Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   16.717542] ==================================================================
[   16.717716] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.717845] Write of size 1 at addr fff00000c176b8da by task kunit_try_catch/167
[   16.717894] 
[   16.717934] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.718180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.718434] Hardware name: linux,dummy-virt (DT)
[   16.718517] Call trace:
[   16.718540]  show_stack+0x20/0x38 (C)
[   16.718592]  dump_stack_lvl+0x8c/0xd0
[   16.718664]  print_report+0x118/0x608
[   16.718719]  kasan_report+0xdc/0x128
[   16.718766]  __asan_report_store1_noabort+0x20/0x30
[   16.719102]  krealloc_less_oob_helper+0xa80/0xc50
[   16.719183]  krealloc_less_oob+0x20/0x38
[   16.719228]  kunit_try_run_case+0x170/0x3f0
[   16.719282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.719522]  kthread+0x328/0x630
[   16.719823]  ret_from_fork+0x10/0x20
[   16.719884] 
[   16.719904] Allocated by task 167:
[   16.719943]  kasan_save_stack+0x3c/0x68
[   16.719985]  kasan_save_track+0x20/0x40
[   16.720022]  kasan_save_alloc_info+0x40/0x58
[   16.720098]  __kasan_krealloc+0x118/0x178
[   16.720242]  krealloc_noprof+0x128/0x360
[   16.720280]  krealloc_less_oob_helper+0x168/0xc50
[   16.720451]  krealloc_less_oob+0x20/0x38
[   16.720615]  kunit_try_run_case+0x170/0x3f0
[   16.720653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.720696]  kthread+0x328/0x630
[   16.720728]  ret_from_fork+0x10/0x20
[   16.720762] 
[   16.720780] The buggy address belongs to the object at fff00000c176b800
[   16.720780]  which belongs to the cache kmalloc-256 of size 256
[   16.720881] The buggy address is located 17 bytes to the right of
[   16.720881]  allocated 201-byte region [fff00000c176b800, fff00000c176b8c9)
[   16.720961] 
[   16.720982] The buggy address belongs to the physical page:
[   16.721015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10176a
[   16.721069] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.721115] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.721386] page_type: f5(slab)
[   16.721655] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.721707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.721756] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.721805] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.722274] head: 0bfffe0000000001 ffffc1ffc305da81 00000000ffffffff 00000000ffffffff
[   16.722410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.722557] page dumped because: kasan: bad access detected
[   16.722620] 
[   16.722700] Memory state around the buggy address:
[   16.722738]  fff00000c176b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.722781]  fff00000c176b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.722823] >fff00000c176b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.722862]                                                     ^
[   16.722979]  fff00000c176b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.723022]  fff00000c176b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.723060] ==================================================================
[   16.708747] ==================================================================
[   16.708959] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.709065] Write of size 1 at addr fff00000c176b8d0 by task kunit_try_catch/167
[   16.709250] 
[   16.709391] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.709601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.709722] Hardware name: linux,dummy-virt (DT)
[   16.709871] Call trace:
[   16.709893]  show_stack+0x20/0x38 (C)
[   16.710200]  dump_stack_lvl+0x8c/0xd0
[   16.710356]  print_report+0x118/0x608
[   16.710404]  kasan_report+0xdc/0x128
[   16.710725]  __asan_report_store1_noabort+0x20/0x30
[   16.711029]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.711305]  krealloc_less_oob+0x20/0x38
[   16.711356]  kunit_try_run_case+0x170/0x3f0
[   16.711405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.711599]  kthread+0x328/0x630
[   16.711641]  ret_from_fork+0x10/0x20
[   16.711794] 
[   16.711815] Allocated by task 167:
[   16.711946]  kasan_save_stack+0x3c/0x68
[   16.711993]  kasan_save_track+0x20/0x40
[   16.712303]  kasan_save_alloc_info+0x40/0x58
[   16.712442]  __kasan_krealloc+0x118/0x178
[   16.712480]  krealloc_noprof+0x128/0x360
[   16.712557]  krealloc_less_oob_helper+0x168/0xc50
[   16.712717]  krealloc_less_oob+0x20/0x38
[   16.712754]  kunit_try_run_case+0x170/0x3f0
[   16.712832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.713247]  kthread+0x328/0x630
[   16.713284]  ret_from_fork+0x10/0x20
[   16.713521] 
[   16.713540] The buggy address belongs to the object at fff00000c176b800
[   16.713540]  which belongs to the cache kmalloc-256 of size 256
[   16.713866] The buggy address is located 7 bytes to the right of
[   16.713866]  allocated 201-byte region [fff00000c176b800, fff00000c176b8c9)
[   16.714182] 
[   16.714204] The buggy address belongs to the physical page:
[   16.714236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10176a
[   16.714483] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.714556] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.714834] page_type: f5(slab)
[   16.714878] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.714941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.714991] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.715039] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.715088] head: 0bfffe0000000001 ffffc1ffc305da81 00000000ffffffff 00000000ffffffff
[   16.715135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.715174] page dumped because: kasan: bad access detected
[   16.715204] 
[   16.715223] Memory state around the buggy address:
[   16.715253]  fff00000c176b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.715294]  fff00000c176b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.715336] >fff00000c176b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.715375]                                                  ^
[   16.715422]  fff00000c176b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.715463]  fff00000c176b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.715624] ==================================================================
[   16.779744] ==================================================================
[   16.779792] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.779882] Write of size 1 at addr fff00000c50b60ea by task kunit_try_catch/171
[   16.780063] 
[   16.780257] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.780427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.780454] Hardware name: linux,dummy-virt (DT)
[   16.780505] Call trace:
[   16.780528]  show_stack+0x20/0x38 (C)
[   16.780599]  dump_stack_lvl+0x8c/0xd0
[   16.780812]  print_report+0x118/0x608
[   16.780870]  kasan_report+0xdc/0x128
[   16.781033]  __asan_report_store1_noabort+0x20/0x30
[   16.781164]  krealloc_less_oob_helper+0xae4/0xc50
[   16.781231]  krealloc_large_less_oob+0x20/0x38
[   16.781288]  kunit_try_run_case+0x170/0x3f0
[   16.781353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.781446]  kthread+0x328/0x630
[   16.781506]  ret_from_fork+0x10/0x20
[   16.781563] 
[   16.781604] The buggy address belongs to the physical page:
[   16.781654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1050b4
[   16.781707] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.781944] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.782199] page_type: f8(unknown)
[   16.782252] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.782369] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.782652] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.782952] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.783052] head: 0bfffe0000000002 ffffc1ffc3142d01 00000000ffffffff 00000000ffffffff
[   16.783137] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.783203] page dumped because: kasan: bad access detected
[   16.783235] 
[   16.783252] Memory state around the buggy address:
[   16.783283]  fff00000c50b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.783326]  fff00000c50b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.783625] >fff00000c50b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.783667]                                                           ^
