Hay
Date
May 26, 2025, 9:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.120105] ==================================================================
[   17.120239] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.120440] Write of size 1 at addr fff00000c6322ef0 by task kunit_try_catch/156
[   17.120666] 
[   17.120750] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.121207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.121528] Hardware name: linux,dummy-virt (DT)
[   17.121616] Call trace:
[   17.121776]  show_stack+0x20/0x38 (C)
[   17.121911]  dump_stack_lvl+0x8c/0xd0
[   17.122020]  print_report+0x118/0x608
[   17.122527]  kasan_report+0xdc/0x128
[   17.122656]  __asan_report_store1_noabort+0x20/0x30
[   17.122840]  krealloc_more_oob_helper+0x5c0/0x678
[   17.122970]  krealloc_more_oob+0x20/0x38
[   17.123122]  kunit_try_run_case+0x170/0x3f0
[   17.123231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.123347]  kthread+0x328/0x630
[   17.123688]  ret_from_fork+0x10/0x20
[   17.124058] 
[   17.124101] Allocated by task 156:
[   17.124406]  kasan_save_stack+0x3c/0x68
[   17.124554]  kasan_save_track+0x20/0x40
[   17.124666]  kasan_save_alloc_info+0x40/0x58
[   17.125240]  __kasan_krealloc+0x118/0x178
[   17.125352]  krealloc_noprof+0x128/0x360
[   17.125672]  krealloc_more_oob_helper+0x168/0x678
[   17.125813]  krealloc_more_oob+0x20/0x38
[   17.125911]  kunit_try_run_case+0x170/0x3f0
[   17.125996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.126315]  kthread+0x328/0x630
[   17.126398]  ret_from_fork+0x10/0x20
[   17.126477] 
[   17.126980] The buggy address belongs to the object at fff00000c6322e00
[   17.126980]  which belongs to the cache kmalloc-256 of size 256
[   17.127150] The buggy address is located 5 bytes to the right of
[   17.127150]  allocated 235-byte region [fff00000c6322e00, fff00000c6322eeb)
[   17.127294] 
[   17.127645] The buggy address belongs to the physical page:
[   17.127915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.128066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.128273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.128511] page_type: f5(slab)
[   17.128667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.128995] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.129219] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.129340] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.129979] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.130198] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.130280] page dumped because: kasan: bad access detected
[   17.130491] 
[   17.130646] Memory state around the buggy address:
[   17.130938]  fff00000c6322d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.131058]  fff00000c6322e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.131165] >fff00000c6322e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.131251]                                                              ^
[   17.131339]  fff00000c6322f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.131418]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.131711] ==================================================================
[   17.100834] ==================================================================
[   17.101009] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.101146] Write of size 1 at addr fff00000c6322eeb by task kunit_try_catch/156
[   17.101258] 
[   17.102756] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.103786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.104109] Hardware name: linux,dummy-virt (DT)
[   17.104247] Call trace:
[   17.104296]  show_stack+0x20/0x38 (C)
[   17.104860]  dump_stack_lvl+0x8c/0xd0
[   17.105467]  print_report+0x118/0x608
[   17.106353]  kasan_report+0xdc/0x128
[   17.106896]  __asan_report_store1_noabort+0x20/0x30
[   17.107202]  krealloc_more_oob_helper+0x60c/0x678
[   17.108111]  krealloc_more_oob+0x20/0x38
[   17.108434]  kunit_try_run_case+0x170/0x3f0
[   17.108702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.108963]  kthread+0x328/0x630
[   17.109531]  ret_from_fork+0x10/0x20
[   17.109798] 
[   17.109838] Allocated by task 156:
[   17.109933]  kasan_save_stack+0x3c/0x68
[   17.110103]  kasan_save_track+0x20/0x40
[   17.110182]  kasan_save_alloc_info+0x40/0x58
[   17.110272]  __kasan_krealloc+0x118/0x178
[   17.110366]  krealloc_noprof+0x128/0x360
[   17.111332]  krealloc_more_oob_helper+0x168/0x678
[   17.111971]  krealloc_more_oob+0x20/0x38
[   17.112226]  kunit_try_run_case+0x170/0x3f0
[   17.112331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.112421]  kthread+0x328/0x630
[   17.112505]  ret_from_fork+0x10/0x20
[   17.112584] 
[   17.112633] The buggy address belongs to the object at fff00000c6322e00
[   17.112633]  which belongs to the cache kmalloc-256 of size 256
[   17.112931] The buggy address is located 0 bytes to the right of
[   17.112931]  allocated 235-byte region [fff00000c6322e00, fff00000c6322eeb)
[   17.113251] 
[   17.113349] The buggy address belongs to the physical page:
[   17.113502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.113736] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.113880] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.114327] page_type: f5(slab)
