Hay
Date
July 4, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.874408] ==================================================================
[   17.874502] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.874904] Write of size 1 at addr fff00000c5d292f0 by task kunit_try_catch/156
[   17.875446] 
[   17.875731] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.875831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.875857] Hardware name: linux,dummy-virt (DT)
[   17.876211] Call trace:
[   17.876266]  show_stack+0x20/0x38 (C)
[   17.876402]  dump_stack_lvl+0x8c/0xd0
[   17.876506]  print_report+0x118/0x608
[   17.876565]  kasan_report+0xdc/0x128
[   17.876942]  __asan_report_store1_noabort+0x20/0x30
[   17.877159]  krealloc_more_oob_helper+0x5c0/0x678
[   17.877281]  krealloc_more_oob+0x20/0x38
[   17.877406]  kunit_try_run_case+0x170/0x3f0
[   17.877511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.877672]  kthread+0x328/0x630
[   17.877752]  ret_from_fork+0x10/0x20
[   17.878056] 
[   17.878572] Allocated by task 156:
[   17.878628]  kasan_save_stack+0x3c/0x68
[   17.878757]  kasan_save_track+0x20/0x40
[   17.878897]  kasan_save_alloc_info+0x40/0x58
[   17.880076]  __kasan_krealloc+0x118/0x178
[   17.880114]  krealloc_noprof+0x128/0x360
[   17.880151]  krealloc_more_oob_helper+0x168/0x678
[   17.880189]  krealloc_more_oob+0x20/0x38
[   17.880224]  kunit_try_run_case+0x170/0x3f0
[   17.880259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.880301]  kthread+0x328/0x630
[   17.880332]  ret_from_fork+0x10/0x20
[   17.880366] 
[   17.880385] The buggy address belongs to the object at fff00000c5d29200
[   17.880385]  which belongs to the cache kmalloc-256 of size 256
[   17.880440] The buggy address is located 5 bytes to the right of
[   17.880440]  allocated 235-byte region [fff00000c5d29200, fff00000c5d292eb)
[   17.880500] 
[   17.880519] The buggy address belongs to the physical page:
[   17.880551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d28
[   17.880604] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.880648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.880699] page_type: f5(slab)
[   17.880736] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.880783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.880842] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.880888] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.880934] head: 0bfffe0000000001 ffffc1ffc3174a01 00000000ffffffff 00000000ffffffff
[   17.880982] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.881020] page dumped because: kasan: bad access detected
[   17.881171] 
[   17.881387] Memory state around the buggy address:
[   17.881430]  fff00000c5d29180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.881619]  fff00000c5d29200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.881794] >fff00000c5d29280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.881967]                                                              ^
[   17.882056]  fff00000c5d29300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.882148]  fff00000c5d29380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.882464] ==================================================================
[   17.865122] ==================================================================
[   17.865184] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.865233] Write of size 1 at addr fff00000c5d292eb by task kunit_try_catch/156
[   17.865645] 
[   17.865692] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.866016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.866071] Hardware name: linux,dummy-virt (DT)
[   17.866144] Call trace:
[   17.866214]  show_stack+0x20/0x38 (C)
[   17.866268]  dump_stack_lvl+0x8c/0xd0
[   17.866446]  print_report+0x118/0x608
[   17.866494]  kasan_report+0xdc/0x128
[   17.866567]  __asan_report_store1_noabort+0x20/0x30
[   17.866648]  krealloc_more_oob_helper+0x60c/0x678
[   17.866699]  krealloc_more_oob+0x20/0x38
[   17.866743]  kunit_try_run_case+0x170/0x3f0
[   17.866789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.866850]  kthread+0x328/0x630
[   17.866894]  ret_from_fork+0x10/0x20
[   17.867185] 
[   17.867206] Allocated by task 156:
[   17.867236]  kasan_save_stack+0x3c/0x68
[   17.867545]  kasan_save_track+0x20/0x40
[   17.867615]  kasan_save_alloc_info+0x40/0x58
[   17.867731]  __kasan_krealloc+0x118/0x178
[   17.867772]  krealloc_noprof+0x128/0x360
[   17.868242]  krealloc_more_oob_helper+0x168/0x678
[   17.868363]  krealloc_more_oob+0x20/0x38
[   17.868617]  kunit_try_run_case+0x170/0x3f0
[   17.868831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.868905]  kthread+0x328/0x630
[   17.869121]  ret_from_fork+0x10/0x20
[   17.869276] 
[   17.869414] The buggy address belongs to the object at fff00000c5d29200
[   17.869414]  which belongs to the cache kmalloc-256 of size 256
[   17.869527] The buggy address is located 0 bytes to the right of
[   17.869527]  allocated 235-byte region [fff00000c5d29200, fff00000c5d292eb)
[   17.869634] 
[   17.870058] The buggy address belongs to the physical page:
[   17.870191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d28
[   17.870325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.870373] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.870591] page_type: f5(slab)
