Hay
Date
June 16, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.979617] ==================================================================
[   18.979732] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.979855] Write of size 1 at addr fff00000c604d2da by task kunit_try_catch/167
[   18.979974] 
[   18.980050] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.980249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.980313] Hardware name: linux,dummy-virt (DT)
[   18.980384] Call trace:
[   18.980432]  show_stack+0x20/0x38 (C)
[   18.980538]  dump_stack_lvl+0x8c/0xd0
[   18.980639]  print_report+0x118/0x608
[   18.980742]  kasan_report+0xdc/0x128
[   18.981624]  __asan_report_store1_noabort+0x20/0x30
[   18.981788]  krealloc_less_oob_helper+0xa80/0xc50
[   18.981947]  krealloc_less_oob+0x20/0x38
[   18.982370]  kunit_try_run_case+0x170/0x3f0
[   18.982530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.982718]  kthread+0x328/0x630
[   18.982873]  ret_from_fork+0x10/0x20
[   18.982991] 
[   18.983034] Allocated by task 167:
[   18.983097]  kasan_save_stack+0x3c/0x68
[   18.983184]  kasan_save_track+0x20/0x40
[   18.983267]  kasan_save_alloc_info+0x40/0x58
[   18.983352]  __kasan_krealloc+0x118/0x178
[   18.983437]  krealloc_noprof+0x128/0x360
[   18.983520]  krealloc_less_oob_helper+0x168/0xc50
[   18.983607]  krealloc_less_oob+0x20/0x38
[   18.983690]  kunit_try_run_case+0x170/0x3f0
[   18.983781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.983892]  kthread+0x328/0x630
[   18.983971]  ret_from_fork+0x10/0x20
[   18.984049] 
[   18.984094] The buggy address belongs to the object at fff00000c604d200
[   18.984094]  which belongs to the cache kmalloc-256 of size 256
[   18.984226] The buggy address is located 17 bytes to the right of
[   18.984226]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   18.984375] 
[   18.985262] The buggy address belongs to the physical page:
[   18.985405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.985541] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.985638] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.985785] page_type: f5(slab)
[   18.985895] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.986003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.986106] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.986195] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.986308] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.986622] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.986826] page dumped because: kasan: bad access detected
[   18.986989] 
[   18.987057] Memory state around the buggy address:
[   18.987134]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.987243]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.987351] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.987447]                                                     ^
[   18.987536]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.987642]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.987738] ==================================================================
[   19.070083] ==================================================================
[   19.070223] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.070361] Write of size 1 at addr fff00000c66160c9 by task kunit_try_catch/171
[   19.070479] 
[   19.070570] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.070786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.070855] Hardware name: linux,dummy-virt (DT)
[   19.070931] Call trace:
[   19.071121]  show_stack+0x20/0x38 (C)
[   19.071417]  dump_stack_lvl+0x8c/0xd0
[   19.071522]  print_report+0x118/0x608
[   19.071626]  kasan_report+0xdc/0x128
[   19.072157]  __asan_report_store1_noabort+0x20/0x30
[   19.072282]  krealloc_less_oob_helper+0xa48/0xc50
[   19.072400]  krealloc_large_less_oob+0x20/0x38
[   19.072511]  kunit_try_run_case+0x170/0x3f0
[   19.072625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.072744]  kthread+0x328/0x630
[   19.072854]  ret_from_fork+0x10/0x20
[   19.073159] 
[   19.073214] The buggy address belongs to the physical page:
[   19.073311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.073450] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.073604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.073773] page_type: f8(unknown)
[   19.073931] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.074074] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.074220] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.074332] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.074455] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.074593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.074705] page dumped because: kasan: bad access detected
[   19.074775] 
[   19.074816] Memory state around the buggy address:
[   19.074902]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.075339]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.075488] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.075609]                                               ^
[   19.075724]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.075932]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.076046] ==================================================================
[   18.954285] ==================================================================
[   18.954881] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.955783] Write of size 1 at addr fff00000c604d2c9 by task kunit_try_catch/167
[   18.956075] 
[   18.956256] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.956480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.956860] Hardware name: linux,dummy-virt (DT)
[   18.957154] Call trace:
[   18.957246]  show_stack+0x20/0x38 (C)
[   18.957471]  dump_stack_lvl+0x8c/0xd0
[   18.957589]  print_report+0x118/0x608
[   18.958413]  kasan_report+0xdc/0x128
[   18.958546]  __asan_report_store1_noabort+0x20/0x30
[   18.958766]  krealloc_less_oob_helper+0xa48/0xc50
[   18.959119]  krealloc_less_oob+0x20/0x38
[   18.959251]  kunit_try_run_case+0x170/0x3f0
[   18.959370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.960033]  kthread+0x328/0x630
[   18.960158]  ret_from_fork+0x10/0x20
[   18.960276] 
[   18.960492] Allocated by task 167:
[   18.960654]  kasan_save_stack+0x3c/0x68
[   18.960747]  kasan_save_track+0x20/0x40
[   18.961314]  kasan_save_alloc_info+0x40/0x58
[   18.961433]  __kasan_krealloc+0x118/0x178
[   18.961527]  krealloc_noprof+0x128/0x360
[   18.961695]  krealloc_less_oob_helper+0x168/0xc50
[   18.962092]  krealloc_less_oob+0x20/0x38
[   18.962470]  kunit_try_run_case+0x170/0x3f0
[   18.962591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.962699]  kthread+0x328/0x630
[   18.962889]  ret_from_fork+0x10/0x20
[   18.963097] 
[   18.963179] The buggy address belongs to the object at fff00000c604d200
[   18.963179]  which belongs to the cache kmalloc-256 of size 256
[   18.963557] The buggy address is located 0 bytes to the right of
[   18.963557]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   18.963786] 
[   18.964078] The buggy address belongs to the physical page:
[   18.964444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.964731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.965343] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.965499] page_type: f5(slab)
[   18.965601] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.966259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.966503] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.966852] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.967275] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.967419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.967526] page dumped because: kasan: bad access detected
[   18.967712] 
[   18.967768] Memory state around the buggy address:
[   18.968064]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.968186]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.968317] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.968412]                                               ^
[   18.968501]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.968607]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.968704] ==================================================================