[   17.114604] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.114743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.114933] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.115112] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.115206] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.115749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.115879] page dumped because: kasan: bad access detected
[   17.115958] 
[   17.115997] Memory state around the buggy address:
[   17.116074]  fff00000c6322d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.116179]  fff00000c6322e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.116281] >fff00000c6322e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.116643]                                                           ^
[   17.117045]  fff00000c6322f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.117149]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.117229] ==================================================================
[   17.236241] ==================================================================
[   17.236365] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.236497] Write of size 1 at addr fff00000c65b60f0 by task kunit_try_catch/160
[   17.236630] 
[   17.236712] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.236932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.237002] Hardware name: linux,dummy-virt (DT)
[   17.237074] Call trace:
[   17.237158]  show_stack+0x20/0x38 (C)
[   17.237276]  dump_stack_lvl+0x8c/0xd0
[   17.237398]  print_report+0x118/0x608
[   17.237504]  kasan_report+0xdc/0x128
[   17.237605]  __asan_report_store1_noabort+0x20/0x30
[   17.237718]  krealloc_more_oob_helper+0x5c0/0x678
[   17.237827]  krealloc_large_more_oob+0x20/0x38
[   17.237934]  kunit_try_run_case+0x170/0x3f0
[   17.238046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.238166]  kthread+0x328/0x630
[   17.238264]  ret_from_fork+0x10/0x20
[   17.238382] 
[   17.238960] The buggy address belongs to the physical page:
[   17.239102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.239311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.239427] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.239776] page_type: f8(unknown)
[   17.239980] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.240222] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.240492] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.240810] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.240972] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.241262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.241465] page dumped because: kasan: bad access detected
[   17.241534] 
[   17.241572] Memory state around the buggy address:
[   17.241643]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.241848]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.242062] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.242261]                                                              ^
[   17.242576]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.242672]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.242841] ==================================================================
[   17.228497] ==================================================================
[   17.229042] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.229199] Write of size 1 at addr fff00000c65b60eb by task kunit_try_catch/160
[   17.229316] 
[   17.229413] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.229612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.229678] Hardware name: linux,dummy-virt (DT)
[   17.229752] Call trace:
[   17.229805]  show_stack+0x20/0x38 (C)
[   17.229923]  dump_stack_lvl+0x8c/0xd0
[   17.230036]  print_report+0x118/0x608
[   17.230144]  kasan_report+0xdc/0x128
[   17.230255]  __asan_report_store1_noabort+0x20/0x30
[   17.230389]  krealloc_more_oob_helper+0x60c/0x678
[   17.230507]  krealloc_large_more_oob+0x20/0x38
[   17.230619]  kunit_try_run_case+0x170/0x3f0
[   17.230732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.231651]  kthread+0x328/0x630
[   17.231869]  ret_from_fork+0x10/0x20
[   17.232063] 
[   17.232116] The buggy address belongs to the physical page:
[   17.232256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.232434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.232761] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.232970] page_type: f8(unknown)
[   17.233069] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.233183] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.233501] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.233647] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.233770] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.233971] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.234077] page dumped because: kasan: bad access detected
[   17.234149] 
[   17.234188] Memory state around the buggy address:
[   17.234259]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.234359]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.234457] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.234543]                                                           ^
[   17.234808]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.235199]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.235307] ==================================================================


[   10.797987] ==================================================================