[   16.783705]  fff00000c50b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.783748]  fff00000c50b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.783785] ==================================================================
[   16.770691] ==================================================================
[   16.770870] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.771004] Write of size 1 at addr fff00000c50b60d0 by task kunit_try_catch/171
[   16.771055] 
[   16.771087] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.771171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.771196] Hardware name: linux,dummy-virt (DT)
[   16.771227] Call trace:
[   16.771492]  show_stack+0x20/0x38 (C)
[   16.771565]  dump_stack_lvl+0x8c/0xd0
[   16.771631]  print_report+0x118/0x608
[   16.771678]  kasan_report+0xdc/0x128
[   16.771723]  __asan_report_store1_noabort+0x20/0x30
[   16.771798]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.771881]  krealloc_large_less_oob+0x20/0x38
[   16.771957]  kunit_try_run_case+0x170/0x3f0
[   16.772012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.772085]  kthread+0x328/0x630
[   16.772146]  ret_from_fork+0x10/0x20
[   16.772212] 
[   16.772241] The buggy address belongs to the physical page:
[   16.772289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1050b4
[   16.772361] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.772419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.772486] page_type: f8(unknown)
[   16.772526] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.772594] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.772790] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.773013] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.773075] head: 0bfffe0000000002 ffffc1ffc3142d01 00000000ffffffff 00000000ffffffff
[   16.773194] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.773253] page dumped because: kasan: bad access detected
[   16.773290] 
[   16.773308] Memory state around the buggy address:
[   16.773361]  fff00000c50b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.773469]  fff00000c50b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.773515] >fff00000c50b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.773577]                                                  ^
[   16.773616]  fff00000c50b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.773657]  fff00000c50b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.773744] ==================================================================
[   16.702024] ==================================================================
[   16.702199] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.702258] Write of size 1 at addr fff00000c176b8c9 by task kunit_try_catch/167
[   16.702418] 
[   16.702455] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.702635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.702662] Hardware name: linux,dummy-virt (DT)
[   16.702695] Call trace:
[   16.702718]  show_stack+0x20/0x38 (C)
[   16.702768]  dump_stack_lvl+0x8c/0xd0
[   16.702817]  print_report+0x118/0x608
[   16.702864]  kasan_report+0xdc/0x128
[   16.703221]  __asan_report_store1_noabort+0x20/0x30
[   16.703398]  krealloc_less_oob_helper+0xa48/0xc50
[   16.703511]  krealloc_less_oob+0x20/0x38
[   16.703725]  kunit_try_run_case+0x170/0x3f0
[   16.703794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.703887]  kthread+0x328/0x630
[   16.703941]  ret_from_fork+0x10/0x20
[   16.704046] 
[   16.704103] Allocated by task 167:
[   16.704132]  kasan_save_stack+0x3c/0x68
[   16.704254]  kasan_save_track+0x20/0x40
[   16.704293]  kasan_save_alloc_info+0x40/0x58
[   16.704330]  __kasan_krealloc+0x118/0x178
[   16.704369]  krealloc_noprof+0x128/0x360
[   16.704413]  krealloc_less_oob_helper+0x168/0xc50
[   16.704467]  krealloc_less_oob+0x20/0x38
[   16.704632]  kunit_try_run_case+0x170/0x3f0
[   16.704804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.704869]  kthread+0x328/0x630
[   16.704953]  ret_from_fork+0x10/0x20
[   16.704988] 
[   16.705008] The buggy address belongs to the object at fff00000c176b800
[   16.705008]  which belongs to the cache kmalloc-256 of size 256
[   16.705065] The buggy address is located 0 bytes to the right of
[   16.705065]  allocated 201-byte region [fff00000c176b800, fff00000c176b8c9)
[   16.705128] 
[   16.705148] The buggy address belongs to the physical page:
[   16.705180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10176a
[   16.705577] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.705797] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.706189] page_type: f5(slab)
[   16.706235] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.706285] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.706334] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.706421] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.706737] head: 0bfffe0000000001 ffffc1ffc305da81 00000000ffffffff 00000000ffffffff
[   16.706981] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.707058] page dumped because: kasan: bad access detected
[   16.707089] 
[   16.707106] Memory state around the buggy address:
[   16.707138]  fff00000c176b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.707416]  fff00000c176b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.707463] >fff00000c176b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.707513]                                               ^
[   16.707575]  fff00000c176b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.707617]  fff00000c176b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.707698] ==================================================================
[   16.784032] ==================================================================
[   16.784073] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.784422] Write of size 1 at addr fff00000c50b60eb by task kunit_try_catch/171
[   16.784501] 
[   16.784540] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.784633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.784668] Hardware name: linux,dummy-virt (DT)
[   16.784701] Call trace:
[   16.784731]  show_stack+0x20/0x38 (C)
[   16.784787]  dump_stack_lvl+0x8c/0xd0
[   16.784835]  print_report+0x118/0x608
[   16.784881]  kasan_report+0xdc/0x128
[   16.784939]  __asan_report_store1_noabort+0x20/0x30
[   16.784987]  krealloc_less_oob_helper+0xa58/0xc50
[   16.785035]  krealloc_large_less_oob+0x20/0x38
[   16.785083]  kunit_try_run_case+0x170/0x3f0
[   16.785139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.785191]  kthread+0x328/0x630
[   16.785233]  ret_from_fork+0x10/0x20
[   16.785280] 
[   16.785300] The buggy address belongs to the physical page:
[   16.785331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1050b4
[   16.785384] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.785432] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.785482] page_type: f8(unknown)
[   16.785521] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.785575] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.785623] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.785671] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.785718] head: 0bfffe0000000002 ffffc1ffc3142d01 00000000ffffffff 00000000ffffffff
[   16.785765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.785804] page dumped because: kasan: bad access detected
[   16.785841] 
[   16.785859] Memory state around the buggy address:
[   16.785888]  fff00000c50b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.785938]  fff00000c50b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.785979] >fff00000c50b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.786015]                                                           ^
[   16.786052]  fff00000c50b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.786094]  fff00000c50b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.786130] ==================================================================
[   16.773799] ==================================================================
[   16.773833] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.773885] Write of size 1 at addr fff00000c50b60da by task kunit_try_catch/171
[   16.774144] 
[   16.774356] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.774521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.774602] Hardware name: linux,dummy-virt (DT)