[   19.002525] ==================================================================
[   19.002592] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.002658] Write of size 1 at addr fff00000c604d2eb by task kunit_try_catch/167
[   19.002713] 
[   19.002758] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.002882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.002915] Hardware name: linux,dummy-virt (DT)
[   19.002951] Call trace:
[   19.002978]  show_stack+0x20/0x38 (C)
[   19.003034]  dump_stack_lvl+0x8c/0xd0
[   19.003086]  print_report+0x118/0x608
[   19.003137]  kasan_report+0xdc/0x128
[   19.003187]  __asan_report_store1_noabort+0x20/0x30
[   19.003240]  krealloc_less_oob_helper+0xa58/0xc50
[   19.003292]  krealloc_less_oob+0x20/0x38
[   19.003342]  kunit_try_run_case+0x170/0x3f0
[   19.003393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.003449]  kthread+0x328/0x630
[   19.003495]  ret_from_fork+0x10/0x20
[   19.003548] 
[   19.003570] Allocated by task 167:
[   19.003603]  kasan_save_stack+0x3c/0x68
[   19.003650]  kasan_save_track+0x20/0x40
[   19.003692]  kasan_save_alloc_info+0x40/0x58
[   19.003731]  __kasan_krealloc+0x118/0x178
[   19.003772]  krealloc_noprof+0x128/0x360
[   19.003813]  krealloc_less_oob_helper+0x168/0xc50
[   19.003953]  krealloc_less_oob+0x20/0x38
[   19.004050]  kunit_try_run_case+0x170/0x3f0
[   19.004236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.004403]  kthread+0x328/0x630
[   19.004535]  ret_from_fork+0x10/0x20
[   19.004623] 
[   19.004671] The buggy address belongs to the object at fff00000c604d200
[   19.004671]  which belongs to the cache kmalloc-256 of size 256
[   19.004824] The buggy address is located 34 bytes to the right of
[   19.004824]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   19.005604] 
[   19.005695] The buggy address belongs to the physical page:
[   19.006215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   19.006665] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.006874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.007025] page_type: f5(slab)
[   19.007220] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.007347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.007467] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.007588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.007737] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   19.007923] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.008070] page dumped because: kasan: bad access detected
[   19.008173] 
[   19.008240] Memory state around the buggy address:
[   19.008338]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.008462]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.008606] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.008734]                                                           ^
[   19.008876]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.008987]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.009074] ==================================================================
[   19.093962] ==================================================================
[   19.094403] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.094553] Write of size 1 at addr fff00000c66160ea by task kunit_try_catch/171
[   19.094666] 
[   19.094946] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.095241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.095324] Hardware name: linux,dummy-virt (DT)
[   19.095472] Call trace:
[   19.095553]  show_stack+0x20/0x38 (C)
[   19.095700]  dump_stack_lvl+0x8c/0xd0
[   19.095805]  print_report+0x118/0x608
[   19.095928]  kasan_report+0xdc/0x128
[   19.096357]  __asan_report_store1_noabort+0x20/0x30
[   19.096514]  krealloc_less_oob_helper+0xae4/0xc50
[   19.096684]  krealloc_large_less_oob+0x20/0x38
[   19.096813]  kunit_try_run_case+0x170/0x3f0
[   19.096943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.097357]  kthread+0x328/0x630
[   19.097500]  ret_from_fork+0x10/0x20
[   19.097645] 
[   19.097700] The buggy address belongs to the physical page:
[   19.097798] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.097942] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.098219] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.098353] page_type: f8(unknown)
[   19.098723] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.098940] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.099118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.099247] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.099414] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.099556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.099664] page dumped because: kasan: bad access detected
[   19.099746] 
[   19.099797] Memory state around the buggy address:
[   19.099893]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.100128]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.100246] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.100346]                                                           ^
[   19.100832]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.100994]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.101130] ==================================================================
[   19.101721] ==================================================================
[   19.101852] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.102274] Write of size 1 at addr fff00000c66160eb by task kunit_try_catch/171
[   19.102448] 
[   19.102552] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.102797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.102891] Hardware name: linux,dummy-virt (DT)
[   19.103004] Call trace:
[   19.103078]  show_stack+0x20/0x38 (C)
[   19.103239]  dump_stack_lvl+0x8c/0xd0
[   19.103395]  print_report+0x118/0x608
[   19.103531]  kasan_report+0xdc/0x128
[   19.103651]  __asan_report_store1_noabort+0x20/0x30
[   19.103775]  krealloc_less_oob_helper+0xa58/0xc50
[   19.103903]  krealloc_large_less_oob+0x20/0x38
[   19.104349]  kunit_try_run_case+0x170/0x3f0
[   19.104662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.104871]  kthread+0x328/0x630
[   19.105245]  ret_from_fork+0x10/0x20
[   19.105416] 
[   19.105458] The buggy address belongs to the physical page:
[   19.105516] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.105626] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.105882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.106119] page_type: f8(unknown)
[   19.106329] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.106708] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.107112] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.107356] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.107596] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.107896] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.108065] page dumped because: kasan: bad access detected
[   19.108149] 
[   19.108252] Memory state around the buggy address:
[   19.108441]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.108658]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.109021] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.109138]                                                           ^
[   19.109270]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.109404]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.109505] ==================================================================
[   19.078088] ==================================================================
[   19.078206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.078330] Write of size 1 at addr fff00000c66160d0 by task kunit_try_catch/171
[   19.078454] 
[   19.078539] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.078752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.078820] Hardware name: linux,dummy-virt (DT)
[   19.078916] Call trace:
[   19.078972]  show_stack+0x20/0x38 (C)
[   19.079135]  dump_stack_lvl+0x8c/0xd0
[   19.079585]  print_report+0x118/0x608
[   19.079922]  kasan_report+0xdc/0x128
[   19.080070]  __asan_report_store1_noabort+0x20/0x30
[   19.080227]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.080343]  krealloc_large_less_oob+0x20/0x38
