Hay
Date
June 18, 2025, 6:43 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.995477] ==================================================================
[   19.995613] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.995722] Write of size 1 at addr fff00000c59a8ec9 by task kunit_try_catch/168
[   19.995961] 
[   19.996080] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.996316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.996377] Hardware name: linux,dummy-virt (DT)
[   19.996468] Call trace:
[   19.996524]  show_stack+0x20/0x38 (C)
[   19.996650]  dump_stack_lvl+0x8c/0xd0
[   19.996751]  print_report+0x118/0x608
[   19.996851]  kasan_report+0xdc/0x128
[   19.997075]  __asan_report_store1_noabort+0x20/0x30
[   19.997193]  krealloc_less_oob_helper+0xa48/0xc50
[   19.997301]  krealloc_less_oob+0x20/0x38
[   19.997394]  kunit_try_run_case+0x170/0x3f0
[   19.997496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.997610]  kthread+0x328/0x630
[   19.997701]  ret_from_fork+0x10/0x20
[   19.997809] 
[   19.997847] Allocated by task 168:
[   19.997907]  kasan_save_stack+0x3c/0x68
[   19.998028]  kasan_save_track+0x20/0x40
[   19.998096]  kasan_save_alloc_info+0x40/0x58
[   19.998164]  __kasan_krealloc+0x118/0x178
[   19.998236]  krealloc_noprof+0x128/0x360
[   19.998330]  krealloc_less_oob_helper+0x168/0xc50
[   19.998407]  krealloc_less_oob+0x20/0x38
[   19.998482]  kunit_try_run_case+0x170/0x3f0
[   19.998653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.998783]  kthread+0x328/0x630
[   19.998877]  ret_from_fork+0x10/0x20
[   19.998944] 
[   19.998986] The buggy address belongs to the object at fff00000c59a8e00
[   19.998986]  which belongs to the cache kmalloc-256 of size 256
[   19.999137] The buggy address is located 0 bytes to the right of
[   19.999137]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   19.999303] 
[   19.999349] The buggy address belongs to the physical page:
[   19.999419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   19.999556] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.999645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.999764] page_type: f5(slab)
[   19.999911] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.000209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.000301] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.000386] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.000479] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.000591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.000692] page dumped because: kasan: bad access detected
[   20.000802] 
[   20.000843] Memory state around the buggy address:
[   20.000935]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.001041]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.001137] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.001219]                                               ^
[   20.001289]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.001381]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.001464] ==================================================================
[   20.003742] ==================================================================
[   20.003856] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   20.004478] Write of size 1 at addr fff00000c59a8ed0 by task kunit_try_catch/168
[   20.004609] 
[   20.004699] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.004892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.004955] Hardware name: linux,dummy-virt (DT)
[   20.005030] Call trace:
[   20.005076]  show_stack+0x20/0x38 (C)
[   20.005186]  dump_stack_lvl+0x8c/0xd0
[   20.005291]  print_report+0x118/0x608
[   20.005394]  kasan_report+0xdc/0x128
[   20.005495]  __asan_report_store1_noabort+0x20/0x30
[   20.005612]  krealloc_less_oob_helper+0xb9c/0xc50
[   20.005724]  krealloc_less_oob+0x20/0x38
[   20.005829]  kunit_try_run_case+0x170/0x3f0
[   20.005936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.006950]  kthread+0x328/0x630
[   20.007334]  ret_from_fork+0x10/0x20
[   20.008124] 
[   20.008209] Allocated by task 168:
[   20.008382]  kasan_save_stack+0x3c/0x68
[   20.008570]  kasan_save_track+0x20/0x40
[   20.008959]  kasan_save_alloc_info+0x40/0x58
[   20.009284]  __kasan_krealloc+0x118/0x178
[   20.009414]  krealloc_noprof+0x128/0x360
[   20.009506]  krealloc_less_oob_helper+0x168/0xc50
[   20.009585]  krealloc_less_oob+0x20/0x38
[   20.009656]  kunit_try_run_case+0x170/0x3f0
[   20.010417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.010582]  kthread+0x328/0x630
[   20.010658]  ret_from_fork+0x10/0x20
[   20.010897] 
[   20.011036] The buggy address belongs to the object at fff00000c59a8e00
[   20.011036]  which belongs to the cache kmalloc-256 of size 256
[   20.011163] The buggy address is located 7 bytes to the right of
[   20.011163]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   20.011295] 
[   20.011338] The buggy address belongs to the physical page:
[   20.011706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.011904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.012131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.012738] page_type: f5(slab)
[   20.012845] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.013044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.013404] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.013566] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.014029] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.014152] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.014382] page dumped because: kasan: bad access detected
[   20.014669] 
[   20.014709] Memory state around the buggy address:
[   20.014782]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.014875]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.014956] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.015026]                                                  ^
[   20.015459]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.015787]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.016005] ==================================================================
[   20.050232] ==================================================================
[   20.050777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   20.051205] Write of size 1 at addr fff00000c59a8eea by task kunit_try_catch/168
[   20.051325] 
[   20.051404] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.052114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.052239] Hardware name: linux,dummy-virt (DT)
[   20.052377] Call trace:
[   20.052442]  show_stack+0x20/0x38 (C)
[   20.052636]  dump_stack_lvl+0x8c/0xd0
[   20.052754]  print_report+0x118/0x608
[   20.053177]  kasan_report+0xdc/0x128
[   20.053940]  __asan_report_store1_noabort+0x20/0x30
[   20.054346]  krealloc_less_oob_helper+0xae4/0xc50
[   20.054475]  krealloc_less_oob+0x20/0x38
[   20.054591]  kunit_try_run_case+0x170/0x3f0
[   20.054697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.054874]  kthread+0x328/0x630
