Hay
Date
July 15, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.671070] ==================================================================
[   17.671131] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.671636] Write of size 1 at addr fff00000c1c500eb by task kunit_try_catch/158
[   17.671856] 
[   17.671949] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.672199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.672256] Hardware name: linux,dummy-virt (DT)
[   17.672386] Call trace:
[   17.672409]  show_stack+0x20/0x38 (C)
[   17.672465]  dump_stack_lvl+0x8c/0xd0
[   17.672512]  print_report+0x118/0x5d0
[   17.672605]  kasan_report+0xdc/0x128
[   17.672656]  __asan_report_store1_noabort+0x20/0x30
[   17.672705]  krealloc_more_oob_helper+0x60c/0x678
[   17.672753]  krealloc_more_oob+0x20/0x38
[   17.672804]  kunit_try_run_case+0x170/0x3f0
[   17.672868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.672934]  kthread+0x328/0x630
[   17.672979]  ret_from_fork+0x10/0x20
[   17.673038] 
[   17.673056] Allocated by task 158:
[   17.673095]  kasan_save_stack+0x3c/0x68
[   17.673142]  kasan_save_track+0x20/0x40
[   17.673188]  kasan_save_alloc_info+0x40/0x58
[   17.673283]  __kasan_krealloc+0x118/0x178
[   17.673851]  krealloc_noprof+0x128/0x360
[   17.673970]  krealloc_more_oob_helper+0x168/0x678
[   17.674039]  krealloc_more_oob+0x20/0x38
[   17.674093]  kunit_try_run_case+0x170/0x3f0
[   17.674418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.674745]  kthread+0x328/0x630
[   17.674854]  ret_from_fork+0x10/0x20
[   17.675333] 
[   17.675394] The buggy address belongs to the object at fff00000c1c50000
[   17.675394]  which belongs to the cache kmalloc-256 of size 256
[   17.675553] The buggy address is located 0 bytes to the right of
[   17.675553]  allocated 235-byte region [fff00000c1c50000, fff00000c1c500eb)
[   17.675664] 
[   17.675857] The buggy address belongs to the physical page:
[   17.676078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.676158] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.676322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.676428] page_type: f5(slab)
[   17.676685] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.676757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.676808] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.676939] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.677114] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.677225] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.677427] page dumped because: kasan: bad access detected
[   17.677584] 
[   17.677736] Memory state around the buggy address:
[   17.677856]  fff00000c1c4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.677922]  fff00000c1c50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.678037] >fff00000c1c50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.678134]                                                           ^
[   17.678176]  fff00000c1c50100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.678429]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.678572] ==================================================================
[   17.682064] ==================================================================
[   17.682406] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.682624] Write of size 1 at addr fff00000c1c500f0 by task kunit_try_catch/158
[   17.682776] 
[   17.682813] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.682893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.682919] Hardware name: linux,dummy-virt (DT)
[   17.682956] Call trace:
[   17.682976]  show_stack+0x20/0x38 (C)
[   17.683397]  dump_stack_lvl+0x8c/0xd0
[   17.683477]  print_report+0x118/0x5d0
[   17.683522]  kasan_report+0xdc/0x128
[   17.683566]  __asan_report_store1_noabort+0x20/0x30
[   17.683677]  krealloc_more_oob_helper+0x5c0/0x678
[   17.683753]  krealloc_more_oob+0x20/0x38
[   17.683797]  kunit_try_run_case+0x170/0x3f0
[   17.683903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.683959]  kthread+0x328/0x630
[   17.684006]  ret_from_fork+0x10/0x20
[   17.684388] 
[   17.684478] Allocated by task 158:
[   17.684536]  kasan_save_stack+0x3c/0x68
[   17.684578]  kasan_save_track+0x20/0x40
[   17.684613]  kasan_save_alloc_info+0x40/0x58
[   17.684658]  __kasan_krealloc+0x118/0x178
[   17.684928]  krealloc_noprof+0x128/0x360
[   17.685165]  krealloc_more_oob_helper+0x168/0x678
[   17.685229]  krealloc_more_oob+0x20/0x38
[   17.685310]  kunit_try_run_case+0x170/0x3f0
[   17.685455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.685748]  kthread+0x328/0x630
[   17.685941]  ret_from_fork+0x10/0x20
[   17.686040] 
[   17.686098] The buggy address belongs to the object at fff00000c1c50000
[   17.686098]  which belongs to the cache kmalloc-256 of size 256
[   17.686302] The buggy address is located 5 bytes to the right of
[   17.686302]  allocated 235-byte region [fff00000c1c50000, fff00000c1c500eb)
[   17.686401] 
[   17.686421] The buggy address belongs to the physical page:
[   17.686729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.686926] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.686978] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.687038] page_type: f5(slab)