[   19.080451]  kunit_try_run_case+0x170/0x3f0
[   19.080567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.080691]  kthread+0x328/0x630
[   19.081097]  ret_from_fork+0x10/0x20
[   19.081460] 
[   19.081507] The buggy address belongs to the physical page:
[   19.081696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.081844] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.081952] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.082058] page_type: f8(unknown)
[   19.082143] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.082436] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.082775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.082955] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.083073] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.083197] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.083306] page dumped because: kasan: bad access detected
[   19.083410] 
[   19.083468] Memory state around the buggy address:
[   19.083569]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.083710]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.083873] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.083956]                                                  ^
[   19.084044]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.084458]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.084554] ==================================================================
[   18.990316] ==================================================================
[   18.990521] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.990646] Write of size 1 at addr fff00000c604d2ea by task kunit_try_catch/167
[   18.990755] 
[   18.990827] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.991054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.991119] Hardware name: linux,dummy-virt (DT)
[   18.991193] Call trace:
[   18.991247]  show_stack+0x20/0x38 (C)
[   18.991362]  dump_stack_lvl+0x8c/0xd0
[   18.991472]  print_report+0x118/0x608
[   18.991579]  kasan_report+0xdc/0x128
[   18.991685]  __asan_report_store1_noabort+0x20/0x30
[   18.991796]  krealloc_less_oob_helper+0xae4/0xc50
[   18.991921]  krealloc_less_oob+0x20/0x38
[   18.992027]  kunit_try_run_case+0x170/0x3f0
[   18.992139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.992263]  kthread+0x328/0x630
[   18.992360]  ret_from_fork+0x10/0x20
[   18.992468] 
[   18.992513] Allocated by task 167:
[   18.992578]  kasan_save_stack+0x3c/0x68
[   18.992671]  kasan_save_track+0x20/0x40
[   18.992758]  kasan_save_alloc_info+0x40/0x58
[   18.992885]  __kasan_krealloc+0x118/0x178
[   18.992969]  krealloc_noprof+0x128/0x360
[   18.993057]  krealloc_less_oob_helper+0x168/0xc50
[   18.993158]  krealloc_less_oob+0x20/0x38
[   18.993241]  kunit_try_run_case+0x170/0x3f0
[   18.993338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.993504]  kthread+0x328/0x630
[   18.994088]  ret_from_fork+0x10/0x20
[   18.994240] 
[   18.994293] The buggy address belongs to the object at fff00000c604d200
[   18.994293]  which belongs to the cache kmalloc-256 of size 256
[   18.994494] The buggy address is located 33 bytes to the right of
[   18.994494]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   18.995124] 
[   18.995373] The buggy address belongs to the physical page:
[   18.995461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.996132] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.996276] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.996415] page_type: f5(slab)
[   18.996582] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.997181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.997432] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.997634] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.997786] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.997947] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.998517] page dumped because: kasan: bad access detected
[   18.998686] 
[   18.998739] Memory state around the buggy address:
[   18.999867]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.000063]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.000609] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.000813]                                                           ^
[   19.001006]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.001193]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.001393] ==================================================================
[   18.971450] ==================================================================
[   18.971558] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.971961] Write of size 1 at addr fff00000c604d2d0 by task kunit_try_catch/167
[   18.972119] 
[   18.972234] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.972443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.972528] Hardware name: linux,dummy-virt (DT)
[   18.972627] Call trace:
[   18.972697]  show_stack+0x20/0x38 (C)
[   18.972872]  dump_stack_lvl+0x8c/0xd0
[   18.972975]  print_report+0x118/0x608
[   18.973288]  kasan_report+0xdc/0x128
[   18.973429]  __asan_report_store1_noabort+0x20/0x30
[   18.973546]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.973787]  krealloc_less_oob+0x20/0x38
[   18.973918]  kunit_try_run_case+0x170/0x3f0
[   18.974033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.974099]  kthread+0x328/0x630
[   18.974150]  ret_from_fork+0x10/0x20
[   18.974209] 
[   18.974233] Allocated by task 167:
[   18.974271]  kasan_save_stack+0x3c/0x68
[   18.974322]  kasan_save_track+0x20/0x40
[   18.974363]  kasan_save_alloc_info+0x40/0x58
[   18.974403]  __kasan_krealloc+0x118/0x178
[   18.974444]  krealloc_noprof+0x128/0x360
[   18.974486]  krealloc_less_oob_helper+0x168/0xc50
[   18.974528]  krealloc_less_oob+0x20/0x38
[   18.974567]  kunit_try_run_case+0x170/0x3f0
[   18.974607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.974652]  kthread+0x328/0x630
[   18.974687]  ret_from_fork+0x10/0x20
[   18.974726] 
[   18.974749] The buggy address belongs to the object at fff00000c604d200
[   18.974749]  which belongs to the cache kmalloc-256 of size 256
[   18.974811] The buggy address is located 7 bytes to the right of
[   18.974811]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   18.974945] 
[   18.974992] The buggy address belongs to the physical page:
[   18.975137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.975333] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.975892] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.976086] page_type: f5(slab)
[   18.976199] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.976310] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.976475] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.976592] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.976710] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.976844] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.976951] page dumped because: kasan: bad access detected
[   18.977026] 
[   18.977097] Memory state around the buggy address:
[   18.977160]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.977260]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.977358] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.977611]                                                  ^
[   18.977802]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.977935]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.978027] ==================================================================
[   19.086695] ==================================================================
[   19.086809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.086942] Write of size 1 at addr fff00000c66160da by task kunit_try_catch/171
[   19.087264] 
[   19.087383] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.087665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.087763] Hardware name: linux,dummy-virt (DT)
[   19.087866] Call trace:
[   19.087939]  show_stack+0x20/0x38 (C)
[   19.088080]  dump_stack_lvl+0x8c/0xd0
[   19.088217]  print_report+0x118/0x608
[   19.088335]  kasan_report+0xdc/0x128
[   19.088435]  __asan_report_store1_noabort+0x20/0x30
[   19.088923]  krealloc_less_oob_helper+0xa80/0xc50
[   19.089063]  krealloc_large_less_oob+0x20/0x38