[   20.054962]  ret_from_fork+0x10/0x20
[   20.055665] 
[   20.055709] Allocated by task 168:
[   20.055782]  kasan_save_stack+0x3c/0x68
[   20.055874]  kasan_save_track+0x20/0x40
[   20.055954]  kasan_save_alloc_info+0x40/0x58
[   20.056110]  __kasan_krealloc+0x118/0x178
[   20.056211]  krealloc_noprof+0x128/0x360
[   20.056823]  krealloc_less_oob_helper+0x168/0xc50
[   20.056927]  krealloc_less_oob+0x20/0x38
[   20.057184]  kunit_try_run_case+0x170/0x3f0
[   20.057276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.057582]  kthread+0x328/0x630
[   20.057731]  ret_from_fork+0x10/0x20
[   20.058397] 
[   20.058463] The buggy address belongs to the object at fff00000c59a8e00
[   20.058463]  which belongs to the cache kmalloc-256 of size 256
[   20.058716] The buggy address is located 33 bytes to the right of
[   20.058716]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   20.058950] 
[   20.059258] The buggy address belongs to the physical page:
[   20.059352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.059454] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.059555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.059956] page_type: f5(slab)
[   20.060144] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.060389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.060515] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.060635] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.060761] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.060897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.060999] page dumped because: kasan: bad access detected
[   20.061086] 
[   20.061146] Memory state around the buggy address:
[   20.061224]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.061327]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.061429] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.061517]                                                           ^
[   20.061610]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.061714]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.061804] ==================================================================
[   20.186371] ==================================================================
[   20.186427] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   20.186485] Write of size 1 at addr fff00000c76d20d0 by task kunit_try_catch/172
[   20.186532] 
[   20.186567] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.186646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.186671] Hardware name: linux,dummy-virt (DT)
[   20.186700] Call trace:
[   20.186721]  show_stack+0x20/0x38 (C)
[   20.186770]  dump_stack_lvl+0x8c/0xd0
[   20.186815]  print_report+0x118/0x608
[   20.186860]  kasan_report+0xdc/0x128
[   20.186902]  __asan_report_store1_noabort+0x20/0x30
[   20.186951]  krealloc_less_oob_helper+0xb9c/0xc50
[   20.186996]  krealloc_large_less_oob+0x20/0x38
[   20.187106]  kunit_try_run_case+0x170/0x3f0
[   20.187324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.187520]  kthread+0x328/0x630
[   20.187678]  ret_from_fork+0x10/0x20
[   20.187874] 
[   20.187959] The buggy address belongs to the physical page:
[   20.188080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.188202] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.188301] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.188402] page_type: f8(unknown)
[   20.188474] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.188570] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.188677] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.188789] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.188897] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.189005] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.189428] page dumped because: kasan: bad access detected
[   20.189535] 
[   20.189578] Memory state around the buggy address:
[   20.189691]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.189877]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.190076] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.190186]                                                  ^
[   20.190278]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.190363]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.190440] ==================================================================
[   20.180440] ==================================================================
[   20.180608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   20.180807] Write of size 1 at addr fff00000c76d20c9 by task kunit_try_catch/172
[   20.180961] 
[   20.181090] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.181356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.181409] Hardware name: linux,dummy-virt (DT)
[   20.181474] Call trace:
[   20.181544]  show_stack+0x20/0x38 (C)
[   20.181688]  dump_stack_lvl+0x8c/0xd0
[   20.181825]  print_report+0x118/0x608
[   20.181957]  kasan_report+0xdc/0x128
[   20.182132]  __asan_report_store1_noabort+0x20/0x30
[   20.182242]  krealloc_less_oob_helper+0xa48/0xc50
[   20.182617]  krealloc_large_less_oob+0x20/0x38
[   20.182979]  kunit_try_run_case+0x170/0x3f0
[   20.183119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.183223]  kthread+0x328/0x630
[   20.183311]  ret_from_fork+0x10/0x20
[   20.183407] 
[   20.183445] The buggy address belongs to the physical page:
[   20.183535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.183644] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.183745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.183852] page_type: f8(unknown)
[   20.183937] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.184072] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.184232] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.184339] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.184449] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.184574] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.184686] page dumped because: kasan: bad access detected
[   20.184785] 
[   20.184833] Memory state around the buggy address:
[   20.184900]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.184998]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.185091] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.185163]                                               ^
[   20.185225]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.185307]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.185383] ==================================================================
[   20.021042] ==================================================================
[   20.021160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   20.021696] Write of size 1 at addr fff00000c59a8eda by task kunit_try_catch/168
[   20.021830] 
[   20.022100] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.022795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.022926] Hardware name: linux,dummy-virt (DT)
[   20.023047] Call trace:
[   20.023177]  show_stack+0x20/0x38 (C)
[   20.023379]  dump_stack_lvl+0x8c/0xd0