[   16.774678] Call trace:
[   16.774801]  show_stack+0x20/0x38 (C)
[   16.774897]  dump_stack_lvl+0x8c/0xd0
[   16.775044]  print_report+0x118/0x608
[   16.775091]  kasan_report+0xdc/0x128
[   16.775161]  __asan_report_store1_noabort+0x20/0x30
[   16.775209]  krealloc_less_oob_helper+0xa80/0xc50
[   16.775426]  krealloc_large_less_oob+0x20/0x38
[   16.775599]  kunit_try_run_case+0x170/0x3f0
[   16.775696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.775817]  kthread+0x328/0x630
[   16.775870]  ret_from_fork+0x10/0x20
[   16.775959] 
[   16.776188] The buggy address belongs to the physical page:
[   16.776327] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1050b4
[   16.776439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.776530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.776689] page_type: f8(unknown)
[   16.776748] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.776826] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.776994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.777087] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.777136] head: 0bfffe0000000002 ffffc1ffc3142d01 00000000ffffffff 00000000ffffffff
[   16.777358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.777496] page dumped because: kasan: bad access detected
[   16.777642] 
[   16.777734] Memory state around the buggy address:
[   16.777861]  fff00000c50b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.777962]  fff00000c50b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.778092] >fff00000c50b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.778204]                                                     ^
[   16.778290]  fff00000c50b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.778405]  fff00000c50b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.778443] ==================================================================
[   16.730876] ==================================================================
[   16.730923] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.730988] Write of size 1 at addr fff00000c176b8eb by task kunit_try_catch/167
[   16.731066] 
[   16.731098] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.731372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.731401] Hardware name: linux,dummy-virt (DT)
[   16.731431] Call trace:
[   16.731453]  show_stack+0x20/0x38 (C)
[   16.731687]  dump_stack_lvl+0x8c/0xd0
[   16.731859]  print_report+0x118/0x608
[   16.731970]  kasan_report+0xdc/0x128
[   16.732108]  __asan_report_store1_noabort+0x20/0x30
[   16.732157]  krealloc_less_oob_helper+0xa58/0xc50
[   16.732211]  krealloc_less_oob+0x20/0x38
[   16.732356]  kunit_try_run_case+0x170/0x3f0
[   16.732427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.732479]  kthread+0x328/0x630
[   16.732521]  ret_from_fork+0x10/0x20
[   16.732573] 
[   16.732655] Allocated by task 167:
[   16.732705]  kasan_save_stack+0x3c/0x68
[   16.732820]  kasan_save_track+0x20/0x40
[   16.732948]  kasan_save_alloc_info+0x40/0x58
[   16.732984]  __kasan_krealloc+0x118/0x178
[   16.733021]  krealloc_noprof+0x128/0x360
[   16.733058]  krealloc_less_oob_helper+0x168/0xc50
[   16.733122]  krealloc_less_oob+0x20/0x38
[   16.733442]  kunit_try_run_case+0x170/0x3f0
[   16.733496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.733539]  kthread+0x328/0x630
[   16.733699]  ret_from_fork+0x10/0x20
[   16.733742] 
[   16.733761] The buggy address belongs to the object at fff00000c176b800
[   16.733761]  which belongs to the cache kmalloc-256 of size 256
[   16.733818] The buggy address is located 34 bytes to the right of
[   16.733818]  allocated 201-byte region [fff00000c176b800, fff00000c176b8c9)
[   16.734095] 
[   16.734294] The buggy address belongs to the physical page:
[   16.734329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10176a
[   16.734383] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.734545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.734596] page_type: f5(slab)
[   16.734691] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.734774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.734847] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.734895] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.734955] head: 0bfffe0000000001 ffffc1ffc305da81 00000000ffffffff 00000000ffffffff
[   16.735026] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.735065] page dumped because: kasan: bad access detected
[   16.735095] 
[   16.735115] Memory state around the buggy address:
[   16.735145]  fff00000c176b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.735186]  fff00000c176b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.735228] >fff00000c176b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.735556]                                                           ^
[   16.735601]  fff00000c176b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.735644]  fff00000c176b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.735707] ==================================================================
[   16.723770] ==================================================================
[   16.723907] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.724376] Write of size 1 at addr fff00000c176b8ea by task kunit_try_catch/167
[   16.724697] 
[   16.724838] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.725043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.725076] Hardware name: linux,dummy-virt (DT)
[   16.725107] Call trace:
[   16.725129]  show_stack+0x20/0x38 (C)
[   16.725180]  dump_stack_lvl+0x8c/0xd0
[   16.725233]  print_report+0x118/0x608
[   16.725461]  kasan_report+0xdc/0x128
[   16.725619]  __asan_report_store1_noabort+0x20/0x30
[   16.725758]  krealloc_less_oob_helper+0xae4/0xc50
[   16.725852]  krealloc_less_oob+0x20/0x38
[   16.725896]  kunit_try_run_case+0x170/0x3f0
[   16.725954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.726006]  kthread+0x328/0x630
[   16.726077]  ret_from_fork+0x10/0x20
[   16.726124] 
[   16.726334] Allocated by task 167:
[   16.726454]  kasan_save_stack+0x3c/0x68
[   16.726881]  kasan_save_track+0x20/0x40
[   16.726944]  kasan_save_alloc_info+0x40/0x58
[   16.726981]  __kasan_krealloc+0x118/0x178
[   16.727082]  krealloc_noprof+0x128/0x360
[   16.727120]  krealloc_less_oob_helper+0x168/0xc50
[   16.727172]  krealloc_less_oob+0x20/0x38
[   16.727209]  kunit_try_run_case+0x170/0x3f0
[   16.727305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.727377]  kthread+0x328/0x630
[   16.727410]  ret_from_fork+0x10/0x20
[   16.727531] 
[   16.727551] The buggy address belongs to the object at fff00000c176b800
[   16.727551]  which belongs to the cache kmalloc-256 of size 256
[   16.727608] The buggy address is located 33 bytes to the right of
[   16.727608]  allocated 201-byte region [fff00000c176b800, fff00000c176b8c9)
[   16.727672] 
[   16.727692] The buggy address belongs to the physical page:
[   16.727724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10176a
[   16.727776] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.727824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.727895] page_type: f5(slab)
[   16.727943] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.727993] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.728043] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   16.728144] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.728346] head: 0bfffe0000000001 ffffc1ffc305da81 00000000ffffffff 00000000ffffffff
[   16.728573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.728613] page dumped because: kasan: bad access detected
[   16.728731] 
[   16.728761] Memory state around the buggy address:
[   16.728791]  fff00000c176b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.728833]  fff00000c176b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.729442] >fff00000c176b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.729556]                                                           ^
[   16.729603]  fff00000c176b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.729655]  fff00000c176b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.729696] ==================================================================
[   16.765950] ==================================================================
