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.445332] Call Trace:
[   12.445344]  <TASK>
[   12.445359]  dump_stack_lvl+0x73/0xb0
[   12.445386]  print_report+0xd1/0x650
[   12.445408]  ? __virt_addr_valid+0x1db/0x2d0
[   12.445429]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.445451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.445475]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.445519]  kasan_report+0x141/0x180
[   12.445542]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.445575]  __asan_report_store1_noabort+0x1b/0x30
[   12.445599]  krealloc_more_oob_helper+0x7eb/0x930
[   12.445620]  ? __schedule+0x10cc/0x2b60
[   12.445642]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.445664]  ? finish_task_switch.isra.0+0x153/0x700
[   12.445685]  ? __switch_to+0x47/0xf50
[   12.445711]  ? __schedule+0x10cc/0x2b60
[   12.445731]  ? __pfx_read_tsc+0x10/0x10
[   12.445754]  krealloc_more_oob+0x1c/0x30
[   12.445774]  kunit_try_run_case+0x1a5/0x480
[   12.445797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.445817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.445839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.445861]  ? __kthread_parkme+0x82/0x180
[   12.445879]  ? preempt_count_sub+0x50/0x80
[   12.445901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.445923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.445944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.445965]  kthread+0x337/0x6f0
[   12.445983]  ? trace_preempt_on+0x20/0xc0
[   12.446005]  ? __pfx_kthread+0x10/0x10
[   12.446024]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.446106]  ? calculate_sigpending+0x7b/0xa0
[   12.446133]  ? __pfx_kthread+0x10/0x10
[   12.446153]  ret_from_fork+0x116/0x1d0
[   12.446171]  ? __pfx_kthread+0x10/0x10
[   12.446190]  ret_from_fork_asm+0x1a/0x30
[   12.446220]  </TASK>
[   12.446231] 
[   12.454176] Allocated by task 173:
[   12.454357]  kasan_save_stack+0x45/0x70
[   12.454582]  kasan_save_track+0x18/0x40
[   12.454777]  kasan_save_alloc_info+0x3b/0x50
[   12.454989]  __kasan_krealloc+0x190/0x1f0
[   12.455223]  krealloc_noprof+0xf3/0x340
[   12.455419]  krealloc_more_oob_helper+0x1a9/0x930
[   12.455675]  krealloc_more_oob+0x1c/0x30
[   12.455818]  kunit_try_run_case+0x1a5/0x480
[   12.455962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.456393]  kthread+0x337/0x6f0
[   12.456572]  ret_from_fork+0x116/0x1d0
[   12.456791]  ret_from_fork_asm+0x1a/0x30
[   12.456990] 
[   12.457174] The buggy address belongs to the object at ffff888100346400
[   12.457174]  which belongs to the cache kmalloc-256 of size 256
[   12.457610] The buggy address is located 5 bytes to the right of
[   12.457610]  allocated 235-byte region [ffff888100346400, ffff8881003464eb)
[   12.458199] 
[   12.458305] The buggy address belongs to the physical page:
[   12.460633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.460934] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.461380] flags: 0x200000000000040(head|node=0|zone=2)
[   12.461632] page_type: f5(slab)
[   12.461795] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.462168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.462515] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.462819] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.463190] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.463501] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.463834] page dumped because: kasan: bad access detected
[   12.464244] 
[   12.464341] Memory state around the buggy address:
[   12.464555]  ffff888100346380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.464864]  ffff888100346400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.465244] >ffff888100346480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.465529]                                                              ^
[   12.465813]  ffff888100346500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.466823]  ffff888100346580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.467224] ==================================================================
[   12.659954] ==================================================================
[   12.660465] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.661343] Write of size 1 at addr ffff888102b6a0f0 by task kunit_try_catch/177
[   12.661645] 
[   12.661764] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.661809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.661820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.661842] Call Trace:
[   12.661860]  <TASK>
[   12.661878]  dump_stack_lvl+0x73/0xb0
[   12.661907]  print_report+0xd1/0x650
[   12.661929]  ? __virt_addr_valid+0x1db/0x2d0
[   12.661951]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.661973]  ? kasan_addr_to_slab+0x11/0xa0
[   12.661993]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.662015]  kasan_report+0x141/0x180
[   12.662036]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.662074]  __asan_report_store1_noabort+0x1b/0x30
[   12.662096]  krealloc_more_oob_helper+0x7eb/0x930
[   12.662118]  ? __schedule+0x10cc/0x2b60
[   12.662140]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.662164]  ? finish_task_switch.isra.0+0x153/0x700
[   12.662185]  ? __switch_to+0x47/0xf50
[   12.662211]  ? __schedule+0x10cc/0x2b60
[   12.662232]  ? __pfx_read_tsc+0x10/0x10
[   12.662255]  krealloc_large_more_oob+0x1c/0x30
[   12.662277]  kunit_try_run_case+0x1a5/0x480
[   12.662300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.662322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.662346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.662368]  ? __kthread_parkme+0x82/0x180