[   20.023492]  print_report+0x118/0x608
[   20.023660]  kasan_report+0xdc/0x128
[   20.024059]  __asan_report_store1_noabort+0x20/0x30
[   20.024510]  krealloc_less_oob_helper+0xa80/0xc50
[   20.024713]  krealloc_less_oob+0x20/0x38
[   20.025091]  kunit_try_run_case+0x170/0x3f0
[   20.025445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.025576]  kthread+0x328/0x630
[   20.025673]  ret_from_fork+0x10/0x20
[   20.025778] 
[   20.025815] Allocated by task 168:
[   20.025874]  kasan_save_stack+0x3c/0x68
[   20.027436]  kasan_save_track+0x20/0x40
[   20.028426]  kasan_save_alloc_info+0x40/0x58
[   20.028808]  __kasan_krealloc+0x118/0x178
[   20.029546]  krealloc_noprof+0x128/0x360
[   20.030104]  krealloc_less_oob_helper+0x168/0xc50
[   20.030453]  krealloc_less_oob+0x20/0x38
[   20.030529]  kunit_try_run_case+0x170/0x3f0
[   20.031324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.031700]  kthread+0x328/0x630
[   20.031776]  ret_from_fork+0x10/0x20
[   20.031853] 
[   20.031896] The buggy address belongs to the object at fff00000c59a8e00
[   20.031896]  which belongs to the cache kmalloc-256 of size 256
[   20.032815] The buggy address is located 17 bytes to the right of
[   20.032815]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   20.033485] 
[   20.033880] The buggy address belongs to the physical page:
[   20.034206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.034314] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.034809] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.034954] page_type: f5(slab)
[   20.035048] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.035166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.036517] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.036850] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.037670] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.038168] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.038434] page dumped because: kasan: bad access detected
[   20.038505] 
[   20.038773] Memory state around the buggy address:
[   20.038864]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.039043]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.039188] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.039273]                                                     ^
[   20.039608]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.039942]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.040197] ==================================================================
[   20.199909] ==================================================================
[   20.200008] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   20.200128] Write of size 1 at addr fff00000c76d20ea by task kunit_try_catch/172
[   20.200240] 
[   20.200665] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.200930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.201083] Hardware name: linux,dummy-virt (DT)
[   20.201195] Call trace:
[   20.201456]  show_stack+0x20/0x38 (C)
[   20.201628]  dump_stack_lvl+0x8c/0xd0
[   20.201844]  print_report+0x118/0x608
[   20.202058]  kasan_report+0xdc/0x128
[   20.202222]  __asan_report_store1_noabort+0x20/0x30
[   20.202432]  krealloc_less_oob_helper+0xae4/0xc50
[   20.202613]  krealloc_large_less_oob+0x20/0x38
[   20.202710]  kunit_try_run_case+0x170/0x3f0
[   20.202793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.202887]  kthread+0x328/0x630
[   20.203255]  ret_from_fork+0x10/0x20
[   20.203367] 
[   20.203504] The buggy address belongs to the physical page:
[   20.203578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.203822] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.203997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.204115] page_type: f8(unknown)
[   20.204198] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.204306] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.204413] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.204518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.204649] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.204761] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.204846] page dumped because: kasan: bad access detected
[   20.205255] 
[   20.205304] Memory state around the buggy address:
[   20.205821]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.206119]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.206216] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.206303]                                                           ^
[   20.206439]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.206583]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.206747] ==================================================================
[   20.207406] ==================================================================
[   20.207506] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   20.207603] Write of size 1 at addr fff00000c76d20eb by task kunit_try_catch/172
[   20.207706] 
[   20.207762] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.207935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.207992] Hardware name: linux,dummy-virt (DT)
[   20.208067] Call trace:
[   20.208113]  show_stack+0x20/0x38 (C)
[   20.208220]  dump_stack_lvl+0x8c/0xd0
[   20.208322]  print_report+0x118/0x608
[   20.208425]  kasan_report+0xdc/0x128
[   20.208536]  __asan_report_store1_noabort+0x20/0x30
[   20.208660]  krealloc_less_oob_helper+0xa58/0xc50
[   20.208776]  krealloc_large_less_oob+0x20/0x38
[   20.208879]  kunit_try_run_case+0x170/0x3f0
[   20.208980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.210810]  kthread+0x328/0x630
[   20.210908]  ret_from_fork+0x10/0x20
[   20.211008] 
[   20.211059] The buggy address belongs to the physical page:
[   20.211120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.211235] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.211334] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.211865] page_type: f8(unknown)
[   20.212087] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.212744] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.213135] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.213264] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.213445] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.213551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.213634] page dumped because: kasan: bad access detected
[   20.213696] 
[   20.213732] Memory state around the buggy address:
[   20.213983]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.214150]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.214264] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.214350]                                                           ^
[   20.214434]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.214525]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.214605] ==================================================================
[   20.064277] ==================================================================