[   10.798686] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.799126] Write of size 1 at addr ffff888102a060f0 by task kunit_try_catch/178
[   10.799426] 
[   10.799527] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   10.799570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.799581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.799601] Call Trace:
[   10.799613]  <TASK>
[   10.799626]  dump_stack_lvl+0x73/0xb0
[   10.799651]  print_report+0xd1/0x650
[   10.799673]  ? __virt_addr_valid+0x1db/0x2d0
[   10.799695]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.799718]  ? kasan_addr_to_slab+0x11/0xa0
[   10.799738]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.799762]  kasan_report+0x141/0x180
[   10.799783]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.799811]  __asan_report_store1_noabort+0x1b/0x30
[   10.799832]  krealloc_more_oob_helper+0x7eb/0x930
[   10.799854]  ? __schedule+0x10cc/0x2b60
[   10.799877]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.799901]  ? finish_task_switch.isra.0+0x153/0x700
[   10.799922]  ? __switch_to+0x47/0xf50
[   10.799946]  ? __schedule+0x10cc/0x2b60
[   10.799968]  ? __pfx_read_tsc+0x10/0x10
[   10.799990]  krealloc_large_more_oob+0x1c/0x30
[   10.800176]  kunit_try_run_case+0x1a5/0x480
[   10.800198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.800217]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.800242]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.800266]  ? __kthread_parkme+0x82/0x180
[   10.800287]  ? preempt_count_sub+0x50/0x80
[   10.800309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.800329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.800352]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.800391]  kthread+0x337/0x6f0
[   10.800410]  ? trace_preempt_on+0x20/0xc0
[   10.800432]  ? __pfx_kthread+0x10/0x10
[   10.800452]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.800475]  ? calculate_sigpending+0x7b/0xa0
[   10.800498]  ? __pfx_kthread+0x10/0x10
[   10.800518]  ret_from_fork+0x116/0x1d0
[   10.800536]  ? __pfx_kthread+0x10/0x10
[   10.800556]  ret_from_fork_asm+0x1a/0x30
[   10.800586]  </TASK>
[   10.800596] 
[   10.808714] The buggy address belongs to the physical page:
[   10.808941] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a04
[   10.809223] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.809498] flags: 0x200000000000040(head|node=0|zone=2)
[   10.809749] page_type: f8(unknown)
[   10.809985] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.810479] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.810813] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.811230] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.811613] head: 0200000000000002 ffffea00040a8101 00000000ffffffff 00000000ffffffff
[   10.811911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.812464] page dumped because: kasan: bad access detected
[   10.812694] 
[   10.812792] Memory state around the buggy address:
[   10.813019]  ffff888102a05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.813260]  ffff888102a06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.813488] >ffff888102a06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   10.813714]                                                              ^
[   10.814117]  ffff888102a06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.814442]  ffff888102a06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.814686] ==================================================================
[   10.593721] ==================================================================
[   10.594359] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.594620] Write of size 1 at addr ffff888100a370eb by task kunit_try_catch/174
[   10.594854] 
[   10.594940] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   10.594983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.594995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.595015] Call Trace:
[   10.595025]  <TASK>
[   10.595040]  dump_stack_lvl+0x73/0xb0
[   10.595066]  print_report+0xd1/0x650
[   10.595090]  ? __virt_addr_valid+0x1db/0x2d0
[   10.595113]  ? krealloc_more_oob_helper+0x821/0x930
[   10.595136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.595158]  ? krealloc_more_oob_helper+0x821/0x930
[   10.595182]  kasan_report+0x141/0x180
[   10.595204]  ? krealloc_more_oob_helper+0x821/0x930
[   10.595233]  __asan_report_store1_noabort+0x1b/0x30
[   10.595253]  krealloc_more_oob_helper+0x821/0x930
[   10.595275]  ? __schedule+0x10cc/0x2b60
[   10.595299]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.595323]  ? finish_task_switch.isra.0+0x153/0x700
[   10.595344]  ? __switch_to+0x47/0xf50
[   10.595371]  ? __schedule+0x10cc/0x2b60
[   10.595743]  ? __pfx_read_tsc+0x10/0x10
[   10.595770]  krealloc_more_oob+0x1c/0x30
[   10.595796]  kunit_try_run_case+0x1a5/0x480
[   10.596043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.596066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.596090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.596118]  ? __kthread_parkme+0x82/0x180
[   10.596138]  ? preempt_count_sub+0x50/0x80
[   10.596160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.596181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.596204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.596228]  kthread+0x337/0x6f0