[   19.089220]  kunit_try_run_case+0x170/0x3f0
[   19.089425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.089554]  kthread+0x328/0x630
[   19.089850]  ret_from_fork+0x10/0x20
[   19.090017] 
[   19.090071] The buggy address belongs to the physical page:
[   19.090152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.090285] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.090401] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.090539] page_type: f8(unknown)
[   19.090671] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.090830] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.091006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.091168] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.091310] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.091424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.091524] page dumped because: kasan: bad access detected
[   19.091597] 
[   19.091993] Memory state around the buggy address:
[   19.092114]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.092264]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.092384] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.092482]                                                     ^
[   19.092576]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.092682]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.092780] ==================================================================

[   11.037711] ==================================================================
[   11.038279] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.038646] Write of size 1 at addr ffff888100a2a0c9 by task kunit_try_catch/183
[   11.038913] 
[   11.039111] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.039159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.039171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.039192] Call Trace:
[   11.039377]  <TASK>
[   11.039397]  dump_stack_lvl+0x73/0xb0
[   11.039427]  print_report+0xd1/0x650
[   11.039528]  ? __virt_addr_valid+0x1db/0x2d0
[   11.039551]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.039583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.039604]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.039690]  kasan_report+0x141/0x180
[   11.039711]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.039739]  __asan_report_store1_noabort+0x1b/0x30
[   11.039762]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.039787]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.039809]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.039838]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.039864]  krealloc_less_oob+0x1c/0x30
[   11.039968]  kunit_try_run_case+0x1a5/0x480
[   11.039994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.040015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.040037]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.040059]  ? __kthread_parkme+0x82/0x180
[   11.040079]  ? preempt_count_sub+0x50/0x80
[   11.040102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.040124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.040145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.040167]  kthread+0x337/0x6f0
[   11.040186]  ? trace_preempt_on+0x20/0xc0
[   11.040210]  ? __pfx_kthread+0x10/0x10
[   11.040229]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.040249]  ? calculate_sigpending+0x7b/0xa0
[   11.040272]  ? __pfx_kthread+0x10/0x10
[   11.040293]  ret_from_fork+0x116/0x1d0
[   11.040311]  ? __pfx_kthread+0x10/0x10
[   11.040330]  ret_from_fork_asm+0x1a/0x30
[   11.040361]  </TASK>
[   11.040371] 
[   11.048593] Allocated by task 183:
[   11.048771]  kasan_save_stack+0x45/0x70
[   11.048971]  kasan_save_track+0x18/0x40
[   11.049152]  kasan_save_alloc_info+0x3b/0x50
[   11.049300]  __kasan_krealloc+0x190/0x1f0
[   11.049505]  krealloc_noprof+0xf3/0x340
[   11.049759]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.050282]  krealloc_less_oob+0x1c/0x30
[   11.050748]  kunit_try_run_case+0x1a5/0x480
[   11.051145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.051696]  kthread+0x337/0x6f0
[   11.052018]  ret_from_fork+0x116/0x1d0
[   11.052428]  ret_from_fork_asm+0x1a/0x30
[   11.052772] 
[   11.053021] The buggy address belongs to the object at ffff888100a2a000
[   11.053021]  which belongs to the cache kmalloc-256 of size 256
[   11.054226] The buggy address is located 0 bytes to the right of
[   11.054226]  allocated 201-byte region [ffff888100a2a000, ffff888100a2a0c9)
[   11.055385] 
[   11.055476] The buggy address belongs to the physical page:
[   11.055940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a
[   11.056268] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.056814] flags: 0x200000000000040(head|node=0|zone=2)
[   11.057262] page_type: f5(slab)
[   11.057567] raw: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.058346] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.059016] head: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.059326] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.059896] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff
[   11.060642] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.061101] page dumped because: kasan: bad access detected
[   11.061327] 
[   11.061837] Memory state around the buggy address:
[   11.062095]  ffff888100a29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.062375]  ffff888100a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.063165] >ffff888100a2a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.063818]                                               ^
[   11.064176]  ffff888100a2a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.064786]  ffff888100a2a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.065192] ==================================================================
[   11.274434] ==================================================================
[   11.274979] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.275334] Write of size 1 at addr ffff888102ad20da by task kunit_try_catch/187
[   11.275630] 
[   11.275732] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.275788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.275799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.275818] Call Trace:
[   11.275834]  <TASK>
[   11.275850]  dump_stack_lvl+0x73/0xb0
[   11.275876]  print_report+0xd1/0x650
[   11.275897]  ? __virt_addr_valid+0x1db/0x2d0
[   11.275918]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.275949]  ? kasan_addr_to_slab+0x11/0xa0
[   11.275968]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.275990]  kasan_report+0x141/0x180
[   11.276010]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.276037]  __asan_report_store1_noabort+0x1b/0x30
[   11.276159]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.276187]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.276209]  ? finish_task_switch.isra.0+0x153/0x700
[   11.276229]  ? __switch_to+0x47/0xf50
[   11.276253]  ? __schedule+0x10cc/0x2b60
[   11.276274]  ? __pfx_read_tsc+0x10/0x10
[   11.276297]  krealloc_large_less_oob+0x1c/0x30
[   11.276318]  kunit_try_run_case+0x1a5/0x480
[   11.276341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.276361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.276382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.276451]  ? __kthread_parkme+0x82/0x180
[   11.276495]  ? preempt_count_sub+0x50/0x80
[   11.276517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.276539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.276560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.276582]  kthread+0x337/0x6f0
[   11.276600]  ? trace_preempt_on+0x20/0xc0
[   11.276623]  ? __pfx_kthread+0x10/0x10
[   11.276659]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.276679]  ? calculate_sigpending+0x7b/0xa0
[   11.276717]  ? __pfx_kthread+0x10/0x10
[   11.276751]  ret_from_fork+0x116/0x1d0
[   11.276769]  ? __pfx_kthread+0x10/0x10
[   11.276788]  ret_from_fork_asm+0x1a/0x30
[   11.276831]  </TASK>
[   11.276855] 
[   11.285251] The buggy address belongs to the physical page:
[   11.285480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0