[   20.064396] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   20.064515] Write of size 1 at addr fff00000c59a8eeb by task kunit_try_catch/168
[   20.065629] 
[   20.065817] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.066695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.066943] Hardware name: linux,dummy-virt (DT)
[   20.067136] Call trace:
[   20.067245]  show_stack+0x20/0x38 (C)
[   20.067612]  dump_stack_lvl+0x8c/0xd0
[   20.067809]  print_report+0x118/0x608
[   20.067945]  kasan_report+0xdc/0x128
[   20.068338]  __asan_report_store1_noabort+0x20/0x30
[   20.069031]  krealloc_less_oob_helper+0xa58/0xc50
[   20.069227]  krealloc_less_oob+0x20/0x38
[   20.069445]  kunit_try_run_case+0x170/0x3f0
[   20.069566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.069938]  kthread+0x328/0x630
[   20.070116]  ret_from_fork+0x10/0x20
[   20.070505] 
[   20.070563] Allocated by task 168:
[   20.070871]  kasan_save_stack+0x3c/0x68
[   20.070976]  kasan_save_track+0x20/0x40
[   20.071344]  kasan_save_alloc_info+0x40/0x58
[   20.071744]  __kasan_krealloc+0x118/0x178
[   20.071867]  krealloc_noprof+0x128/0x360
[   20.071961]  krealloc_less_oob_helper+0x168/0xc50
[   20.072263]  krealloc_less_oob+0x20/0x38
[   20.072368]  kunit_try_run_case+0x170/0x3f0
[   20.072580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.073226]  kthread+0x328/0x630
[   20.073327]  ret_from_fork+0x10/0x20
[   20.073505] 
[   20.073563] The buggy address belongs to the object at fff00000c59a8e00
[   20.073563]  which belongs to the cache kmalloc-256 of size 256
[   20.073717] The buggy address is located 34 bytes to the right of
[   20.073717]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   20.073866] 
[   20.073913] The buggy address belongs to the physical page:
[   20.073989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.074409] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.074891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.075411] page_type: f5(slab)
[   20.075500] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.075672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.075809] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.076694] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.077447] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.077578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.077678] page dumped because: kasan: bad access detected
[   20.077766] 
[   20.077807] Memory state around the buggy address:
[   20.077885]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.078261]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.078760] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.078864]                                                           ^
[   20.078946]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.079038]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.079109] ==================================================================
[   20.191917] ==================================================================
[   20.192056] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   20.192426] Write of size 1 at addr fff00000c76d20da by task kunit_try_catch/172
[   20.192634] 
[   20.192738] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.193182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.193249] Hardware name: linux,dummy-virt (DT)
[   20.193369] Call trace:
[   20.193470]  show_stack+0x20/0x38 (C)
[   20.193772]  dump_stack_lvl+0x8c/0xd0
[   20.193914]  print_report+0x118/0x608
[   20.194141]  kasan_report+0xdc/0x128
[   20.194275]  __asan_report_store1_noabort+0x20/0x30
[   20.194454]  krealloc_less_oob_helper+0xa80/0xc50
[   20.194540]  krealloc_large_less_oob+0x20/0x38
[   20.194625]  kunit_try_run_case+0x170/0x3f0
[   20.194718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.195055]  kthread+0x328/0x630
[   20.195258]  ret_from_fork+0x10/0x20
[   20.195483] 
[   20.195727] The buggy address belongs to the physical page:
[   20.195841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.196084] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.196176] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.196360] page_type: f8(unknown)
[   20.196441] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.196880] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.197070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.197260] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.197360] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.197621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.197710] page dumped because: kasan: bad access detected
[   20.197840] 
[   20.197899] Memory state around the buggy address:
[   20.198101]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.198232]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.198365] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.198434]                                                     ^
[   20.198498]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.198576]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.198652] ==================================================================

[   10.884019] ==================================================================
[   10.884561] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   10.885112] Write of size 1 at addr ffff88810037e8ea by task kunit_try_catch/184
[   10.885436] 
[   10.885516] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.885559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.885570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.885590] Call Trace:
[   10.885603]  <TASK>
[   10.885617]  dump_stack_lvl+0x73/0xb0
[   10.885642]  print_report+0xd1/0x650
[   10.885662]  ? __virt_addr_valid+0x1db/0x2d0
[   10.885683]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.885704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.885728]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.885810]  kasan_report+0x141/0x180
[   10.885831]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.885876]  __asan_report_store1_noabort+0x1b/0x30
[   10.885899]  krealloc_less_oob_helper+0xe90/0x11d0
[   10.885933]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.885955]  ? finish_task_switch.isra.0+0x153/0x700
[   10.885976]  ? __switch_to+0x47/0xf50
[   10.886001]  ? __schedule+0x10cc/0x2b60
[   10.886021]  ? __pfx_read_tsc+0x10/0x10
[   10.886044]  krealloc_less_oob+0x1c/0x30
[   10.886064]  kunit_try_run_case+0x1a5/0x480
[   10.886086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.886106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.886127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.886148]  ? __kthread_parkme+0x82/0x180
[   10.886167]  ? preempt_count_sub+0x50/0x80
[   10.886188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.886220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.886241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.886263]  kthread+0x337/0x6f0
[   10.886281]  ? trace_preempt_on+0x20/0xc0
[   10.886323]  ? __pfx_kthread+0x10/0x10
[   10.886343]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.886362]  ? calculate_sigpending+0x7b/0xa0