[   16.766011] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.766647] Write of size 1 at addr fff00000c50b60c9 by task kunit_try_catch/171
[   16.766699] 
[   16.766898] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.767403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.767772] Hardware name: linux,dummy-virt (DT)
[   16.767826] Call trace:
[   16.767849]  show_stack+0x20/0x38 (C)
[   16.768065]  dump_stack_lvl+0x8c/0xd0
[   16.768155]  print_report+0x118/0x608
[   16.768227]  kasan_report+0xdc/0x128
[   16.768298]  __asan_report_store1_noabort+0x20/0x30
[   16.768494]  krealloc_less_oob_helper+0xa48/0xc50
[   16.768548]  krealloc_large_less_oob+0x20/0x38
[   16.768603]  kunit_try_run_case+0x170/0x3f0
[   16.768653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.768705]  kthread+0x328/0x630
[   16.768797]  ret_from_fork+0x10/0x20
[   16.768850] 
[   16.768877] The buggy address belongs to the physical page:
[   16.768912] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1050b4
[   16.769000] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.769049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.769103] page_type: f8(unknown)
[   16.769144] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.769204] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.769254] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.769327] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.769376] head: 0bfffe0000000002 ffffc1ffc3142d01 00000000ffffffff 00000000ffffffff
[   16.769424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.769463] page dumped because: kasan: bad access detected
[   16.769495] 
[   16.769528] Memory state around the buggy address:
[   16.769559]  fff00000c50b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.769605]  fff00000c50b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.769657] >fff00000c50b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.769695]                                               ^
[   16.769740]  fff00000c50b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.769783]  fff00000c50b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.769835] ==================================================================

[   17.637921] ==================================================================
[   17.639135] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   17.639961] Write of size 1 at addr ffff88810395a0da by task kunit_try_catch/189
[   17.640390] 
[   17.640590] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.640711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.640748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.640804] Call Trace:
[   17.640857]  <TASK>
[   17.640906]  dump_stack_lvl+0x73/0xb0
[   17.640987]  print_report+0xd1/0x650
[   17.641060]  ? __virt_addr_valid+0x1db/0x2d0
[   17.641135]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.641203]  ? kasan_addr_to_slab+0x11/0xa0
[   17.641276]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.641353]  kasan_report+0x141/0x180
[   17.641429]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.641594]  __asan_report_store1_noabort+0x1b/0x30
[   17.641674]  krealloc_less_oob_helper+0xec6/0x11d0
[   17.641751]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.641824]  ? finish_task_switch.isra.0+0x153/0x700
[   17.641914]  ? __switch_to+0x47/0xf50
[   17.641991]  ? __schedule+0x10cc/0x2b60
[   17.642056]  ? __pfx_read_tsc+0x10/0x10
[   17.642112]  krealloc_large_less_oob+0x1c/0x30
[   17.642147]  kunit_try_run_case+0x1a5/0x480
[   17.642181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.642211]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.642294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.642376]  ? __kthread_parkme+0x82/0x180
[   17.642408]  ? preempt_count_sub+0x50/0x80
[   17.642439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.642471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.642503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.642535]  kthread+0x337/0x6f0
[   17.642561]  ? trace_preempt_on+0x20/0xc0
[   17.642593]  ? __pfx_kthread+0x10/0x10
[   17.642621]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.642653]  ? calculate_sigpending+0x7b/0xa0
[   17.642687]  ? __pfx_kthread+0x10/0x10
[   17.642715]  ret_from_fork+0x116/0x1d0
[   17.642741]  ? __pfx_kthread+0x10/0x10
[   17.642769]  ret_from_fork_asm+0x1a/0x30
[   17.642808]  </TASK>
[   17.642822] 
[   17.661726] The buggy address belongs to the physical page:
[   17.662274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103958
[   17.663105] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.664541] flags: 0x200000000000040(head|node=0|zone=2)
[   17.665107] page_type: f8(unknown)
[   17.665568] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.666347] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.666974] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.667794] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.668789] head: 0200000000000002 ffffea00040e5601 00000000ffffffff 00000000ffffffff
[   17.669477] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.670205] page dumped because: kasan: bad access detected
[   17.670787] 
[   17.670985] Memory state around the buggy address:
[   17.671578]  ffff888103959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.672150]  ffff88810395a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.672880] >ffff88810395a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.673861]                                                     ^
[   17.674484]  ffff88810395a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.675040]  ffff88810395a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.675751] ==================================================================
[   17.677122] ==================================================================
[   17.677919] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   17.678663] Write of size 1 at addr ffff88810395a0ea by task kunit_try_catch/189
[   17.679439] 
[   17.679741] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.679878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.679916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.679995] Call Trace:
[   17.680058]  <TASK>
[   17.680108]  dump_stack_lvl+0x73/0xb0
[   17.680192]  print_report+0xd1/0x650
[   17.680454]  ? __virt_addr_valid+0x1db/0x2d0
[   17.680529]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.680602]  ? kasan_addr_to_slab+0x11/0xa0
[   17.680690]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.680792]  kasan_report+0x141/0x180
[   17.680886]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.680971]  __asan_report_store1_noabort+0x1b/0x30
[   17.681095]  krealloc_less_oob_helper+0xe90/0x11d0
[   17.681177]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.681349]  ? finish_task_switch.isra.0+0x153/0x700
[   17.681392]  ? __switch_to+0x47/0xf50
[   17.681426]  ? __schedule+0x10cc/0x2b60
[   17.681452]  ? __pfx_read_tsc+0x10/0x10
[   17.681484]  krealloc_large_less_oob+0x1c/0x30
[   17.681517]  kunit_try_run_case+0x1a5/0x480
[   17.681550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.681582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.681610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.681644]  ? __kthread_parkme+0x82/0x180
[   17.681670]  ? preempt_count_sub+0x50/0x80
[   17.681700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.681731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.681761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.681792]  kthread+0x337/0x6f0
[   17.681817]  ? trace_preempt_on+0x20/0xc0
[   17.681875]  ? __pfx_kthread+0x10/0x10
[   17.681905]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.681938]  ? calculate_sigpending+0x7b/0xa0
[   17.681970]  ? __pfx_kthread+0x10/0x10
[   17.681998]  ret_from_fork+0x116/0x1d0
[   17.682022]  ? __pfx_kthread+0x10/0x10
[   17.682049]  ret_from_fork_asm+0x1a/0x30
[   17.682090]  </TASK>
[   17.682105] 
[   17.700483] The buggy address belongs to the physical page:
[   17.700982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103958
[   17.702416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.703037] flags: 0x200000000000040(head|node=0|zone=2)
[   17.703768] page_type: f8(unknown)
[   17.704371] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.705073] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.706000] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.707069] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.707902] head: 0200000000000002 ffffea00040e5601 00000000ffffffff 00000000ffffffff