[   17.870826] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.870899] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.871075] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.871127] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.871526] head: 0bfffe0000000001 ffffc1ffc3174a01 00000000ffffffff 00000000ffffffff
[   17.871640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.871784] page dumped because: kasan: bad access detected
[   17.871872] 
[   17.871891] Memory state around the buggy address:
[   17.872206]  fff00000c5d29180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.872253]  fff00000c5d29200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.872294] >fff00000c5d29280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.872370]                                                           ^
[   17.872431]  fff00000c5d29300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.872472]  fff00000c5d29380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.872509] ==================================================================
[   17.957872] ==================================================================
[   17.957917] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.957968] Write of size 1 at addr fff00000c76c20f0 by task kunit_try_catch/160
[   17.958015] 
[   17.958046] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.958123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.958148] Hardware name: linux,dummy-virt (DT)
[   17.958178] Call trace:
[   17.958199]  show_stack+0x20/0x38 (C)
[   17.958245]  dump_stack_lvl+0x8c/0xd0
[   17.958292]  print_report+0x118/0x608
[   17.958337]  kasan_report+0xdc/0x128
[   17.958381]  __asan_report_store1_noabort+0x20/0x30
[   17.958427]  krealloc_more_oob_helper+0x5c0/0x678
[   17.958476]  krealloc_large_more_oob+0x20/0x38
[   17.958525]  kunit_try_run_case+0x170/0x3f0
[   17.958572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.958623]  kthread+0x328/0x630
[   17.958664]  ret_from_fork+0x10/0x20
[   17.958709] 
[   17.958728] The buggy address belongs to the physical page:
[   17.958757] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0
[   17.959600] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.959894] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.960138] page_type: f8(unknown)
[   17.960187] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.960400] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.960454] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.960535] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.960681] head: 0bfffe0000000002 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff
[   17.960889] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.961069] page dumped because: kasan: bad access detected
[   17.961152] 
[   17.961257] Memory state around the buggy address:
[   17.961326]  fff00000c76c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.961417]  fff00000c76c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.961692] >fff00000c76c2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.961763]                                                              ^
[   17.961950]  fff00000c76c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.962282]  fff00000c76c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.962350] ==================================================================
[   17.953936] ==================================================================
[   17.954003] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.954070] Write of size 1 at addr fff00000c76c20eb by task kunit_try_catch/160
[   17.954119] 
[   17.954157] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.954238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.954264] Hardware name: linux,dummy-virt (DT)
[   17.954297] Call trace:
[   17.954319]  show_stack+0x20/0x38 (C)
[   17.954369]  dump_stack_lvl+0x8c/0xd0
[   17.954416]  print_report+0x118/0x608
[   17.954461]  kasan_report+0xdc/0x128
[   17.954507]  __asan_report_store1_noabort+0x20/0x30
[   17.954554]  krealloc_more_oob_helper+0x60c/0x678
[   17.954601]  krealloc_large_more_oob+0x20/0x38
[   17.954648]  kunit_try_run_case+0x170/0x3f0
[   17.954695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.954745]  kthread+0x328/0x630
[   17.955561]  ret_from_fork+0x10/0x20
[   17.955644] 
[   17.955943] The buggy address belongs to the physical page:
[   17.955983] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0
[   17.956040] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.956550] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.956613] page_type: f8(unknown)
[   17.956869] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.956923] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.956971] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.957017] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.957063] head: 0bfffe0000000002 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff
[   17.957109] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.957146] page dumped because: kasan: bad access detected
[   17.957176] 
[   17.957193] Memory state around the buggy address:
[   17.957226]  fff00000c76c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.957267]  fff00000c76c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.957307] >fff00000c76c2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.957344]                                                           ^