[   10.886384]  ? __pfx_kthread+0x10/0x10
[   10.886404]  ret_from_fork+0x116/0x1d0
[   10.886421]  ? __pfx_kthread+0x10/0x10
[   10.886472]  ret_from_fork_asm+0x1a/0x30
[   10.886501]  </TASK>
[   10.886511] 
[   10.894173] Allocated by task 184:
[   10.894371]  kasan_save_stack+0x45/0x70
[   10.894537]  kasan_save_track+0x18/0x40
[   10.894912]  kasan_save_alloc_info+0x3b/0x50
[   10.895136]  __kasan_krealloc+0x190/0x1f0
[   10.895339]  krealloc_noprof+0xf3/0x340
[   10.895540]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.895843]  krealloc_less_oob+0x1c/0x30
[   10.895989]  kunit_try_run_case+0x1a5/0x480
[   10.896169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.896460]  kthread+0x337/0x6f0
[   10.896599]  ret_from_fork+0x116/0x1d0
[   10.896731]  ret_from_fork_asm+0x1a/0x30
[   10.896863] 
[   10.896926] The buggy address belongs to the object at ffff88810037e800
[   10.896926]  which belongs to the cache kmalloc-256 of size 256
[   10.897614] The buggy address is located 33 bytes to the right of
[   10.897614]  allocated 201-byte region [ffff88810037e800, ffff88810037e8c9)
[   10.898149] 
[   10.898253] The buggy address belongs to the physical page:
[   10.898573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10037e
[   10.898811] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.899048] flags: 0x200000000000040(head|node=0|zone=2)
[   10.899461] page_type: f5(slab)
[   10.899649] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.899998] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.900345] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.900571] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.900841] head: 0200000000000001 ffffea000400df81 00000000ffffffff 00000000ffffffff
[   10.901233] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.901563] page dumped because: kasan: bad access detected
[   10.901776] 
[   10.901837] Memory state around the buggy address:
[   10.901985]  ffff88810037e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.902507]  ffff88810037e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.902833] >ffff88810037e880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.903150]                                                           ^
[   10.903420]  ffff88810037e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.903826]  ffff88810037e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.904110] ==================================================================
[   10.808870] ==================================================================
[   10.810012] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   10.810816] Write of size 1 at addr ffff88810037e8c9 by task kunit_try_catch/184
[   10.811591] 
[   10.812154] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.812222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.812235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.812257] Call Trace:
[   10.812270]  <TASK>
[   10.812287]  dump_stack_lvl+0x73/0xb0
[   10.812318]  print_report+0xd1/0x650
[   10.812338]  ? __virt_addr_valid+0x1db/0x2d0
[   10.812361]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.812382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.812406]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.812428]  kasan_report+0x141/0x180
[   10.812449]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.812475]  __asan_report_store1_noabort+0x1b/0x30
[   10.812497]  krealloc_less_oob_helper+0xd70/0x11d0
[   10.812521]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.812543]  ? finish_task_switch.isra.0+0x153/0x700
[   10.812564]  ? __switch_to+0x47/0xf50
[   10.812589]  ? __schedule+0x10cc/0x2b60
[   10.812610]  ? __pfx_read_tsc+0x10/0x10
[   10.812633]  krealloc_less_oob+0x1c/0x30
[   10.812660]  kunit_try_run_case+0x1a5/0x480
[   10.812683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.812704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.812725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.812746]  ? __kthread_parkme+0x82/0x180
[   10.812765]  ? preempt_count_sub+0x50/0x80
[   10.812787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.812809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.812830]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.812852]  kthread+0x337/0x6f0
[   10.812870]  ? trace_preempt_on+0x20/0xc0
[   10.812893]  ? __pfx_kthread+0x10/0x10
[   10.812912]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.812931]  ? calculate_sigpending+0x7b/0xa0
[   10.812954]  ? __pfx_kthread+0x10/0x10
[   10.812974]  ret_from_fork+0x116/0x1d0
[   10.812991]  ? __pfx_kthread+0x10/0x10
[   10.813010]  ret_from_fork_asm+0x1a/0x30
[   10.813039]  </TASK>
[   10.813049] 
[   10.824950] Allocated by task 184:
[   10.825085]  kasan_save_stack+0x45/0x70
[   10.825321]  kasan_save_track+0x18/0x40
[   10.825578]  kasan_save_alloc_info+0x3b/0x50
[   10.825800]  __kasan_krealloc+0x190/0x1f0
[   10.825951]  krealloc_noprof+0xf3/0x340
[   10.826111]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.826368]  krealloc_less_oob+0x1c/0x30
[   10.826614]  kunit_try_run_case+0x1a5/0x480
[   10.826793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.827020]  kthread+0x337/0x6f0
[   10.827133]  ret_from_fork+0x116/0x1d0
[   10.827292]  ret_from_fork_asm+0x1a/0x30
[   10.827695] 
[   10.827798] The buggy address belongs to the object at ffff88810037e800
[   10.827798]  which belongs to the cache kmalloc-256 of size 256
[   10.828376] The buggy address is located 0 bytes to the right of
[   10.828376]  allocated 201-byte region [ffff88810037e800, ffff88810037e8c9)
[   10.828961] 
[   10.829043] The buggy address belongs to the physical page:
[   10.829329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10037e
[   10.829708] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.830015] flags: 0x200000000000040(head|node=0|zone=2)
[   10.830241] page_type: f5(slab)
[   10.830401] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.830691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.830996] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.831342] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.831636] head: 0200000000000001 ffffea000400df81 00000000ffffffff 00000000ffffffff
[   10.831888] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.832225] page dumped because: kasan: bad access detected
[   10.832476] 
[   10.832558] Memory state around the buggy address:
[   10.832710]  ffff88810037e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.832924]  ffff88810037e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.833315] >ffff88810037e880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.833808]                                               ^
[   10.834067]  ffff88810037e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.834408]  ffff88810037e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.834710] ==================================================================