[   11.285813] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.286375] flags: 0x200000000000040(head|node=0|zone=2)
[   11.286647] page_type: f8(unknown)
[   11.286887] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.287169] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.287675] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.288003] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.288332] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff
[   11.288682] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.289019] page dumped because: kasan: bad access detected
[   11.289411] 
[   11.289564] Memory state around the buggy address:
[   11.289774]  ffff888102ad1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.290030]  ffff888102ad2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.290321] >ffff888102ad2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.290701]                                                     ^
[   11.290990]  ffff888102ad2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.291319]  ffff888102ad2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.291620] ==================================================================
[   11.292169] ==================================================================
[   11.292639] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.293414] Write of size 1 at addr ffff888102ad20ea by task kunit_try_catch/187
[   11.293651] 
[   11.293744] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.293786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.293797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.293815] Call Trace:
[   11.293830]  <TASK>
[   11.293845]  dump_stack_lvl+0x73/0xb0
[   11.293872]  print_report+0xd1/0x650
[   11.293985]  ? __virt_addr_valid+0x1db/0x2d0
[   11.294013]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.294035]  ? kasan_addr_to_slab+0x11/0xa0
[   11.294055]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.294077]  kasan_report+0x141/0x180
[   11.294098]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.294124]  __asan_report_store1_noabort+0x1b/0x30
[   11.294147]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.294171]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.294194]  ? finish_task_switch.isra.0+0x153/0x700
[   11.294216]  ? __switch_to+0x47/0xf50
[   11.294241]  ? __schedule+0x10cc/0x2b60
[   11.294262]  ? __pfx_read_tsc+0x10/0x10
[   11.294286]  krealloc_large_less_oob+0x1c/0x30
[   11.294307]  kunit_try_run_case+0x1a5/0x480
[   11.294330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.294351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.294372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.294393]  ? __kthread_parkme+0x82/0x180
[   11.294452]  ? preempt_count_sub+0x50/0x80
[   11.294474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.294496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.294517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.294539]  kthread+0x337/0x6f0
[   11.294558]  ? trace_preempt_on+0x20/0xc0
[   11.294581]  ? __pfx_kthread+0x10/0x10
[   11.294601]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.294620]  ? calculate_sigpending+0x7b/0xa0
[   11.294643]  ? __pfx_kthread+0x10/0x10
[   11.294663]  ret_from_fork+0x116/0x1d0
[   11.294680]  ? __pfx_kthread+0x10/0x10
[   11.294700]  ret_from_fork_asm+0x1a/0x30
[   11.294730]  </TASK>
[   11.294741] 
[   11.302260] The buggy address belongs to the physical page:
[   11.302714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0
[   11.303021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.303312] flags: 0x200000000000040(head|node=0|zone=2)
[   11.303550] page_type: f8(unknown)
[   11.303724] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.303996] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.304285] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.304853] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.305192] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff
[   11.305605] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.305953] page dumped because: kasan: bad access detected
[   11.306176] 
[   11.306250] Memory state around the buggy address:
[   11.306440]  ffff888102ad1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.306773]  ffff888102ad2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.306995] >ffff888102ad2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.307213]                                                           ^
[   11.307496]  ffff888102ad2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.307808]  ffff888102ad2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.308114] ==================================================================
[   11.149067] ==================================================================
[   11.149374] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.150166] Write of size 1 at addr ffff888100a2a0eb by task kunit_try_catch/183
[   11.150844] 
[   11.151151] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.151203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.151214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.151234] Call Trace:
[   11.151262]  <TASK>
[   11.151281]  dump_stack_lvl+0x73/0xb0
[   11.151311]  print_report+0xd1/0x650
[   11.151333]  ? __virt_addr_valid+0x1db/0x2d0
[   11.151355]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.151377]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.151595]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.151623]  kasan_report+0x141/0x180
[   11.151645]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.151674]  __asan_report_store1_noabort+0x1b/0x30
[   11.151698]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.151731]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.151753]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.151781]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.151806]  krealloc_less_oob+0x1c/0x30
[   11.151826]  kunit_try_run_case+0x1a5/0x480
[   11.151849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.151870]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.151891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.151912]  ? __kthread_parkme+0x82/0x180
[   11.151944]  ? preempt_count_sub+0x50/0x80
[   11.151967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.151990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.152012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.152033]  kthread+0x337/0x6f0
[   11.152051]  ? trace_preempt_on+0x20/0xc0
[   11.152074]  ? __pfx_kthread+0x10/0x10
[   11.152094]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.152113]  ? calculate_sigpending+0x7b/0xa0
[   11.152136]  ? __pfx_kthread+0x10/0x10
[   11.152156]  ret_from_fork+0x116/0x1d0
[   11.152174]  ? __pfx_kthread+0x10/0x10
[   11.152194]  ret_from_fork_asm+0x1a/0x30
[   11.152223]  </TASK>
[   11.152234] 
[   11.162102] Allocated by task 183:
[   11.162265]  kasan_save_stack+0x45/0x70
[   11.162495]  kasan_save_track+0x18/0x40
[   11.162628]  kasan_save_alloc_info+0x3b/0x50
[   11.163083]  __kasan_krealloc+0x190/0x1f0
[   11.163244]  krealloc_noprof+0xf3/0x340
[   11.163493]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.163975]  krealloc_less_oob+0x1c/0x30
[   11.164169]  kunit_try_run_case+0x1a5/0x480
[   11.164359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.164759]  kthread+0x337/0x6f0
[   11.164892]  ret_from_fork+0x116/0x1d0
[   11.165085]  ret_from_fork_asm+0x1a/0x30
[   11.165277] 
[   11.165372] The buggy address belongs to the object at ffff888100a2a000
[   11.165372]  which belongs to the cache kmalloc-256 of size 256
[   11.166008] The buggy address is located 34 bytes to the right of
[   11.166008]  allocated 201-byte region [ffff888100a2a000, ffff888100a2a0c9)
[   11.166945] 
[   11.167038] The buggy address belongs to the physical page:
[   11.167203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a
[   11.167794] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.168222] flags: 0x200000000000040(head|node=0|zone=2)
[   11.168794] page_type: f5(slab)
[   11.168991] raw: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.169668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.170011] head: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.170378] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.170951] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff
[   11.171352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.171781] page dumped because: kasan: bad access detected
[   11.172048] 
[   11.172123] Memory state around the buggy address:
[   11.172325]  ffff888100a29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.172783]  ffff888100a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.173069] >ffff888100a2a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.173363]                                                           ^
[   11.173590]  ffff888100a2a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.173832]  ffff888100a2a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.174321] ==================================================================
[   11.231502] ==================================================================
[   11.232099] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.232347] Write of size 1 at addr ffff888102ad20c9 by task kunit_try_catch/187
[   11.232602] 
[   11.232687] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.233073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.233087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.233109] Call Trace:
[   11.233122]  <TASK>
[   11.233140]  dump_stack_lvl+0x73/0xb0
[   11.233170]  print_report+0xd1/0x650
[   11.233192]  ? __virt_addr_valid+0x1db/0x2d0
[   11.233214]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.233236]  ? kasan_addr_to_slab+0x11/0xa0
[   11.233255]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.233277]  kasan_report+0x141/0x180
[   11.233298]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.233324]  __asan_report_store1_noabort+0x1b/0x30
[   11.233347]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.233371]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.233615]  ? finish_task_switch.isra.0+0x153/0x700
[   11.233642]  ? __switch_to+0x47/0xf50
[   11.233669]  ? __schedule+0x10cc/0x2b60
[   11.233696]  ? __pfx_read_tsc+0x10/0x10
[   11.233720]  krealloc_large_less_oob+0x1c/0x30
[   11.233742]  kunit_try_run_case+0x1a5/0x480
[   11.233765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.233786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.233807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.233828]  ? __kthread_parkme+0x82/0x180
[   11.233847]  ? preempt_count_sub+0x50/0x80
[   11.233868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.233890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.233913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.233947]  kthread+0x337/0x6f0
[   11.233965]  ? trace_preempt_on+0x20/0xc0
[   11.233989]  ? __pfx_kthread+0x10/0x10
[   11.234008]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.234027]  ? calculate_sigpending+0x7b/0xa0
[   11.234050]  ? __pfx_kthread+0x10/0x10
[   11.234070]  ret_from_fork+0x116/0x1d0
[   11.234087]  ? __pfx_kthread+0x10/0x10
[   11.234106]  ret_from_fork_asm+0x1a/0x30
[   11.234135]  </TASK>
[   11.234147] 
[   11.247603] The buggy address belongs to the physical page:
[   11.248091] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0
[   11.248483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.248886] flags: 0x200000000000040(head|node=0|zone=2)
[   11.249408] page_type: f8(unknown)
[   11.249768] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.250104] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.250329] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.250982] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.251748] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff
[   11.252580] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.252894] page dumped because: kasan: bad access detected
[   11.253077] 
[   11.253144] Memory state around the buggy address:
[   11.253292]  ffff888102ad1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.253566]  ffff888102ad2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.253997] >ffff888102ad2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.254385]                                               ^
[   11.254619]  ffff888102ad2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.254961]  ffff888102ad2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.255264] ==================================================================
[   11.066896] ==================================================================
[   11.067229] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.067563] Write of size 1 at addr ffff888100a2a0d0 by task kunit_try_catch/183
[   11.068154] 
[   11.068257] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.068306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.068317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.068337] Call Trace:
[   11.068349]  <TASK>
[   11.068366]  dump_stack_lvl+0x73/0xb0
[   11.068460]  print_report+0xd1/0x650
[   11.068509]  ? __virt_addr_valid+0x1db/0x2d0
[   11.068531]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.068553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.068584]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.068607]  kasan_report+0x141/0x180
[   11.068627]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.068655]  __asan_report_store1_noabort+0x1b/0x30
[   11.068687]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.068711]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.068733]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.068771]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.068796]  krealloc_less_oob+0x1c/0x30
[   11.068816]  kunit_try_run_case+0x1a5/0x480
[   11.068839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.068860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.068881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.068902]  ? __kthread_parkme+0x82/0x180
[   11.068921]  ? preempt_count_sub+0x50/0x80
[   11.068953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.068975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.068996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.069017]  kthread+0x337/0x6f0
[   11.069036]  ? trace_preempt_on+0x20/0xc0
[   11.069059]  ? __pfx_kthread+0x10/0x10
[   11.069079]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.069098]  ? calculate_sigpending+0x7b/0xa0
[   11.069122]  ? __pfx_kthread+0x10/0x10
[   11.069142]  ret_from_fork+0x116/0x1d0
[   11.069160]  ? __pfx_kthread+0x10/0x10
[   11.069179]  ret_from_fork_asm+0x1a/0x30
[   11.069209]  </TASK>
[   11.069220] 
[   11.078187] Allocated by task 183:
[   11.078316]  kasan_save_stack+0x45/0x70
[   11.078454]  kasan_save_track+0x18/0x40
[   11.078583]  kasan_save_alloc_info+0x3b/0x50
[   11.078947]  __kasan_krealloc+0x190/0x1f0
[   11.079360]  krealloc_noprof+0xf3/0x340
[   11.081242]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.081421]  krealloc_less_oob+0x1c/0x30
[   11.081553]  kunit_try_run_case+0x1a5/0x480
[   11.081699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.081866]  kthread+0x337/0x6f0
[   11.081996]  ret_from_fork+0x116/0x1d0
[   11.082199]  ret_from_fork_asm+0x1a/0x30
[   11.082428] 
[   11.082510] The buggy address belongs to the object at ffff888100a2a000
[   11.082510]  which belongs to the cache kmalloc-256 of size 256
[   11.084119] The buggy address is located 7 bytes to the right of
[   11.084119]  allocated 201-byte region [ffff888100a2a000, ffff888100a2a0c9)
[   11.084511] 
[   11.084582] The buggy address belongs to the physical page:
[   11.085040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a
[   11.085563] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.085858] flags: 0x200000000000040(head|node=0|zone=2)
[   11.086053] page_type: f5(slab)
[   11.086170] raw: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.086391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.086920] head: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.088782] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.089048] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff
[   11.089389] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.089640] page dumped because: kasan: bad access detected
[   11.089809] 
[   11.089873] Memory state around the buggy address:
[   11.090774]  ffff888100a29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.091102]  ffff888100a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.091399] >ffff888100a2a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.091864]                                                  ^
[   11.092138]  ffff888100a2a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.092559]  ffff888100a2a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.092846] ==================================================================
[   11.308389] ==================================================================
[   11.308607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.309148] Write of size 1 at addr ffff888102ad20eb by task kunit_try_catch/187
[   11.309486] 
[   11.309593] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.309639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.309649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.309669] Call Trace:
[   11.309694]  <TASK>
[   11.309898]  dump_stack_lvl+0x73/0xb0
[   11.309949]  print_report+0xd1/0x650
[   11.309972]  ? __virt_addr_valid+0x1db/0x2d0
[   11.309994]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.310016]  ? kasan_addr_to_slab+0x11/0xa0
[   11.310035]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.310057]  kasan_report+0x141/0x180
[   11.310078]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.310104]  __asan_report_store1_noabort+0x1b/0x30
[   11.310128]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.310152]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.310174]  ? finish_task_switch.isra.0+0x153/0x700
[   11.310195]  ? __switch_to+0x47/0xf50
[   11.310219]  ? __schedule+0x10cc/0x2b60
[   11.310240]  ? __pfx_read_tsc+0x10/0x10
[   11.310263]  krealloc_large_less_oob+0x1c/0x30
[   11.310284]  kunit_try_run_case+0x1a5/0x480
[   11.310307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.310328]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.310349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.310370]  ? __kthread_parkme+0x82/0x180
[   11.310389]  ? preempt_count_sub+0x50/0x80
[   11.310469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.310494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.310516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.310537]  kthread+0x337/0x6f0
[   11.310556]  ? trace_preempt_on+0x20/0xc0
[   11.310578]  ? __pfx_kthread+0x10/0x10
[   11.310598]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.310617]  ? calculate_sigpending+0x7b/0xa0
[   11.310640]  ? __pfx_kthread+0x10/0x10
[   11.310660]  ret_from_fork+0x116/0x1d0
[   11.310678]  ? __pfx_kthread+0x10/0x10
[   11.310698]  ret_from_fork_asm+0x1a/0x30
[   11.310728]  </TASK>
[   11.310740] 
[   11.318332] The buggy address belongs to the physical page:
[   11.318535] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0
[   11.318776] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.319295] flags: 0x200000000000040(head|node=0|zone=2)
[   11.319637] page_type: f8(unknown)
[   11.319764] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.320025] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.320353] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.320790] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.321106] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff
[   11.321369] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.321952] page dumped because: kasan: bad access detected
[   11.322156] 
[   11.322246] Memory state around the buggy address:
[   11.322516]  ffff888102ad1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.322807]  ffff888102ad2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.323100] >ffff888102ad2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.323367]                                                           ^
[   11.323665]  ffff888102ad2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.323955]  ffff888102ad2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.324243] ==================================================================
[   11.255744] ==================================================================
[   11.256076] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.256394] Write of size 1 at addr ffff888102ad20d0 by task kunit_try_catch/187
[   11.256742] 
[   11.256823] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.256865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.256875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.256894] Call Trace:
[   11.256910]  <TASK>
[   11.256925]  dump_stack_lvl+0x73/0xb0
[   11.257104]  print_report+0xd1/0x650
[   11.257127]  ? __virt_addr_valid+0x1db/0x2d0
[   11.257167]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.257283]  ? kasan_addr_to_slab+0x11/0xa0
[   11.257303]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.257326]  kasan_report+0x141/0x180
[   11.257347]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.257373]  __asan_report_store1_noabort+0x1b/0x30
[   11.257408]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.257433]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.257455]  ? finish_task_switch.isra.0+0x153/0x700
[   11.257476]  ? __switch_to+0x47/0xf50
[   11.257501]  ? __schedule+0x10cc/0x2b60
[   11.257522]  ? __pfx_read_tsc+0x10/0x10
[   11.257609]  krealloc_large_less_oob+0x1c/0x30
[   11.257635]  kunit_try_run_case+0x1a5/0x480
[   11.257659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.257679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.257706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.257748]  ? __kthread_parkme+0x82/0x180
[   11.257768]  ? preempt_count_sub+0x50/0x80
[   11.257791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.257828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.257851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.257873]  kthread+0x337/0x6f0
[   11.257891]  ? trace_preempt_on+0x20/0xc0
[   11.257914]  ? __pfx_kthread+0x10/0x10
[   11.257945]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.257964]  ? calculate_sigpending+0x7b/0xa0
[   11.257987]  ? __pfx_kthread+0x10/0x10
[   11.258008]  ret_from_fork+0x116/0x1d0
[   11.258025]  ? __pfx_kthread+0x10/0x10
[   11.258044]  ret_from_fork_asm+0x1a/0x30
[   11.258074]  </TASK>
[   11.258085] 
[   11.267881] The buggy address belongs to the physical page:
[   11.268168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0
[   11.268539] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.268939] flags: 0x200000000000040(head|node=0|zone=2)
[   11.269177] page_type: f8(unknown)
[   11.269320] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.269767] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.270063] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.270322] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.270991] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff
[   11.271291] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.271648] page dumped because: kasan: bad access detected
[   11.271942] 
[   11.272032] Memory state around the buggy address:
[   11.272258]  ffff888102ad1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.272571]  ffff888102ad2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.272847] >ffff888102ad2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.273184]                                                  ^
[   11.273526]  ffff888102ad2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.273860]  ffff888102ad2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.274139] ==================================================================
[   11.093454] ==================================================================
[   11.093818] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.094160] Write of size 1 at addr ffff888100a2a0da by task kunit_try_catch/183
[   11.094433] 
[   11.094512] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.094559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.094570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.094589] Call Trace:
[   11.094607]  <TASK>
[   11.094625]  dump_stack_lvl+0x73/0xb0
[   11.094653]  print_report+0xd1/0x650
[   11.094688]  ? __virt_addr_valid+0x1db/0x2d0