[   17.708706] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.709470] page dumped because: kasan: bad access detected
[   17.709967] 
[   17.710232] Memory state around the buggy address:
[   17.711177]  ffff888103959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.712426]  ffff88810395a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.713261] >ffff88810395a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.714238]                                                           ^
[   17.714960]  ffff88810395a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.715661]  ffff88810395a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.716309] ==================================================================
[   17.407782] ==================================================================
[   17.409198] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   17.410026] Write of size 1 at addr ffff888103908aeb by task kunit_try_catch/185
[   17.410615] 
[   17.410867] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.411133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.411173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.411314] Call Trace:
[   17.411362]  <TASK>
[   17.411403]  dump_stack_lvl+0x73/0xb0
[   17.411481]  print_report+0xd1/0x650
[   17.411558]  ? __virt_addr_valid+0x1db/0x2d0
[   17.411628]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.411699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.411769]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.411829]  kasan_report+0x141/0x180
[   17.411886]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.411929]  __asan_report_store1_noabort+0x1b/0x30
[   17.411965]  krealloc_less_oob_helper+0xd47/0x11d0
[   17.412000]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.412033]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.412069]  ? __pfx_krealloc_less_oob+0x10/0x10
[   17.412104]  krealloc_less_oob+0x1c/0x30
[   17.412133]  kunit_try_run_case+0x1a5/0x480
[   17.412166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.412197]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.412265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.412307]  ? __kthread_parkme+0x82/0x180
[   17.412334]  ? preempt_count_sub+0x50/0x80
[   17.412366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.412398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.412430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.412461]  kthread+0x337/0x6f0
[   17.412487]  ? trace_preempt_on+0x20/0xc0
[   17.412519]  ? __pfx_kthread+0x10/0x10
[   17.412546]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.412578]  ? calculate_sigpending+0x7b/0xa0
[   17.412611]  ? __pfx_kthread+0x10/0x10
[   17.412640]  ret_from_fork+0x116/0x1d0
[   17.412664]  ? __pfx_kthread+0x10/0x10
[   17.412692]  ret_from_fork_asm+0x1a/0x30
[   17.412732]  </TASK>
[   17.412745] 
[   17.426806] Allocated by task 185:
[   17.427130]  kasan_save_stack+0x45/0x70
[   17.427587]  kasan_save_track+0x18/0x40
[   17.427979]  kasan_save_alloc_info+0x3b/0x50
[   17.428460]  __kasan_krealloc+0x190/0x1f0
[   17.428920]  krealloc_noprof+0xf3/0x340
[   17.429322]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.429763]  krealloc_less_oob+0x1c/0x30
[   17.430187]  kunit_try_run_case+0x1a5/0x480
[   17.430672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.431266]  kthread+0x337/0x6f0
[   17.431634]  ret_from_fork+0x116/0x1d0
[   17.432041]  ret_from_fork_asm+0x1a/0x30
[   17.432509] 
[   17.432710] The buggy address belongs to the object at ffff888103908a00
[   17.432710]  which belongs to the cache kmalloc-256 of size 256
[   17.433623] The buggy address is located 34 bytes to the right of
[   17.433623]  allocated 201-byte region [ffff888103908a00, ffff888103908ac9)
[   17.434664] 
[   17.434896] The buggy address belongs to the physical page:
[   17.435450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103908
[   17.436090] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.436762] flags: 0x200000000000040(head|node=0|zone=2)
[   17.437306] page_type: f5(slab)
[   17.437672] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.438347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.438891] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.439627] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.440154] head: 0200000000000001 ffffea00040e4201 00000000ffffffff 00000000ffffffff
[   17.440821] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.441605] page dumped because: kasan: bad access detected
[   17.442117] 
[   17.442375] Memory state around the buggy address:
[   17.442852]  ffff888103908980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.443548]  ffff888103908a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.444052] >ffff888103908a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.444560]                                                           ^
[   17.445160]  ffff888103908b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.445818]  ffff888103908b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.446490] ==================================================================
[   17.321942] ==================================================================
[   17.322573] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   17.323590] Write of size 1 at addr ffff888103908ada by task kunit_try_catch/185
[   17.324190] 
[   17.324448] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.324569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.324605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.324662] Call Trace:
[   17.324698]  <TASK>
[   17.324743]  dump_stack_lvl+0x73/0xb0
[   17.324818]  print_report+0xd1/0x650
[   17.324910]  ? __virt_addr_valid+0x1db/0x2d0
[   17.324981]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.325057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.325128]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.325206]  kasan_report+0x141/0x180
[   17.325278]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.325399]  __asan_report_store1_noabort+0x1b/0x30
[   17.325465]  krealloc_less_oob_helper+0xec6/0x11d0
[   17.325515]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.325548]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.325585]  ? __pfx_krealloc_less_oob+0x10/0x10
[   17.325621]  krealloc_less_oob+0x1c/0x30
[   17.325650]  kunit_try_run_case+0x1a5/0x480
[   17.325684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.325715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.325743]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.325779]  ? __kthread_parkme+0x82/0x180
[   17.325806]  ? preempt_count_sub+0x50/0x80
[   17.325862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.325898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.325930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.325962]  kthread+0x337/0x6f0
[   17.325989]  ? trace_preempt_on+0x20/0xc0
[   17.326022]  ? __pfx_kthread+0x10/0x10
[   17.326050]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.326083]  ? calculate_sigpending+0x7b/0xa0
[   17.326117]  ? __pfx_kthread+0x10/0x10
[   17.326146]  ret_from_fork+0x116/0x1d0
[   17.326171]  ? __pfx_kthread+0x10/0x10
[   17.326200]  ret_from_fork_asm+0x1a/0x30
[   17.326276]  </TASK>
[   17.326293] 
[   17.341733] Allocated by task 185:
[   17.342148]  kasan_save_stack+0x45/0x70
[   17.342644]  kasan_save_track+0x18/0x40
[   17.343068]  kasan_save_alloc_info+0x3b/0x50
[   17.343546]  __kasan_krealloc+0x190/0x1f0
[   17.344037]  krealloc_noprof+0xf3/0x340
[   17.344491]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.344994]  krealloc_less_oob+0x1c/0x30
[   17.345457]  kunit_try_run_case+0x1a5/0x480
[   17.345883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.346396]  kthread+0x337/0x6f0
[   17.346760]  ret_from_fork+0x116/0x1d0
[   17.347150]  ret_from_fork_asm+0x1a/0x30
[   17.347609] 
[   17.347813] The buggy address belongs to the object at ffff888103908a00
[   17.347813]  which belongs to the cache kmalloc-256 of size 256
[   17.348823] The buggy address is located 17 bytes to the right of
[   17.348823]  allocated 201-byte region [ffff888103908a00, ffff888103908ac9)
[   17.349924] 
[   17.350136] The buggy address belongs to the physical page:
[   17.350625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103908
[   17.351448] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.352110] flags: 0x200000000000040(head|node=0|zone=2)
[   17.352655] page_type: f5(slab)
[   17.353087] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.353818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.354493] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.355171] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.356035] head: 0200000000000001 ffffea00040e4201 00000000ffffffff 00000000ffffffff
[   17.356814] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.357549] page dumped because: kasan: bad access detected
[   17.358059] 
[   17.358312] Memory state around the buggy address:
[   17.358664]  ffff888103908980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.359171]  ffff888103908a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.359904] >ffff888103908a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.360644]                                                     ^
[   17.361329]  ffff888103908b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.361892]  ffff888103908b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.362573] ==================================================================
[   17.599798] ==================================================================
[   17.600514] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   17.601133] Write of size 1 at addr ffff88810395a0d0 by task kunit_try_catch/189
[   17.601868] 
[   17.602117] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.602240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.602277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.602334] Call Trace:
[   17.602369]  <TASK>
[   17.602415]  dump_stack_lvl+0x73/0xb0
[   17.602495]  print_report+0xd1/0x650
[   17.602572]  ? __virt_addr_valid+0x1db/0x2d0
[   17.602643]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.602719]  ? kasan_addr_to_slab+0x11/0xa0
[   17.602787]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.602894]  kasan_report+0x141/0x180
[   17.602976]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.603061]  __asan_report_store1_noabort+0x1b/0x30
[   17.603141]  krealloc_less_oob_helper+0xe23/0x11d0
[   17.603222]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.603302]  ? finish_task_switch.isra.0+0x153/0x700
[   17.603376]  ? __switch_to+0x47/0xf50
[   17.603451]  ? __schedule+0x10cc/0x2b60
[   17.603517]  ? __pfx_read_tsc+0x10/0x10
[   17.603604]  krealloc_large_less_oob+0x1c/0x30
[   17.603678]  kunit_try_run_case+0x1a5/0x480
[   17.603754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.603824]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.603911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.603991]  ? __kthread_parkme+0x82/0x180
[   17.604060]  ? preempt_count_sub+0x50/0x80
[   17.604136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.604206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.604281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.604357]  kthread+0x337/0x6f0
[   17.604419]  ? trace_preempt_on+0x20/0xc0
[   17.604455]  ? __pfx_kthread+0x10/0x10
[   17.604483]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.604515]  ? calculate_sigpending+0x7b/0xa0
[   17.604548]  ? __pfx_kthread+0x10/0x10
[   17.604578]  ret_from_fork+0x116/0x1d0
[   17.604603]  ? __pfx_kthread+0x10/0x10
[   17.604630]  ret_from_fork_asm+0x1a/0x30
[   17.604672]  </TASK>
[   17.604686] 
[   17.621852] The buggy address belongs to the physical page:
[   17.622542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103958
[   17.623147] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.624006] flags: 0x200000000000040(head|node=0|zone=2)
[   17.624607] page_type: f8(unknown)
[   17.624908] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.625757] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.626809] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.627648] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.628160] head: 0200000000000002 ffffea00040e5601 00000000ffffffff 00000000ffffffff
[   17.629004] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.629790] page dumped because: kasan: bad access detected
[   17.630250] 
[   17.630404] Memory state around the buggy address:
[   17.630827]  ffff888103959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.632088]  ffff88810395a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.632800] >ffff88810395a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.633574]                                                  ^
[   17.634125]  ffff88810395a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.635487]  ffff88810395a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.636209] ==================================================================
[   17.558118] ==================================================================
[   17.559425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   17.560236] Write of size 1 at addr ffff88810395a0c9 by task kunit_try_catch/189
[   17.560771] 
[   17.561016] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.561140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.561177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.561234] Call Trace:
[   17.561272]  <TASK>
[   17.561318]  dump_stack_lvl+0x73/0xb0
[   17.561405]  print_report+0xd1/0x650
[   17.561480]  ? __virt_addr_valid+0x1db/0x2d0
[   17.561550]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.561624]  ? kasan_addr_to_slab+0x11/0xa0
[   17.561692]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.561766]  kasan_report+0x141/0x180
[   17.561956]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.562051]  __asan_report_store1_noabort+0x1b/0x30
[   17.562127]  krealloc_less_oob_helper+0xd70/0x11d0
[   17.562210]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.562388]  ? finish_task_switch.isra.0+0x153/0x700
[   17.562463]  ? __switch_to+0x47/0xf50
[   17.562539]  ? __schedule+0x10cc/0x2b60
[   17.562609]  ? __pfx_read_tsc+0x10/0x10
[   17.562681]  krealloc_large_less_oob+0x1c/0x30
[   17.562731]  kunit_try_run_case+0x1a5/0x480
[   17.562769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.562801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.562851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.562898]  ? __kthread_parkme+0x82/0x180
[   17.562926]  ? preempt_count_sub+0x50/0x80
[   17.562957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.562990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.563024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.563055]  kthread+0x337/0x6f0
[   17.563081]  ? trace_preempt_on+0x20/0xc0
[   17.563112]  ? __pfx_kthread+0x10/0x10
[   17.563139]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.563171]  ? calculate_sigpending+0x7b/0xa0
[   17.563204]  ? __pfx_kthread+0x10/0x10
[   17.563316]  ret_from_fork+0x116/0x1d0
[   17.563379]  ? __pfx_kthread+0x10/0x10
[   17.563411]  ret_from_fork_asm+0x1a/0x30
[   17.563453]  </TASK>
[   17.563469] 
[   17.584098] The buggy address belongs to the physical page:
[   17.584559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103958
[   17.585050] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.586038] flags: 0x200000000000040(head|node=0|zone=2)
[   17.586983] page_type: f8(unknown)
[   17.587449] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.588041] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.588614] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.589735] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.590416] head: 0200000000000002 ffffea00040e5601 00000000ffffffff 00000000ffffffff
[   17.591212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.592023] page dumped because: kasan: bad access detected
[   17.592805] 
[   17.592956] Memory state around the buggy address:
[   17.593354]  ffff888103959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.594230]  ffff88810395a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.595253] >ffff88810395a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.595707]                                               ^
[   17.596178]  ffff88810395a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.596793]  ffff88810395a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.597603] ==================================================================