[   10.904572] ==================================================================
[   10.904914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   10.905283] Write of size 1 at addr ffff88810037e8eb by task kunit_try_catch/184
[   10.905580] 
[   10.905653] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.905695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.905705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.905724] Call Trace:
[   10.905738]  <TASK>
[   10.905751]  dump_stack_lvl+0x73/0xb0
[   10.905775]  print_report+0xd1/0x650
[   10.905794]  ? __virt_addr_valid+0x1db/0x2d0
[   10.905816]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.905837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.906036]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.906059]  kasan_report+0x141/0x180
[   10.906080]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.906106]  __asan_report_store1_noabort+0x1b/0x30
[   10.906129]  krealloc_less_oob_helper+0xd47/0x11d0
[   10.906153]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.906194]  ? finish_task_switch.isra.0+0x153/0x700
[   10.906225]  ? __switch_to+0x47/0xf50
[   10.906248]  ? __schedule+0x10cc/0x2b60
[   10.906268]  ? __pfx_read_tsc+0x10/0x10
[   10.906291]  krealloc_less_oob+0x1c/0x30
[   10.906311]  kunit_try_run_case+0x1a5/0x480
[   10.906335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.906355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.906376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.906397]  ? __kthread_parkme+0x82/0x180
[   10.906415]  ? preempt_count_sub+0x50/0x80
[   10.906480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.906505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.906526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.906547]  kthread+0x337/0x6f0
[   10.906566]  ? trace_preempt_on+0x20/0xc0
[   10.906589]  ? __pfx_kthread+0x10/0x10
[   10.906608]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.906627]  ? calculate_sigpending+0x7b/0xa0
[   10.906650]  ? __pfx_kthread+0x10/0x10
[   10.906669]  ret_from_fork+0x116/0x1d0
[   10.906687]  ? __pfx_kthread+0x10/0x10
[   10.906729]  ret_from_fork_asm+0x1a/0x30
[   10.906758]  </TASK>
[   10.906768] 
[   10.914921] Allocated by task 184:
[   10.915091]  kasan_save_stack+0x45/0x70
[   10.915736]  kasan_save_track+0x18/0x40
[   10.915948]  kasan_save_alloc_info+0x3b/0x50
[   10.916148]  __kasan_krealloc+0x190/0x1f0
[   10.916444]  krealloc_noprof+0xf3/0x340
[   10.917231]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.917693]  krealloc_less_oob+0x1c/0x30
[   10.917944]  kunit_try_run_case+0x1a5/0x480
[   10.918262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.918738]  kthread+0x337/0x6f0
[   10.919034]  ret_from_fork+0x116/0x1d0
[   10.919335]  ret_from_fork_asm+0x1a/0x30
[   10.919708] 
[   10.919808] The buggy address belongs to the object at ffff88810037e800
[   10.919808]  which belongs to the cache kmalloc-256 of size 256
[   10.920517] The buggy address is located 34 bytes to the right of
[   10.920517]  allocated 201-byte region [ffff88810037e800, ffff88810037e8c9)
[   10.921346] 
[   10.921804] The buggy address belongs to the physical page:
[   10.922050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10037e
[   10.922589] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.923088] flags: 0x200000000000040(head|node=0|zone=2)
[   10.923523] page_type: f5(slab)
[   10.923680] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.923976] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.924587] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.925171] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.925747] head: 0200000000000001 ffffea000400df81 00000000ffffffff 00000000ffffffff
[   10.926177] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.926878] page dumped because: kasan: bad access detected
[   10.927120] 
[   10.927441] Memory state around the buggy address:
[   10.927774]  ffff88810037e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.928063]  ffff88810037e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.928773] >ffff88810037e880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.929195]                                                           ^
[   10.929768]  ffff88810037e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.930151]  ffff88810037e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.930675] ==================================================================
[   10.973391] ==================================================================
[   10.974074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   10.974406] Write of size 1 at addr ffff888102c460c9 by task kunit_try_catch/188
[   10.974818] 
[   10.974928] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.974974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.974985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.975004] Call Trace:
[   10.975015]  <TASK>
[   10.975030]  dump_stack_lvl+0x73/0xb0
[   10.975056]  print_report+0xd1/0x650
[   10.975076]  ? __virt_addr_valid+0x1db/0x2d0
[   10.975098]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.975120]  ? kasan_addr_to_slab+0x11/0xa0
[   10.975139]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.975161]  kasan_report+0x141/0x180
[   10.975181]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.975218]  __asan_report_store1_noabort+0x1b/0x30
[   10.975241]  krealloc_less_oob_helper+0xd70/0x11d0
[   10.975264]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.975288]  ? finish_task_switch.isra.0+0x153/0x700
[   10.975309]  ? __switch_to+0x47/0xf50
[   10.975334]  ? __schedule+0x10cc/0x2b60
[   10.975355]  ? __pfx_read_tsc+0x10/0x10
[   10.975379]  krealloc_large_less_oob+0x1c/0x30
[   10.975400]  kunit_try_run_case+0x1a5/0x480
[   10.975422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.975443]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.975464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.975485]  ? __kthread_parkme+0x82/0x180
[   10.975505]  ? preempt_count_sub+0x50/0x80
[   10.975526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.975547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.975568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.975590]  kthread+0x337/0x6f0
[   10.975608]  ? trace_preempt_on+0x20/0xc0
[   10.975630]  ? __pfx_kthread+0x10/0x10
[   10.975649]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.975668]  ? calculate_sigpending+0x7b/0xa0
[   10.975691]  ? __pfx_kthread+0x10/0x10
[   10.975711]  ret_from_fork+0x116/0x1d0
[   10.975728]  ? __pfx_kthread+0x10/0x10
[   10.975747]  ret_from_fork_asm+0x1a/0x30
[   10.975775]  </TASK>
[   10.975785] 
[   10.983130] The buggy address belongs to the physical page:
[   10.983526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c44
[   10.983898] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.984180] flags: 0x200000000000040(head|node=0|zone=2)
[   10.984413] page_type: f8(unknown)