[   17.957381]  fff00000c76c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.957420]  fff00000c76c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.957456] ==================================================================

[   11.630500] ==================================================================
[   11.630977] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.631338] Write of size 1 at addr ffff8881027420eb by task kunit_try_catch/177
[   11.631840] 
[   11.631965] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.632015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.632027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.632049] Call Trace:
[   11.632064]  <TASK>
[   11.632083]  dump_stack_lvl+0x73/0xb0
[   11.632116]  print_report+0xd1/0x650
[   11.632140]  ? __virt_addr_valid+0x1db/0x2d0
[   11.632161]  ? krealloc_more_oob_helper+0x821/0x930
[   11.632184]  ? kasan_addr_to_slab+0x11/0xa0
[   11.632203]  ? krealloc_more_oob_helper+0x821/0x930
[   11.632238]  kasan_report+0x141/0x180
[   11.632259]  ? krealloc_more_oob_helper+0x821/0x930
[   11.632286]  __asan_report_store1_noabort+0x1b/0x30
[   11.632305]  krealloc_more_oob_helper+0x821/0x930
[   11.632326]  ? __schedule+0x10cc/0x2b60
[   11.632347]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.632369]  ? finish_task_switch.isra.0+0x153/0x700
[   11.632391]  ? __switch_to+0x47/0xf50
[   11.632415]  ? __schedule+0x10cc/0x2b60
[   11.632434]  ? __pfx_read_tsc+0x10/0x10
[   11.632457]  krealloc_large_more_oob+0x1c/0x30
[   11.632478]  kunit_try_run_case+0x1a5/0x480
[   11.632503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.632524]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.632547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.632569]  ? __kthread_parkme+0x82/0x180
[   11.632590]  ? preempt_count_sub+0x50/0x80
[   11.632611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.632633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.632655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.632676]  kthread+0x337/0x6f0
[   11.632694]  ? trace_preempt_on+0x20/0xc0
[   11.632717]  ? __pfx_kthread+0x10/0x10
[   11.632736]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.632755]  ? calculate_sigpending+0x7b/0xa0
[   11.632778]  ? __pfx_kthread+0x10/0x10
[   11.632805]  ret_from_fork+0x116/0x1d0
[   11.632822]  ? __pfx_kthread+0x10/0x10
[   11.632841]  ret_from_fork_asm+0x1a/0x30
[   11.632871]  </TASK>
[   11.632882] 
[   11.645000] The buggy address belongs to the physical page:
[   11.645349] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102740
[   11.645694] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.646010] flags: 0x200000000000040(head|node=0|zone=2)
[   11.646255] page_type: f8(unknown)
[   11.646771] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.647080] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.647525] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.647875] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.648444] head: 0200000000000002 ffffea000409d001 00000000ffffffff 00000000ffffffff
[   11.648766] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.649095] page dumped because: kasan: bad access detected
[   11.649574] 
[   11.649663] Memory state around the buggy address:
[   11.649946]  ffff888102741f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.650722]  ffff888102742000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.651136] >ffff888102742080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.651541]                                                           ^
[   11.652000]  ffff888102742100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.652592]  ffff888102742180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.652997] ==================================================================
[   11.449990] ==================================================================
[   11.451157] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.451833] Write of size 1 at addr ffff888100aa30eb by task kunit_try_catch/173
[   11.452140] 
[   11.452255] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.452308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.452320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.452345] Call Trace:
[   11.452361]  <TASK>
[   11.452381]  dump_stack_lvl+0x73/0xb0
[   11.452418]  print_report+0xd1/0x650
[   11.452441]  ? __virt_addr_valid+0x1db/0x2d0
[   11.452465]  ? krealloc_more_oob_helper+0x821/0x930
[   11.452487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.452509]  ? krealloc_more_oob_helper+0x821/0x930
[   11.452532]  kasan_report+0x141/0x180
[   11.452553]  ? krealloc_more_oob_helper+0x821/0x930
[   11.452580]  __asan_report_store1_noabort+0x1b/0x30
[   11.452599]  krealloc_more_oob_helper+0x821/0x930
[   11.452620]  ? __schedule+0x10cc/0x2b60
[   11.452641]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.452664]  ? finish_task_switch.isra.0+0x153/0x700
[   11.452686]  ? __switch_to+0x47/0xf50
[   11.452711]  ? __schedule+0x10cc/0x2b60
[   11.452731]  ? __pfx_read_tsc+0x10/0x10
[   11.452755]  krealloc_more_oob+0x1c/0x30
[   11.452775]  kunit_try_run_case+0x1a5/0x480
[   11.452809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.452829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.452852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.452890]  ? __kthread_parkme+0x82/0x180
[   11.452911]  ? preempt_count_sub+0x50/0x80