[   10.596247]  ? trace_preempt_on+0x20/0xc0
[   10.596270]  ? __pfx_kthread+0x10/0x10
[   10.596290]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.596312]  ? calculate_sigpending+0x7b/0xa0
[   10.596335]  ? __pfx_kthread+0x10/0x10
[   10.596356]  ret_from_fork+0x116/0x1d0
[   10.596373]  ? __pfx_kthread+0x10/0x10
[   10.596404]  ret_from_fork_asm+0x1a/0x30
[   10.596436]  </TASK>
[   10.596446] 
[   10.614651] Allocated by task 174:
[   10.615229]  kasan_save_stack+0x45/0x70
[   10.615774]  kasan_save_track+0x18/0x40
[   10.616414]  kasan_save_alloc_info+0x3b/0x50
[   10.617041]  __kasan_krealloc+0x190/0x1f0
[   10.617615]  krealloc_noprof+0xf3/0x340
[   10.618204]  krealloc_more_oob_helper+0x1a9/0x930
[   10.618726]  krealloc_more_oob+0x1c/0x30
[   10.619175]  kunit_try_run_case+0x1a5/0x480
[   10.619330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.619520]  kthread+0x337/0x6f0
[   10.619642]  ret_from_fork+0x116/0x1d0
[   10.619777]  ret_from_fork_asm+0x1a/0x30
[   10.620161] 
[   10.620362] The buggy address belongs to the object at ffff888100a37000
[   10.620362]  which belongs to the cache kmalloc-256 of size 256
[   10.621564] The buggy address is located 0 bytes to the right of
[   10.621564]  allocated 235-byte region [ffff888100a37000, ffff888100a370eb)
[   10.622863] 
[   10.622943] The buggy address belongs to the physical page:
[   10.623454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a36
[   10.623961] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.624630] flags: 0x200000000000040(head|node=0|zone=2)
[   10.625076] page_type: f5(slab)
[   10.625477] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.626092] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.626530] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.626873] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.627275] head: 0200000000000001 ffffea0004028d81 00000000ffffffff 00000000ffffffff
[   10.627631] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.628002] page dumped because: kasan: bad access detected
[   10.628297] 
[   10.628428] Memory state around the buggy address:
[   10.628615]  ffff888100a36f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.628937]  ffff888100a37000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.629443] >ffff888100a37080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.629725]                                                           ^
[   10.630004]  ffff888100a37100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.630361]  ffff888100a37180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.630713] ==================================================================
[   10.631631] ==================================================================
[   10.632035] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.632507] Write of size 1 at addr ffff888100a370f0 by task kunit_try_catch/174
[   10.632850] 
[   10.632952] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   10.632997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.633009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.633031] Call Trace:
[   10.633042]  <TASK>
[   10.633057]  dump_stack_lvl+0x73/0xb0
[   10.633082]  print_report+0xd1/0x650
[   10.633106]  ? __virt_addr_valid+0x1db/0x2d0
[   10.633127]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.633483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.633507]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.633531]  kasan_report+0x141/0x180
[   10.633565]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.633595]  __asan_report_store1_noabort+0x1b/0x30
[   10.633616]  krealloc_more_oob_helper+0x7eb/0x930
[   10.633647]  ? __schedule+0x10cc/0x2b60
[   10.633671]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.633706]  ? finish_task_switch.isra.0+0x153/0x700
[   10.633727]  ? __switch_to+0x47/0xf50
[   10.633752]  ? __schedule+0x10cc/0x2b60
[   10.633787]  ? __pfx_read_tsc+0x10/0x10
[   10.633810]  krealloc_more_oob+0x1c/0x30
[   10.633832]  kunit_try_run_case+0x1a5/0x480
[   10.633852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.633871]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.633895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.633919]  ? __kthread_parkme+0x82/0x180
[   10.633938]  ? preempt_count_sub+0x50/0x80
[   10.633961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.633981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.634152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.634184]  kthread+0x337/0x6f0
[   10.634204]  ? trace_preempt_on+0x20/0xc0
[   10.634227]  ? __pfx_kthread+0x10/0x10
[   10.634248]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.634272]  ? calculate_sigpending+0x7b/0xa0
[   10.634295]  ? __pfx_kthread+0x10/0x10
[   10.634316]  ret_from_fork+0x116/0x1d0
[   10.634334]  ? __pfx_kthread+0x10/0x10
[   10.634354]  ret_from_fork_asm+0x1a/0x30
[   10.634400]  </TASK>
[   10.634413] 
[   10.642535] Allocated by task 174:
[   10.642701]  kasan_save_stack+0x45/0x70
[   10.642943]  kasan_save_track+0x18/0x40
[   10.643198]  kasan_save_alloc_info+0x3b/0x50
[   10.643496]  __kasan_krealloc+0x190/0x1f0
[   10.643706]  krealloc_noprof+0xf3/0x340
[   10.644168]  krealloc_more_oob_helper+0x1a9/0x930
[   10.644437]  krealloc_more_oob+0x1c/0x30
[   10.644621]  kunit_try_run_case+0x1a5/0x480
[   10.644887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.645224]  kthread+0x337/0x6f0