[   10.984612] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.984926] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   10.985174] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.985496] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   10.986019] head: 0200000000000002 ffffea00040b1101 00000000ffffffff 00000000ffffffff
[   10.986428] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.986960] page dumped because: kasan: bad access detected
[   10.987239] 
[   10.987328] Memory state around the buggy address:
[   10.987610]  ffff888102c45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.987888]  ffff888102c46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.988166] >ffff888102c46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   10.988488]                                               ^
[   10.988666]  ffff888102c46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.988872]  ffff888102c46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.989076] ==================================================================
[   10.836614] ==================================================================
[   10.837330] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   10.838056] Write of size 1 at addr ffff88810037e8d0 by task kunit_try_catch/184
[   10.838529] 
[   10.838670] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.838717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.838728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.838748] Call Trace:
[   10.838760]  <TASK>
[   10.838775]  dump_stack_lvl+0x73/0xb0
[   10.838802]  print_report+0xd1/0x650
[   10.838822]  ? __virt_addr_valid+0x1db/0x2d0
[   10.838843]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.838865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.838889]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.838911]  kasan_report+0x141/0x180
[   10.838931]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.838958]  __asan_report_store1_noabort+0x1b/0x30
[   10.838981]  krealloc_less_oob_helper+0xe23/0x11d0
[   10.839005]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.839027]  ? finish_task_switch.isra.0+0x153/0x700
[   10.839048]  ? __switch_to+0x47/0xf50
[   10.839071]  ? __schedule+0x10cc/0x2b60
[   10.839091]  ? __pfx_read_tsc+0x10/0x10
[   10.839114]  krealloc_less_oob+0x1c/0x30
[   10.839134]  kunit_try_run_case+0x1a5/0x480
[   10.839156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.839177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.839198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.839231]  ? __kthread_parkme+0x82/0x180
[   10.839251]  ? preempt_count_sub+0x50/0x80
[   10.839272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.839294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.839315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.839336]  kthread+0x337/0x6f0
[   10.839353]  ? trace_preempt_on+0x20/0xc0
[   10.839376]  ? __pfx_kthread+0x10/0x10
[   10.839395]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.839414]  ? calculate_sigpending+0x7b/0xa0
[   10.839437]  ? __pfx_kthread+0x10/0x10
[   10.839458]  ret_from_fork+0x116/0x1d0
[   10.839475]  ? __pfx_kthread+0x10/0x10
[   10.839494]  ret_from_fork_asm+0x1a/0x30
[   10.839522]  </TASK>
[   10.839532] 
[   10.848393] Allocated by task 184:
[   10.849012]  kasan_save_stack+0x45/0x70
[   10.849246]  kasan_save_track+0x18/0x40
[   10.849406]  kasan_save_alloc_info+0x3b/0x50
[   10.849685]  __kasan_krealloc+0x190/0x1f0
[   10.849944]  krealloc_noprof+0xf3/0x340
[   10.850091]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.850345]  krealloc_less_oob+0x1c/0x30
[   10.850751]  kunit_try_run_case+0x1a5/0x480
[   10.850934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.851278]  kthread+0x337/0x6f0
[   10.851435]  ret_from_fork+0x116/0x1d0
[   10.851669]  ret_from_fork_asm+0x1a/0x30
[   10.851914] 
[   10.851987] The buggy address belongs to the object at ffff88810037e800
[   10.851987]  which belongs to the cache kmalloc-256 of size 256
[   10.852477] The buggy address is located 7 bytes to the right of
[   10.852477]  allocated 201-byte region [ffff88810037e800, ffff88810037e8c9)
[   10.852984] 
[   10.853067] The buggy address belongs to the physical page:
[   10.853691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10037e
[   10.853983] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.854451] flags: 0x200000000000040(head|node=0|zone=2)
[   10.854801] page_type: f5(slab)
[   10.854917] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.855334] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.855899] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.856286] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.856832] head: 0200000000000001 ffffea000400df81 00000000ffffffff 00000000ffffffff
[   10.857260] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.857689] page dumped because: kasan: bad access detected
[   10.857870] 
[   10.857959] Memory state around the buggy address:
[   10.858385]  ffff88810037e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.858722]  ffff88810037e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.859153] >ffff88810037e880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.859632]                                                  ^
[   10.859860]  ffff88810037e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.860140]  ffff88810037e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.860644] ==================================================================
[   10.861317] ==================================================================
[   10.861633] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   10.862298] Write of size 1 at addr ffff88810037e8da by task kunit_try_catch/184
[   10.862790] 
[   10.862960] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.863008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.863019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.863137] Call Trace:
[   10.863152]  <TASK>
[   10.863168]  dump_stack_lvl+0x73/0xb0
[   10.863196]  print_report+0xd1/0x650
[   10.863230]  ? __virt_addr_valid+0x1db/0x2d0
[   10.863251]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.863273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.863297]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.863319]  kasan_report+0x141/0x180
[   10.863338]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.863364]  __asan_report_store1_noabort+0x1b/0x30
[   10.863386]  krealloc_less_oob_helper+0xec6/0x11d0
[   10.863410]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.863432]  ? finish_task_switch.isra.0+0x153/0x700
[   10.863452]  ? __switch_to+0x47/0xf50
[   10.863476]  ? __schedule+0x10cc/0x2b60
[   10.863496]  ? __pfx_read_tsc+0x10/0x10
[   10.863518]  krealloc_less_oob+0x1c/0x30
[   10.863538]  kunit_try_run_case+0x1a5/0x480
[   10.863559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.863580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.863600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.863621]  ? __kthread_parkme+0x82/0x180
[   10.863640]  ? preempt_count_sub+0x50/0x80