[   12.662388]  ? preempt_count_sub+0x50/0x80
[   12.662409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.662432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.662453]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.662475]  kthread+0x337/0x6f0
[   12.662493]  ? trace_preempt_on+0x20/0xc0
[   12.662515]  ? __pfx_kthread+0x10/0x10
[   12.662534]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.662555]  ? calculate_sigpending+0x7b/0xa0
[   12.662578]  ? __pfx_kthread+0x10/0x10
[   12.662599]  ret_from_fork+0x116/0x1d0
[   12.662616]  ? __pfx_kthread+0x10/0x10
[   12.662636]  ret_from_fork_asm+0x1a/0x30
[   12.662666]  </TASK>
[   12.662677] 
[   12.674737] The buggy address belongs to the physical page:
[   12.675151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68
[   12.675623] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.676148] flags: 0x200000000000040(head|node=0|zone=2)
[   12.676547] page_type: f8(unknown)
[   12.676823] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.677352] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.677922] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.678297] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.678978] head: 0200000000000002 ffffea00040ada01 00000000ffffffff 00000000ffffffff
[   12.679672] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.680165] page dumped because: kasan: bad access detected
[   12.680517] 
[   12.680641] Memory state around the buggy address:
[   12.681015]  ffff888102b69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.681456]  ffff888102b6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.681896] >ffff888102b6a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.682478]                                                              ^
[   12.682920]  ffff888102b6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.683447]  ffff888102b6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.683841] ==================================================================
[   12.636302] ==================================================================
[   12.636766] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.637331] Write of size 1 at addr ffff888102b6a0eb by task kunit_try_catch/177
[   12.637926] 
[   12.638066] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.638222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.638236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.638258] Call Trace:
[   12.638270]  <TASK>
[   12.638288]  dump_stack_lvl+0x73/0xb0
[   12.638319]  print_report+0xd1/0x650
[   12.638340]  ? __virt_addr_valid+0x1db/0x2d0
[   12.638363]  ? krealloc_more_oob_helper+0x821/0x930
[   12.638385]  ? kasan_addr_to_slab+0x11/0xa0
[   12.638405]  ? krealloc_more_oob_helper+0x821/0x930
[   12.638427]  kasan_report+0x141/0x180
[   12.638448]  ? krealloc_more_oob_helper+0x821/0x930
[   12.638475]  __asan_report_store1_noabort+0x1b/0x30
[   12.638498]  krealloc_more_oob_helper+0x821/0x930
[   12.638519]  ? __schedule+0x10cc/0x2b60
[   12.638541]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.638675]  ? finish_task_switch.isra.0+0x153/0x700
[   12.638701]  ? __switch_to+0x47/0xf50
[   12.638728]  ? __schedule+0x10cc/0x2b60
[   12.638748]  ? __pfx_read_tsc+0x10/0x10
[   12.638772]  krealloc_large_more_oob+0x1c/0x30
[   12.638794]  kunit_try_run_case+0x1a5/0x480
[   12.638818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.638839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.638862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.638883]  ? __kthread_parkme+0x82/0x180
[   12.638903]  ? preempt_count_sub+0x50/0x80
[   12.638925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.638947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.638969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.638991]  kthread+0x337/0x6f0
[   12.639009]  ? trace_preempt_on+0x20/0xc0
[   12.639031]  ? __pfx_kthread+0x10/0x10
[   12.639078]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.639099]  ? calculate_sigpending+0x7b/0xa0
[   12.639122]  ? __pfx_kthread+0x10/0x10
[   12.639143]  ret_from_fork+0x116/0x1d0
[   12.639160]  ? __pfx_kthread+0x10/0x10
[   12.639180]  ret_from_fork_asm+0x1a/0x30
[   12.639210]  </TASK>
[   12.639222] 
[   12.650632] The buggy address belongs to the physical page:
[   12.651061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68
[   12.651659] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.651981] flags: 0x200000000000040(head|node=0|zone=2)
[   12.652357] page_type: f8(unknown)
[   12.652808] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.653440] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.653970] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.654438] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.654851] head: 0200000000000002 ffffea00040ada01 00000000ffffffff 00000000ffffffff
[   12.655376] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.655687] page dumped because: kasan: bad access detected
[   12.656096] 
[   12.656281] Memory state around the buggy address:
[   12.656489]  ffff888102b69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.657098]  ffff888102b6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.657659] >ffff888102b6a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.658098]                                                           ^
[   12.658458]  ffff888102b6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.658931]  ffff888102b6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.659454] ==================================================================