[   17.687128] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.687201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.687262] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.687318] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.687383] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.687460] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.687510] page dumped because: kasan: bad access detected
[   17.687547] 
[   17.687565] Memory state around the buggy address:
[   17.687596]  fff00000c1c4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.687646]  fff00000c1c50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.687688] >fff00000c1c50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.687725]                                                              ^
[   17.687765]  fff00000c1c50100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.687807]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.687845] ==================================================================
[   17.758923] ==================================================================
[   17.759087] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.759143] Write of size 1 at addr fff00000c78860f0 by task kunit_try_catch/162
[   17.759501] 
[   17.759556] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.759708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.759775] Hardware name: linux,dummy-virt (DT)
[   17.759823] Call trace:
[   17.759922]  show_stack+0x20/0x38 (C)
[   17.759976]  dump_stack_lvl+0x8c/0xd0
[   17.760022]  print_report+0x118/0x5d0
[   17.760066]  kasan_report+0xdc/0x128
[   17.760123]  __asan_report_store1_noabort+0x20/0x30
[   17.760327]  krealloc_more_oob_helper+0x5c0/0x678
[   17.760503]  krealloc_large_more_oob+0x20/0x38
[   17.760651]  kunit_try_run_case+0x170/0x3f0
[   17.760737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.760799]  kthread+0x328/0x630
[   17.760843]  ret_from_fork+0x10/0x20
[   17.760889] 
[   17.761727] The buggy address belongs to the physical page:
[   17.761825] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.761905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.761986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.762225] page_type: f8(unknown)
[   17.762675] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.763066] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.763132] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.763270] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.763357] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.763527] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.763568] page dumped because: kasan: bad access detected
[   17.763750] 
[   17.763789] Memory state around the buggy address:
[   17.763822]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.764314]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.764428] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.764524]                                                              ^
[   17.764675]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.764737]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.764831] ==================================================================
[   17.751416] ==================================================================
[   17.751860] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.751999] Write of size 1 at addr fff00000c78860eb by task kunit_try_catch/162
[   17.752095] 
[   17.752130] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.752370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.752592] Hardware name: linux,dummy-virt (DT)
[   17.752655] Call trace:
[   17.752747]  show_stack+0x20/0x38 (C)
[   17.752842]  dump_stack_lvl+0x8c/0xd0
[   17.752917]  print_report+0x118/0x5d0
[   17.753016]  kasan_report+0xdc/0x128
[   17.753081]  __asan_report_store1_noabort+0x20/0x30
[   17.753157]  krealloc_more_oob_helper+0x60c/0x678
[   17.753223]  krealloc_large_more_oob+0x20/0x38
[   17.753270]  kunit_try_run_case+0x170/0x3f0
[   17.753513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.753733]  kthread+0x328/0x630
[   17.753848]  ret_from_fork+0x10/0x20
[   17.753898] 
[   17.753919] The buggy address belongs to the physical page:
[   17.754079] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.754338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.754563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.754754] page_type: f8(unknown)
[   17.755102] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.755314] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.755587] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.755751] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.755840] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.755896] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.756065] page dumped because: kasan: bad access detected
[   17.756105] 
[   17.756123] Memory state around the buggy address:
[   17.756326]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.756378]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.756443] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.756494]                                                           ^
[   17.756551]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.756593]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.756631] ==================================================================

[   10.627242] ==================================================================