[   17.363904] ==================================================================
[   17.364471] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   17.365507] Write of size 1 at addr ffff888103908aea by task kunit_try_catch/185
[   17.366178] 
[   17.366411] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.366526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.366562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.366613] Call Trace:
[   17.366653]  <TASK>
[   17.366755]  dump_stack_lvl+0x73/0xb0
[   17.366851]  print_report+0xd1/0x650
[   17.366984]  ? __virt_addr_valid+0x1db/0x2d0
[   17.367059]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.367197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.367309]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.367384]  kasan_report+0x141/0x180
[   17.367455]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.367548]  __asan_report_store1_noabort+0x1b/0x30
[   17.367629]  krealloc_less_oob_helper+0xe90/0x11d0
[   17.367770]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.367861]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.367947]  ? __pfx_krealloc_less_oob+0x10/0x10
[   17.368016]  krealloc_less_oob+0x1c/0x30
[   17.368068]  kunit_try_run_case+0x1a5/0x480
[   17.368142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.368210]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.368387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.368466]  ? __kthread_parkme+0x82/0x180
[   17.368529]  ? preempt_count_sub+0x50/0x80
[   17.368659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.368742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.368813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.368887]  kthread+0x337/0x6f0
[   17.368917]  ? trace_preempt_on+0x20/0xc0
[   17.368951]  ? __pfx_kthread+0x10/0x10
[   17.368979]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.369012]  ? calculate_sigpending+0x7b/0xa0
[   17.369047]  ? __pfx_kthread+0x10/0x10
[   17.369075]  ret_from_fork+0x116/0x1d0
[   17.369100]  ? __pfx_kthread+0x10/0x10
[   17.369127]  ret_from_fork_asm+0x1a/0x30
[   17.369167]  </TASK>
[   17.369180] 
[   17.386248] Allocated by task 185:
[   17.386530]  kasan_save_stack+0x45/0x70
[   17.386932]  kasan_save_track+0x18/0x40
[   17.387276]  kasan_save_alloc_info+0x3b/0x50
[   17.387699]  __kasan_krealloc+0x190/0x1f0
[   17.388267]  krealloc_noprof+0xf3/0x340
[   17.388553]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.388894]  krealloc_less_oob+0x1c/0x30
[   17.389264]  kunit_try_run_case+0x1a5/0x480
[   17.389758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.390316]  kthread+0x337/0x6f0
[   17.390661]  ret_from_fork+0x116/0x1d0
[   17.391140]  ret_from_fork_asm+0x1a/0x30
[   17.391557] 
[   17.391736] The buggy address belongs to the object at ffff888103908a00
[   17.391736]  which belongs to the cache kmalloc-256 of size 256
[   17.392915] The buggy address is located 33 bytes to the right of
[   17.392915]  allocated 201-byte region [ffff888103908a00, ffff888103908ac9)
[   17.393857] 
[   17.394016] The buggy address belongs to the physical page:
[   17.394458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103908
[   17.395204] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.396082] flags: 0x200000000000040(head|node=0|zone=2)
[   17.397200] page_type: f5(slab)
[   17.397529] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.398116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.398890] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.399518] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.400436] head: 0200000000000001 ffffea00040e4201 00000000ffffffff 00000000ffffffff
[   17.400888] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.401542] page dumped because: kasan: bad access detected
[   17.401903] 
[   17.402101] Memory state around the buggy address:
[   17.402633]  ffff888103908980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.403341]  ffff888103908a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.403893] >ffff888103908a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.404654]                                                           ^
[   17.405298]  ffff888103908b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.405802]  ffff888103908b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.406415] ==================================================================
[   17.277545] ==================================================================
[   17.278093] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   17.278691] Write of size 1 at addr ffff888103908ad0 by task kunit_try_catch/185
[   17.279262] 
[   17.279518] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.279652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.279688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.279747] Call Trace:
[   17.279784]  <TASK>
[   17.279829]  dump_stack_lvl+0x73/0xb0
[   17.279928]  print_report+0xd1/0x650
[   17.280003]  ? __virt_addr_valid+0x1db/0x2d0
[   17.280081]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.280155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.280261]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.280341]  kasan_report+0x141/0x180
[   17.280416]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.280501]  __asan_report_store1_noabort+0x1b/0x30
[   17.280581]  krealloc_less_oob_helper+0xe23/0x11d0
[   17.280660]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.280734]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.280822]  ? __pfx_krealloc_less_oob+0x10/0x10
[   17.280911]  krealloc_less_oob+0x1c/0x30
[   17.280980]  kunit_try_run_case+0x1a5/0x480
[   17.281048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.281084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.281114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.281152]  ? __kthread_parkme+0x82/0x180
[   17.281180]  ? preempt_count_sub+0x50/0x80
[   17.281212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.281284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.281321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.281354]  kthread+0x337/0x6f0
[   17.281380]  ? trace_preempt_on+0x20/0xc0
[   17.281415]  ? __pfx_kthread+0x10/0x10
[   17.281443]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.281476]  ? calculate_sigpending+0x7b/0xa0
[   17.281510]  ? __pfx_kthread+0x10/0x10
[   17.281539]  ret_from_fork+0x116/0x1d0
[   17.281563]  ? __pfx_kthread+0x10/0x10
[   17.281591]  ret_from_fork_asm+0x1a/0x30
[   17.281633]  </TASK>
[   17.281648] 
[   17.295985] Allocated by task 185:
[   17.296429]  kasan_save_stack+0x45/0x70
[   17.296892]  kasan_save_track+0x18/0x40
[   17.297396]  kasan_save_alloc_info+0x3b/0x50
[   17.297857]  __kasan_krealloc+0x190/0x1f0
[   17.298343]  krealloc_noprof+0xf3/0x340
[   17.298913]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.299704]  krealloc_less_oob+0x1c/0x30
[   17.300265]  kunit_try_run_case+0x1a5/0x480
[   17.300714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.301293]  kthread+0x337/0x6f0
[   17.301662]  ret_from_fork+0x116/0x1d0
[   17.302077]  ret_from_fork_asm+0x1a/0x30
[   17.302531] 
[   17.302744] The buggy address belongs to the object at ffff888103908a00
[   17.302744]  which belongs to the cache kmalloc-256 of size 256
[   17.303897] The buggy address is located 7 bytes to the right of
[   17.303897]  allocated 201-byte region [ffff888103908a00, ffff888103908ac9)
[   17.304885] 
[   17.305090] The buggy address belongs to the physical page:
[   17.305694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103908
[   17.306443] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.307063] flags: 0x200000000000040(head|node=0|zone=2)
[   17.307771] page_type: f5(slab)
[   17.308162] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.308849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.309625] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.310373] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.311017] head: 0200000000000001 ffffea00040e4201 00000000ffffffff 00000000ffffffff
[   17.311696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.312470] page dumped because: kasan: bad access detected
[   17.314432] 
[   17.314785] Memory state around the buggy address:
[   17.315121]  ffff888103908980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.316042]  ffff888103908a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.316704] >ffff888103908a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.317342]                                                  ^
[   17.317714]  ffff888103908b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.318501]  ffff888103908b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.319119] ==================================================================
[   17.717727] ==================================================================
[   17.718259] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   17.719172] Write of size 1 at addr ffff88810395a0eb by task kunit_try_catch/189
[   17.719727] 
[   17.720017] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.720197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.720262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.720355] Call Trace:
[   17.720405]  <TASK>
[   17.720512]  dump_stack_lvl+0x73/0xb0
[   17.720620]  print_report+0xd1/0x650
[   17.720694]  ? __virt_addr_valid+0x1db/0x2d0
[   17.720763]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.720850]  ? kasan_addr_to_slab+0x11/0xa0
[   17.720919]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.720992]  kasan_report+0x141/0x180
[   17.721063]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.721145]  __asan_report_store1_noabort+0x1b/0x30
[   17.721219]  krealloc_less_oob_helper+0xd47/0x11d0
[   17.721297]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.721369]  ? finish_task_switch.isra.0+0x153/0x700
[   17.721441]  ? __switch_to+0x47/0xf50
[   17.721541]  ? __schedule+0x10cc/0x2b60
[   17.721635]  ? __pfx_read_tsc+0x10/0x10
[   17.721747]  krealloc_large_less_oob+0x1c/0x30
[   17.721820]  kunit_try_run_case+0x1a5/0x480
[   17.721912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.721948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.721978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.722014]  ? __kthread_parkme+0x82/0x180
[   17.722041]  ? preempt_count_sub+0x50/0x80
[   17.722071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.722103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.722134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.722164]  kthread+0x337/0x6f0
[   17.722190]  ? trace_preempt_on+0x20/0xc0
[   17.722233]  ? __pfx_kthread+0x10/0x10
[   17.722305]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.722367]  ? calculate_sigpending+0x7b/0xa0
[   17.722404]  ? __pfx_kthread+0x10/0x10
[   17.722433]  ret_from_fork+0x116/0x1d0
[   17.722459]  ? __pfx_kthread+0x10/0x10
[   17.722487]  ret_from_fork_asm+0x1a/0x30
[   17.722528]  </TASK>
[   17.722542] 
[   17.741464] The buggy address belongs to the physical page:
[   17.741952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103958
[   17.742786] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.743816] flags: 0x200000000000040(head|node=0|zone=2)
[   17.744414] page_type: f8(unknown)
[   17.744684] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.745453] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.746145] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.746826] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.747714] head: 0200000000000002 ffffea00040e5601 00000000ffffffff 00000000ffffffff
[   17.748585] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.749186] page dumped because: kasan: bad access detected
[   17.749921] 
[   17.750078] Memory state around the buggy address:
[   17.751735]  ffff888103959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.753643]  ffff88810395a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.754352] >ffff88810395a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.754703]                                                           ^
[   17.755055]  ffff88810395a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.755394]  ffff88810395a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.755728] ==================================================================
[   17.233795] ==================================================================
[   17.234907] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   17.235446] Write of size 1 at addr ffff888103908ac9 by task kunit_try_catch/185
[   17.236024] 
[   17.236250] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   17.236376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.236413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.236469] Call Trace:
[   17.236508]  <TASK>
[   17.236556]  dump_stack_lvl+0x73/0xb0
[   17.236635]  print_report+0xd1/0x650
[   17.236708]  ? __virt_addr_valid+0x1db/0x2d0
[   17.236777]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.236905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.236983]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.237064]  kasan_report+0x141/0x180
[   17.237136]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.237261]  __asan_report_store1_noabort+0x1b/0x30
[   17.237346]  krealloc_less_oob_helper+0xd70/0x11d0
[   17.237427]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.237471]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.237512]  ? __pfx_krealloc_less_oob+0x10/0x10
[   17.237550]  krealloc_less_oob+0x1c/0x30
[   17.237582]  kunit_try_run_case+0x1a5/0x480
[   17.237618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.237650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.237679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.237716]  ? __kthread_parkme+0x82/0x180
[   17.237743]  ? preempt_count_sub+0x50/0x80
[   17.237775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.237808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.237867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.237905]  kthread+0x337/0x6f0
[   17.237932]  ? trace_preempt_on+0x20/0xc0
[   17.237965]  ? __pfx_kthread+0x10/0x10
[   17.237994]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.238030]  ? calculate_sigpending+0x7b/0xa0
[   17.238065]  ? __pfx_kthread+0x10/0x10
[   17.238095]  ret_from_fork+0x116/0x1d0
[   17.238120]  ? __pfx_kthread+0x10/0x10
[   17.238148]  ret_from_fork_asm+0x1a/0x30
[   17.238190]  </TASK>
[   17.238206] 
[   17.255136] Allocated by task 185:
[   17.255732]  kasan_save_stack+0x45/0x70
[   17.256359]  kasan_save_track+0x18/0x40
[   17.256542]  kasan_save_alloc_info+0x3b/0x50
[   17.256704]  __kasan_krealloc+0x190/0x1f0
[   17.256901]  krealloc_noprof+0xf3/0x340
[   17.257325]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.257741]  krealloc_less_oob+0x1c/0x30
[   17.258086]  kunit_try_run_case+0x1a5/0x480
[   17.258766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.259171]  kthread+0x337/0x6f0
[   17.259564]  ret_from_fork+0x116/0x1d0
[   17.260093]  ret_from_fork_asm+0x1a/0x30
[   17.260534] 
[   17.261048] The buggy address belongs to the object at ffff888103908a00
[   17.261048]  which belongs to the cache kmalloc-256 of size 256
[   17.262178] The buggy address is located 0 bytes to the right of
[   17.262178]  allocated 201-byte region [ffff888103908a00, ffff888103908ac9)
[   17.263285] 
[   17.263640] The buggy address belongs to the physical page:
[   17.264367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103908
[   17.265068] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.266118] flags: 0x200000000000040(head|node=0|zone=2)
[   17.266757] page_type: f5(slab)
[   17.267094] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.267645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.268179] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.268722] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.269397] head: 0200000000000001 ffffea00040e4201 00000000ffffffff 00000000ffffffff
[   17.269966] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.270568] page dumped because: kasan: bad access detected
[   17.270956] 
[   17.271164] Memory state around the buggy address:
[   17.271632]  ffff888103908980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.272181]  ffff888103908a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.272794] >ffff888103908a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.273362]                                               ^
[   17.273723]  ffff888103908b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.274345]  ffff888103908b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.274790] ==================================================================