[   11.094795]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.094818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.094839]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.094861]  kasan_report+0x141/0x180
[   11.094882]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.094909]  __asan_report_store1_noabort+0x1b/0x30
[   11.094962]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.094987]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.095008]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.095037]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.095217]  krealloc_less_oob+0x1c/0x30
[   11.095253]  kunit_try_run_case+0x1a5/0x480
[   11.095277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.095297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.095331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.095352]  ? __kthread_parkme+0x82/0x180
[   11.095372]  ? preempt_count_sub+0x50/0x80
[   11.095394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.095468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.095490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.095512]  kthread+0x337/0x6f0
[   11.095530]  ? trace_preempt_on+0x20/0xc0
[   11.095554]  ? __pfx_kthread+0x10/0x10
[   11.095573]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.095604]  ? calculate_sigpending+0x7b/0xa0
[   11.095626]  ? __pfx_kthread+0x10/0x10
[   11.095646]  ret_from_fork+0x116/0x1d0
[   11.095677]  ? __pfx_kthread+0x10/0x10
[   11.095697]  ret_from_fork_asm+0x1a/0x30
[   11.095727]  </TASK>
[   11.095739] 
[   11.106405] Allocated by task 183:
[   11.107085]  kasan_save_stack+0x45/0x70
[   11.107295]  kasan_save_track+0x18/0x40
[   11.107652]  kasan_save_alloc_info+0x3b/0x50
[   11.107864]  __kasan_krealloc+0x190/0x1f0
[   11.108184]  krealloc_noprof+0xf3/0x340
[   11.108343]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.108965]  krealloc_less_oob+0x1c/0x30
[   11.109183]  kunit_try_run_case+0x1a5/0x480
[   11.109533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.109768]  kthread+0x337/0x6f0
[   11.110084]  ret_from_fork+0x116/0x1d0
[   11.110274]  ret_from_fork_asm+0x1a/0x30
[   11.110602] 
[   11.110700] The buggy address belongs to the object at ffff888100a2a000
[   11.110700]  which belongs to the cache kmalloc-256 of size 256
[   11.111584] The buggy address is located 17 bytes to the right of
[   11.111584]  allocated 201-byte region [ffff888100a2a000, ffff888100a2a0c9)
[   11.112329] 
[   11.112502] The buggy address belongs to the physical page:
[   11.112875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a
[   11.113264] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.113784] flags: 0x200000000000040(head|node=0|zone=2)
[   11.114042] page_type: f5(slab)
[   11.114193] raw: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.114668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.114951] head: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.115284] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.115643] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff
[   11.115923] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.116247] page dumped because: kasan: bad access detected
[   11.116457] 
[   11.116543] Memory state around the buggy address:
[   11.117166]  ffff888100a29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.117587]  ffff888100a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.117887] >ffff888100a2a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.118164]                                                     ^
[   11.118398]  ffff888100a2a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.118643]  ffff888100a2a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.118956] ==================================================================
[   11.119470] ==================================================================
[   11.119820] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.120164] Write of size 1 at addr ffff888100a2a0ea by task kunit_try_catch/183
[   11.120430] 
[   11.120519] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   11.120566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.120577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.120598] Call Trace:
[   11.120618]  <TASK>
[   11.120638]  dump_stack_lvl+0x73/0xb0
[   11.120667]  print_report+0xd1/0x650
[   11.120689]  ? __virt_addr_valid+0x1db/0x2d0
[   11.120711]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.120734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.120754]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.120777]  kasan_report+0x141/0x180
[   11.120798]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.120824]  __asan_report_store1_noabort+0x1b/0x30
[   11.120847]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.120871]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.120893]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.120920]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.120957]  krealloc_less_oob+0x1c/0x30
[   11.120977]  kunit_try_run_case+0x1a5/0x480
[   11.121000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.121021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.121043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.121064]  ? __kthread_parkme+0x82/0x180
[   11.121084]  ? preempt_count_sub+0x50/0x80
[   11.121106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.121128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.121150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.121646]  kthread+0x337/0x6f0
[   11.121665]  ? trace_preempt_on+0x20/0xc0
[   11.121695]  ? __pfx_kthread+0x10/0x10
[   11.121714]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.121733]  ? calculate_sigpending+0x7b/0xa0
[   11.121756]  ? __pfx_kthread+0x10/0x10
[   11.121777]  ret_from_fork+0x116/0x1d0
[   11.121795]  ? __pfx_kthread+0x10/0x10
[   11.121814]  ret_from_fork_asm+0x1a/0x30
[   11.121846]  </TASK>
[   11.121858] 
[   11.133005] Allocated by task 183:
[   11.133172]  kasan_save_stack+0x45/0x70
[   11.133370]  kasan_save_track+0x18/0x40
[   11.133754]  kasan_save_alloc_info+0x3b/0x50
[   11.133964]  __kasan_krealloc+0x190/0x1f0
[   11.134141]  krealloc_noprof+0xf3/0x340
[   11.134307]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.134579]  krealloc_less_oob+0x1c/0x30
[   11.134763]  kunit_try_run_case+0x1a5/0x480
[   11.134956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.135175]  kthread+0x337/0x6f0
[   11.135326]  ret_from_fork+0x116/0x1d0
[   11.136250]  ret_from_fork_asm+0x1a/0x30
[   11.136467] 
[   11.136541] The buggy address belongs to the object at ffff888100a2a000
[   11.136541]  which belongs to the cache kmalloc-256 of size 256
[   11.137617] The buggy address is located 33 bytes to the right of
[   11.137617]  allocated 201-byte region [ffff888100a2a000, ffff888100a2a0c9)
[   11.138178] 
[   11.138267] The buggy address belongs to the physical page:
[   11.139003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2a
[   11.139691] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.140349] flags: 0x200000000000040(head|node=0|zone=2)
[   11.140603] page_type: f5(slab)
[   11.140760] raw: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.141510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.142002] head: 0200000000000040 ffff888100041b40 ffffea0004028c00 dead000000000002
[   11.142872] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.143221] head: 0200000000000001 ffffea0004028a81 00000000ffffffff 00000000ffffffff
[   11.143824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.144289] page dumped because: kasan: bad access detected
[   11.144979] 
[   11.145079] Memory state around the buggy address:
[   11.145465]  ffff888100a29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.145764]  ffff888100a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.146060] >ffff888100a2a080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.146329]                                                           ^
[   11.147126]  ffff888100a2a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.147479]  ffff888100a2a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.148111] ==================================================================