[   10.627551] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.628044] Write of size 1 at addr ffff8881003538f0 by task kunit_try_catch/175
[   10.628350] 
[   10.628465] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   10.628505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.628528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.628545] Call Trace:
[   10.628559]  <TASK>
[   10.628572]  dump_stack_lvl+0x73/0xb0
[   10.628595]  print_report+0xd1/0x610
[   10.628616]  ? __virt_addr_valid+0x1db/0x2d0
[   10.628637]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.628681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.628702]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.628721]  kasan_report+0x141/0x180
[   10.628743]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.628767]  __asan_report_store1_noabort+0x1b/0x30
[   10.628786]  krealloc_more_oob_helper+0x7eb/0x930
[   10.628807]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.628825]  ? irqentry_exit+0x2a/0x60
[   10.628843]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   10.628867]  ? __pfx_krealloc_more_oob+0x10/0x10
[   10.628971]  krealloc_more_oob+0x1c/0x30
[   10.629009]  kunit_try_run_case+0x1a5/0x480
[   10.629030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.629048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.629070]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.629093]  ? __kthread_parkme+0x82/0x180
[   10.629117]  ? preempt_count_sub+0x50/0x80
[   10.629144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.629162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.629184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.629206]  kthread+0x337/0x6f0
[   10.629221]  ? trace_preempt_on+0x20/0xc0
[   10.629252]  ? __pfx_kthread+0x10/0x10
[   10.629269]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.629290]  ? calculate_sigpending+0x7b/0xa0
[   10.629323]  ? __pfx_kthread+0x10/0x10
[   10.629341]  ret_from_fork+0x41/0x80
[   10.629368]  ? __pfx_kthread+0x10/0x10
[   10.629386]  ret_from_fork_asm+0x1a/0x30
[   10.629429]  </TASK>
[   10.629439] 
[   10.639447] Allocated by task 175:
[   10.639589]  kasan_save_stack+0x45/0x70
[   10.639912]  kasan_save_track+0x18/0x40
[   10.640126]  kasan_save_alloc_info+0x3b/0x50
[   10.640445]  __kasan_krealloc+0x190/0x1f0
[   10.640620]  krealloc_noprof+0xf3/0x340
[   10.640749]  krealloc_more_oob_helper+0x1a9/0x930
[   10.640910]  krealloc_more_oob+0x1c/0x30
[   10.641134]  kunit_try_run_case+0x1a5/0x480
[   10.641331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.641572]  kthread+0x337/0x6f0
[   10.641701]  ret_from_fork+0x41/0x80
[   10.642026]  ret_from_fork_asm+0x1a/0x30
[   10.642247] 
[   10.642342] The buggy address belongs to the object at ffff888100353800
[   10.642342]  which belongs to the cache kmalloc-256 of size 256
[   10.642970] The buggy address is located 5 bytes to the right of
[   10.642970]  allocated 235-byte region [ffff888100353800, ffff8881003538eb)
[   10.643486] 
[   10.643583] The buggy address belongs to the physical page:
[   10.643914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100352
[   10.644263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.644497] flags: 0x200000000000040(head|node=0|zone=2)
[   10.644676] page_type: f5(slab)
[   10.644981] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.645566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.645787] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.646124] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.646582] head: 0200000000000001 ffffea000400d481 00000000ffffffff 00000000ffffffff
[   10.647166] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.647510] page dumped because: kasan: bad access detected
[   10.647727] 
[   10.647829] Memory state around the buggy address:
[   10.648002]  ffff888100353780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.648531]  ffff888100353800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.648869] >ffff888100353880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.649278]                                                              ^
[   10.649556]  ffff888100353900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.649994]  ffff888100353980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.650206] ==================================================================
[   10.802004] ==================================================================
[   10.802286] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.802606] Write of size 1 at addr ffff888102aae0f0 by task kunit_try_catch/179
[   10.802936] 
[   10.803057] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   10.803097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.803107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.803124] Call Trace:
[   10.803136]  <TASK>
[   10.803149]  dump_stack_lvl+0x73/0xb0
[   10.803171]  print_report+0xd1/0x610
[   10.803192]  ? __virt_addr_valid+0x1db/0x2d0
[   10.803212]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.803230]  ? kasan_addr_to_slab+0x11/0xa0
[   10.803250]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.803269]  kasan_report+0x141/0x180
[   10.803291]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.803315]  __asan_report_store1_noabort+0x1b/0x30
[   10.803335]  krealloc_more_oob_helper+0x7eb/0x930