[   11.452952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.452975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.452996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.453019]  kthread+0x337/0x6f0
[   11.453037]  ? trace_preempt_on+0x20/0xc0
[   11.453059]  ? __pfx_kthread+0x10/0x10
[   11.453078]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.453098]  ? calculate_sigpending+0x7b/0xa0
[   11.453121]  ? __pfx_kthread+0x10/0x10
[   11.453141]  ret_from_fork+0x116/0x1d0
[   11.453159]  ? __pfx_kthread+0x10/0x10
[   11.453178]  ret_from_fork_asm+0x1a/0x30
[   11.453208]  </TASK>
[   11.453230] 
[   11.464063] Allocated by task 173:
[   11.464531]  kasan_save_stack+0x45/0x70
[   11.464762]  kasan_save_track+0x18/0x40
[   11.464957]  kasan_save_alloc_info+0x3b/0x50
[   11.465153]  __kasan_krealloc+0x190/0x1f0
[   11.465865]  krealloc_noprof+0xf3/0x340
[   11.466128]  krealloc_more_oob_helper+0x1a9/0x930
[   11.466780]  krealloc_more_oob+0x1c/0x30
[   11.467046]  kunit_try_run_case+0x1a5/0x480
[   11.467533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.467910]  kthread+0x337/0x6f0
[   11.468076]  ret_from_fork+0x116/0x1d0
[   11.468580]  ret_from_fork_asm+0x1a/0x30
[   11.468858] 
[   11.468957] The buggy address belongs to the object at ffff888100aa3000
[   11.468957]  which belongs to the cache kmalloc-256 of size 256
[   11.469897] The buggy address is located 0 bytes to the right of
[   11.469897]  allocated 235-byte region [ffff888100aa3000, ffff888100aa30eb)
[   11.470678] 
[   11.470783] The buggy address belongs to the physical page:
[   11.471029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa2
[   11.471867] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.472166] flags: 0x200000000000040(head|node=0|zone=2)
[   11.472675] page_type: f5(slab)
[   11.472859] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.473171] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.473851] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.474170] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.474508] head: 0200000000000001 ffffea000402a881 00000000ffffffff 00000000ffffffff
[   11.474857] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.475131] page dumped because: kasan: bad access detected
[   11.475482] 
[   11.475559] Memory state around the buggy address:
[   11.475837]  ffff888100aa2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.476118]  ffff888100aa3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.476498] >ffff888100aa3080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.476795]                                                           ^
[   11.477138]  ffff888100aa3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.477707]  ffff888100aa3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.478002] ==================================================================
[   11.653738] ==================================================================
[   11.654011] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.654303] Write of size 1 at addr ffff8881027420f0 by task kunit_try_catch/177
[   11.654630] 
[   11.654743] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.654790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.654802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.654823] Call Trace:
[   11.654845]  <TASK>
[   11.654864]  dump_stack_lvl+0x73/0xb0
[   11.654895]  print_report+0xd1/0x650
[   11.654916]  ? __virt_addr_valid+0x1db/0x2d0
[   11.654938]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.654959]  ? kasan_addr_to_slab+0x11/0xa0
[   11.654978]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.655000]  kasan_report+0x141/0x180
[   11.655020]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.655047]  __asan_report_store1_noabort+0x1b/0x30
[   11.655066]  krealloc_more_oob_helper+0x7eb/0x930
[   11.655087]  ? __schedule+0x10cc/0x2b60
[   11.655108]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.655130]  ? finish_task_switch.isra.0+0x153/0x700
[   11.655151]  ? __switch_to+0x47/0xf50
[   11.655175]  ? __schedule+0x10cc/0x2b60
[   11.655195]  ? __pfx_read_tsc+0x10/0x10
[   11.655733]  krealloc_large_more_oob+0x1c/0x30
[   11.655776]  kunit_try_run_case+0x1a5/0x480
[   11.655801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.655822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.655845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.655866]  ? __kthread_parkme+0x82/0x180
[   11.655886]  ? preempt_count_sub+0x50/0x80
[   11.655908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.655929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.655950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.655971]  kthread+0x337/0x6f0
[   11.655989]  ? trace_preempt_on+0x20/0xc0
[   11.656012]  ? __pfx_kthread+0x10/0x10
[   11.656031]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.656051]  ? calculate_sigpending+0x7b/0xa0
[   11.656074]  ? __pfx_kthread+0x10/0x10
[   11.656094]  ret_from_fork+0x116/0x1d0
[   11.656112]  ? __pfx_kthread+0x10/0x10
[   11.656131]  ret_from_fork_asm+0x1a/0x30
[   11.656160]  </TASK>
[   11.656171] 
[   11.664293] The buggy address belongs to the physical page:
[   11.664591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102740
[   11.664894] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.665279] flags: 0x200000000000040(head|node=0|zone=2)
[   11.665529] page_type: f8(unknown)