[   10.645351]  ret_from_fork+0x116/0x1d0
[   10.645496]  ret_from_fork_asm+0x1a/0x30
[   10.645635] 
[   10.645724] The buggy address belongs to the object at ffff888100a37000
[   10.645724]  which belongs to the cache kmalloc-256 of size 256
[   10.646284] The buggy address is located 5 bytes to the right of
[   10.646284]  allocated 235-byte region [ffff888100a37000, ffff888100a370eb)
[   10.646990] 
[   10.647103] The buggy address belongs to the physical page:
[   10.647301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a36
[   10.647713] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.648029] flags: 0x200000000000040(head|node=0|zone=2)
[   10.648477] page_type: f5(slab)
[   10.648662] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.649054] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.649473] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.649860] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.650251] head: 0200000000000001 ffffea0004028d81 00000000ffffffff 00000000ffffffff
[   10.650567] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.650821] page dumped because: kasan: bad access detected
[   10.651070] 
[   10.651179] Memory state around the buggy address:
[   10.651584]  ffff888100a36f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.651948]  ffff888100a37000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.652283] >ffff888100a37080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.652669]                                                              ^
[   10.653103]  ffff888100a37100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.653532]  ffff888100a37180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.653903] ==================================================================
[   10.780509] ==================================================================
[   10.781367] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.781739] Write of size 1 at addr ffff888102a060eb by task kunit_try_catch/178
[   10.782144] 
[   10.782253] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   10.782299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.782311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.782332] Call Trace:
[   10.782345]  <TASK>
[   10.782362]  dump_stack_lvl+0x73/0xb0
[   10.782401]  print_report+0xd1/0x650
[   10.782423]  ? __virt_addr_valid+0x1db/0x2d0
[   10.782445]  ? krealloc_more_oob_helper+0x821/0x930
[   10.782468]  ? kasan_addr_to_slab+0x11/0xa0
[   10.782488]  ? krealloc_more_oob_helper+0x821/0x930
[   10.782512]  kasan_report+0x141/0x180
[   10.782533]  ? krealloc_more_oob_helper+0x821/0x930
[   10.782561]  __asan_report_store1_noabort+0x1b/0x30
[   10.782581]  krealloc_more_oob_helper+0x821/0x930
[   10.782603]  ? __schedule+0x10cc/0x2b60
[   10.782626]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.782650]  ? finish_task_switch.isra.0+0x153/0x700
[   10.782672]  ? __switch_to+0x47/0xf50
[   10.782697]  ? __schedule+0x10cc/0x2b60
[   10.782729]  ? __pfx_read_tsc+0x10/0x10
[   10.782753]  krealloc_large_more_oob+0x1c/0x30
[   10.782776]  kunit_try_run_case+0x1a5/0x480
[   10.782797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.782816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.782840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.782863]  ? __kthread_parkme+0x82/0x180
[   10.782882]  ? preempt_count_sub+0x50/0x80
[   10.782904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.782925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.782948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.782971]  kthread+0x337/0x6f0
[   10.782989]  ? trace_preempt_on+0x20/0xc0
[   10.783067]  ? __pfx_kthread+0x10/0x10
[   10.783089]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.783111]  ? calculate_sigpending+0x7b/0xa0
[   10.783133]  ? __pfx_kthread+0x10/0x10
[   10.783154]  ret_from_fork+0x116/0x1d0
[   10.783172]  ? __pfx_kthread+0x10/0x10
[   10.783192]  ret_from_fork_asm+0x1a/0x30
[   10.783221]  </TASK>
[   10.783232] 
[   10.790919] The buggy address belongs to the physical page:
[   10.791225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a04
[   10.791490] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.791967] flags: 0x200000000000040(head|node=0|zone=2)
[   10.792226] page_type: f8(unknown)
[   10.792412] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.792878] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.793225] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.793483] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.793820] head: 0200000000000002 ffffea00040a8101 00000000ffffffff 00000000ffffffff
[   10.794349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.794614] page dumped because: kasan: bad access detected
[   10.794831] 
[   10.794926] Memory state around the buggy address:
[   10.795168]  ffff888102a05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.795547]  ffff888102a06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.795889] >ffff888102a06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   10.796403]                                                           ^
[   10.796636]  ffff888102a06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.796936]  ffff888102a06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.797437] ==================================================================