[   10.803353]  ? __schedule+0x10cc/0x2b60
[   10.803374]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.803394]  ? finish_task_switch.isra.0+0x153/0x700
[   10.803415]  ? __switch_to+0x5d9/0xf60
[   10.803433]  ? dequeue_task_fair+0x156/0x4e0
[   10.803455]  ? __schedule+0x10cc/0x2b60
[   10.803476]  ? __pfx_read_tsc+0x10/0x10
[   10.803498]  krealloc_large_more_oob+0x1c/0x30
[   10.803516]  kunit_try_run_case+0x1a5/0x480
[   10.803535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.803552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.803575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.803597]  ? __kthread_parkme+0x82/0x180
[   10.803617]  ? preempt_count_sub+0x50/0x80
[   10.803640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.803659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.803681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.803702]  kthread+0x337/0x6f0
[   10.803718]  ? trace_preempt_on+0x20/0xc0
[   10.803740]  ? __pfx_kthread+0x10/0x10
[   10.803757]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.803777]  ? calculate_sigpending+0x7b/0xa0
[   10.803797]  ? __pfx_kthread+0x10/0x10
[   10.803815]  ret_from_fork+0x41/0x80
[   10.803834]  ? __pfx_kthread+0x10/0x10
[   10.803850]  ret_from_fork_asm+0x1a/0x30
[   10.803908]  </TASK>
[   10.803918] 
[   10.811577] The buggy address belongs to the physical page:
[   10.811785] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aac
[   10.812160] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.812496] flags: 0x200000000000040(head|node=0|zone=2)
[   10.812752] page_type: f8(unknown)
[   10.813082] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.813383] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.813653] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.814049] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.814333] head: 0200000000000002 ffffea00040aab01 00000000ffffffff 00000000ffffffff
[   10.814564] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.814788] page dumped because: kasan: bad access detected
[   10.815043] 
[   10.815134] Memory state around the buggy address:
[   10.815470]  ffff888102aadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.815778]  ffff888102aae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.816179] >ffff888102aae080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   10.816403]                                                              ^
[   10.816604]  ffff888102aae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.816900]  ffff888102aae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.817225] ==================================================================
[   10.779852] ==================================================================
[   10.780294] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.780591] Write of size 1 at addr ffff888102aae0eb by task kunit_try_catch/179
[   10.780954] 
[   10.781068] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   10.781111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.781122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.781146] Call Trace:
[   10.781159]  <TASK>
[   10.781173]  dump_stack_lvl+0x73/0xb0
[   10.781200]  print_report+0xd1/0x610
[   10.781221]  ? __virt_addr_valid+0x1db/0x2d0
[   10.781242]  ? krealloc_more_oob_helper+0x821/0x930
[   10.781261]  ? kasan_addr_to_slab+0x11/0xa0
[   10.781281]  ? krealloc_more_oob_helper+0x821/0x930
[   10.781301]  kasan_report+0x141/0x180
[   10.781322]  ? krealloc_more_oob_helper+0x821/0x930
[   10.781346]  __asan_report_store1_noabort+0x1b/0x30
[   10.781368]  krealloc_more_oob_helper+0x821/0x930
[   10.781386]  ? __schedule+0x10cc/0x2b60
[   10.781409]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.781429]  ? finish_task_switch.isra.0+0x153/0x700
[   10.781452]  ? __switch_to+0x5d9/0xf60
[   10.781472]  ? dequeue_task_fair+0x156/0x4e0
[   10.781495]  ? __schedule+0x10cc/0x2b60
[   10.781517]  ? __pfx_read_tsc+0x10/0x10
[   10.781539]  krealloc_large_more_oob+0x1c/0x30
[   10.781557]  kunit_try_run_case+0x1a5/0x480
[   10.781577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.781595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.781618]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.781641]  ? __kthread_parkme+0x82/0x180
[   10.781662]  ? preempt_count_sub+0x50/0x80
[   10.781685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.781704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.781726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.781747]  kthread+0x337/0x6f0
[   10.781763]  ? trace_preempt_on+0x20/0xc0
[   10.781785]  ? __pfx_kthread+0x10/0x10
[   10.781802]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.781823]  ? calculate_sigpending+0x7b/0xa0
[   10.781843]  ? __pfx_kthread+0x10/0x10
[   10.781860]  ret_from_fork+0x41/0x80
[   10.781889]  ? __pfx_kthread+0x10/0x10
[   10.781906]  ret_from_fork_asm+0x1a/0x30
[   10.781936]  </TASK>
[   10.781946] 
[   10.794204] The buggy address belongs to the physical page:
[   10.794672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aac
[   10.795478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.796231] flags: 0x200000000000040(head|node=0|zone=2)
[   10.796707] page_type: f8(unknown)