[   11.665675] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.665977] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.666352] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.666580] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.666871] head: 0200000000000002 ffffea000409d001 00000000ffffffff 00000000ffffffff
[   11.667532] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.667853] page dumped because: kasan: bad access detected
[   11.668091] 
[   11.668262] Memory state around the buggy address:
[   11.668465]  ffff888102741f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.668680]  ffff888102742000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.668984] >ffff888102742080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.669316]                                                              ^
[   11.669599]  ffff888102742100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.669843]  ffff888102742180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.670080] ==================================================================
[   11.478765] ==================================================================
[   11.479023] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.479720] Write of size 1 at addr ffff888100aa30f0 by task kunit_try_catch/173
[   11.480022] 
[   11.480156] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.480205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.480230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.480253] Call Trace:
[   11.480274]  <TASK>
[   11.480293]  dump_stack_lvl+0x73/0xb0
[   11.480328]  print_report+0xd1/0x650
[   11.480352]  ? __virt_addr_valid+0x1db/0x2d0
[   11.480373]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.480396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.480417]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.480440]  kasan_report+0x141/0x180
[   11.480533]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.480562]  __asan_report_store1_noabort+0x1b/0x30
[   11.480605]  krealloc_more_oob_helper+0x7eb/0x930
[   11.480626]  ? __schedule+0x10cc/0x2b60
[   11.480648]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.480684]  ? finish_task_switch.isra.0+0x153/0x700
[   11.480707]  ? __switch_to+0x47/0xf50
[   11.480732]  ? __schedule+0x10cc/0x2b60
[   11.480751]  ? __pfx_read_tsc+0x10/0x10
[   11.480776]  krealloc_more_oob+0x1c/0x30
[   11.480808]  kunit_try_run_case+0x1a5/0x480
[   11.480833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.480854]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.480876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.480897]  ? __kthread_parkme+0x82/0x180
[   11.480916]  ? preempt_count_sub+0x50/0x80
[   11.480937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.480959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.480980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.481018]  kthread+0x337/0x6f0
[   11.481037]  ? trace_preempt_on+0x20/0xc0
[   11.481059]  ? __pfx_kthread+0x10/0x10
[   11.481078]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.481097]  ? calculate_sigpending+0x7b/0xa0
[   11.481120]  ? __pfx_kthread+0x10/0x10
[   11.481141]  ret_from_fork+0x116/0x1d0
[   11.481158]  ? __pfx_kthread+0x10/0x10
[   11.481177]  ret_from_fork_asm+0x1a/0x30
[   11.481664]  </TASK>
[   11.481685] 
[   11.491202] Allocated by task 173:
[   11.491382]  kasan_save_stack+0x45/0x70
[   11.491668]  kasan_save_track+0x18/0x40
[   11.492073]  kasan_save_alloc_info+0x3b/0x50
[   11.492305]  __kasan_krealloc+0x190/0x1f0
[   11.492651]  krealloc_noprof+0xf3/0x340
[   11.492808]  krealloc_more_oob_helper+0x1a9/0x930
[   11.493037]  krealloc_more_oob+0x1c/0x30
[   11.493404]  kunit_try_run_case+0x1a5/0x480
[   11.493617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.493855]  kthread+0x337/0x6f0
[   11.494011]  ret_from_fork+0x116/0x1d0
[   11.494142]  ret_from_fork_asm+0x1a/0x30
[   11.494604] 
[   11.494765] The buggy address belongs to the object at ffff888100aa3000
[   11.494765]  which belongs to the cache kmalloc-256 of size 256
[   11.495324] The buggy address is located 5 bytes to the right of
[   11.495324]  allocated 235-byte region [ffff888100aa3000, ffff888100aa30eb)
[   11.495879] 
[   11.495969] The buggy address belongs to the physical page:
[   11.496239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa2
[   11.496682] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.497039] flags: 0x200000000000040(head|node=0|zone=2)
[   11.497367] page_type: f5(slab)
[   11.497495] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.497832] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.498170] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.498568] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.498898] head: 0200000000000001 ffffea000402a881 00000000ffffffff 00000000ffffffff
[   11.499199] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.499939] page dumped because: kasan: bad access detected
[   11.500567] 
[   11.500663] Memory state around the buggy address:
[   11.500869]  ffff888100aa2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.501194]  ffff888100aa3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.501631] >ffff888100aa3080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.501920]                                                              ^
[   11.502181]  ffff888100aa3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.502562]  ffff888100aa3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.502868] ==================================================================