[   10.796856] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.797462] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.797692] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.797972] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.798398] head: 0200000000000002 ffffea00040aab01 00000000ffffffff 00000000ffffffff
[   10.798671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.799052] page dumped because: kasan: bad access detected
[   10.799261] 
[   10.799354] Memory state around the buggy address:
[   10.799561]  ffff888102aadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.799809]  ffff888102aae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.800146] >ffff888102aae080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   10.800388]                                                           ^
[   10.800675]  ffff888102aae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.800902]  ffff888102aae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.801262] ==================================================================
[   10.598176] ==================================================================
[   10.598617] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.598952] Write of size 1 at addr ffff8881003538eb by task kunit_try_catch/175
[   10.599697] 
[   10.600087] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   10.600133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.600144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.600163] Call Trace:
[   10.600173]  <TASK>
[   10.600186]  dump_stack_lvl+0x73/0xb0
[   10.600209]  print_report+0xd1/0x610
[   10.600231]  ? __virt_addr_valid+0x1db/0x2d0
[   10.600252]  ? krealloc_more_oob_helper+0x821/0x930
[   10.600270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.600292]  ? krealloc_more_oob_helper+0x821/0x930
[   10.600311]  kasan_report+0x141/0x180
[   10.600332]  ? krealloc_more_oob_helper+0x821/0x930
[   10.600356]  __asan_report_store1_noabort+0x1b/0x30
[   10.600376]  krealloc_more_oob_helper+0x821/0x930
[   10.600397]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.600415]  ? irqentry_exit+0x2a/0x60
[   10.600433]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   10.600458]  ? __pfx_krealloc_more_oob+0x10/0x10
[   10.600479]  krealloc_more_oob+0x1c/0x30
[   10.600496]  kunit_try_run_case+0x1a5/0x480
[   10.600516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.600533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.600556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.600578]  ? __kthread_parkme+0x82/0x180
[   10.600602]  ? preempt_count_sub+0x50/0x80
[   10.600625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.600644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.600666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.600688]  kthread+0x337/0x6f0
[   10.600704]  ? trace_preempt_on+0x20/0xc0
[   10.600726]  ? __pfx_kthread+0x10/0x10
[   10.600743]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.600764]  ? calculate_sigpending+0x7b/0xa0
[   10.600786]  ? __pfx_kthread+0x10/0x10
[   10.600804]  ret_from_fork+0x41/0x80
[   10.600831]  ? __pfx_kthread+0x10/0x10
[   10.600848]  ret_from_fork_asm+0x1a/0x30
[   10.600895]  </TASK>
[   10.600905] 
[   10.615377] Allocated by task 175:
[   10.615877]  kasan_save_stack+0x45/0x70
[   10.616148]  kasan_save_track+0x18/0x40
[   10.616286]  kasan_save_alloc_info+0x3b/0x50
[   10.616430]  __kasan_krealloc+0x190/0x1f0
[   10.616568]  krealloc_noprof+0xf3/0x340
[   10.616704]  krealloc_more_oob_helper+0x1a9/0x930
[   10.616873]  krealloc_more_oob+0x1c/0x30
[   10.617057]  kunit_try_run_case+0x1a5/0x480
[   10.617266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.617519]  kthread+0x337/0x6f0
[   10.617666]  ret_from_fork+0x41/0x80
[   10.618004]  ret_from_fork_asm+0x1a/0x30
[   10.618209] 
[   10.618305] The buggy address belongs to the object at ffff888100353800
[   10.618305]  which belongs to the cache kmalloc-256 of size 256
[   10.618912] The buggy address is located 0 bytes to the right of
[   10.618912]  allocated 235-byte region [ffff888100353800, ffff8881003538eb)
[   10.619296] 
[   10.619392] The buggy address belongs to the physical page:
[   10.619652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100352
[   10.620083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.620514] flags: 0x200000000000040(head|node=0|zone=2)
[   10.620697] page_type: f5(slab)
[   10.621088] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.621504] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.622032] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.622336] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.622631] head: 0200000000000001 ffffea000400d481 00000000ffffffff 00000000ffffffff
[   10.623209] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.623571] page dumped because: kasan: bad access detected
[   10.623926] 
[   10.624047] Memory state around the buggy address:
[   10.624267]  ffff888100353780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.624545]  ffff888100353800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.624899] >ffff888100353880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.625361]                                                           ^
[   10.625677]  ffff888100353900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.626029]  ffff888100353980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.626566] ==================================================================