[   10.863661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.863682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.863703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.863724]  kthread+0x337/0x6f0
[   10.863742]  ? trace_preempt_on+0x20/0xc0
[   10.863765]  ? __pfx_kthread+0x10/0x10
[   10.863784]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.863803]  ? calculate_sigpending+0x7b/0xa0
[   10.863825]  ? __pfx_kthread+0x10/0x10
[   10.863844]  ret_from_fork+0x116/0x1d0
[   10.863862]  ? __pfx_kthread+0x10/0x10
[   10.863881]  ret_from_fork_asm+0x1a/0x30
[   10.863908]  </TASK>
[   10.863918] 
[   10.874301] Allocated by task 184:
[   10.874428]  kasan_save_stack+0x45/0x70
[   10.874564]  kasan_save_track+0x18/0x40
[   10.874690]  kasan_save_alloc_info+0x3b/0x50
[   10.874867]  __kasan_krealloc+0x190/0x1f0
[   10.875108]  krealloc_noprof+0xf3/0x340
[   10.875310]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.875610]  krealloc_less_oob+0x1c/0x30
[   10.875739]  kunit_try_run_case+0x1a5/0x480
[   10.875873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.876252]  kthread+0x337/0x6f0
[   10.876419]  ret_from_fork+0x116/0x1d0
[   10.876600]  ret_from_fork_asm+0x1a/0x30
[   10.876790] 
[   10.876877] The buggy address belongs to the object at ffff88810037e800
[   10.876877]  which belongs to the cache kmalloc-256 of size 256
[   10.877441] The buggy address is located 17 bytes to the right of
[   10.877441]  allocated 201-byte region [ffff88810037e800, ffff88810037e8c9)
[   10.877941] 
[   10.878005] The buggy address belongs to the physical page:
[   10.878219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10037e
[   10.878550] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.878781] flags: 0x200000000000040(head|node=0|zone=2)
[   10.878947] page_type: f5(slab)
[   10.879085] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.879508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.879826] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.880047] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.880348] head: 0200000000000001 ffffea000400df81 00000000ffffffff 00000000ffffffff
[   10.880686] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.881009] page dumped because: kasan: bad access detected
[   10.881333] 
[   10.881403] Memory state around the buggy address:
[   10.881907]  ffff88810037e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.882231]  ffff88810037e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.882462] >ffff88810037e880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.882667]                                                     ^
[   10.882910]  ffff88810037e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.883228]  ffff88810037e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.883525] ==================================================================
[   11.020948] ==================================================================
[   11.021311] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.021674] Write of size 1 at addr ffff888102c460ea by task kunit_try_catch/188
[   11.021894] 
[   11.021971] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   11.022014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.022024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.022044] Call Trace:
[   11.022058]  <TASK>
[   11.022072]  dump_stack_lvl+0x73/0xb0
[   11.022098]  print_report+0xd1/0x650
[   11.022119]  ? __virt_addr_valid+0x1db/0x2d0
[   11.022141]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.022163]  ? kasan_addr_to_slab+0x11/0xa0
[   11.022182]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.022217]  kasan_report+0x141/0x180
[   11.022237]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.022264]  __asan_report_store1_noabort+0x1b/0x30
[   11.022287]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.022311]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.022333]  ? finish_task_switch.isra.0+0x153/0x700
[   11.022354]  ? __switch_to+0x47/0xf50
[   11.022378]  ? __schedule+0x10cc/0x2b60
[   11.022398]  ? __pfx_read_tsc+0x10/0x10
[   11.022421]  krealloc_large_less_oob+0x1c/0x30
[   11.022443]  kunit_try_run_case+0x1a5/0x480
[   11.022466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.022487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.022508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.022529]  ? __kthread_parkme+0x82/0x180
[   11.022548]  ? preempt_count_sub+0x50/0x80
[   11.022569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.022592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.022613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.022635]  kthread+0x337/0x6f0
[   11.022654]  ? trace_preempt_on+0x20/0xc0
[   11.022675]  ? __pfx_kthread+0x10/0x10
[   11.022695]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.022714]  ? calculate_sigpending+0x7b/0xa0
[   11.022736]  ? __pfx_kthread+0x10/0x10
[   11.022757]  ret_from_fork+0x116/0x1d0
[   11.022774]  ? __pfx_kthread+0x10/0x10
[   11.022793]  ret_from_fork_asm+0x1a/0x30
[   11.022821]  </TASK>
[   11.022831] 
[   11.030451] The buggy address belongs to the physical page:
[   11.030712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c44
[   11.031055] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.031503] flags: 0x200000000000040(head|node=0|zone=2)
[   11.031714] page_type: f8(unknown)
[   11.031846] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.032105] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   11.032732] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.033038] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   11.033280] head: 0200000000000002 ffffea00040b1101 00000000ffffffff 00000000ffffffff
[   11.033505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.033725] page dumped because: kasan: bad access detected
[   11.033927] 
[   11.034010] Memory state around the buggy address:
[   11.034345]  ffff888102c45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.035010]  ffff888102c46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.035236] >ffff888102c46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.035444]                                                           ^
[   11.035637]  ffff888102c46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.035845]  ffff888102c46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.036353] ==================================================================
[   11.005505] ==================================================================
[   11.005801] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.006101] Write of size 1 at addr ffff888102c460da by task kunit_try_catch/188
[   11.006473] 
[   11.006582] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   11.006626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.006638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.006658] Call Trace:
[   11.006672]  <TASK>
[   11.006686]  dump_stack_lvl+0x73/0xb0
[   11.006712]  print_report+0xd1/0x650
[   11.006732]  ? __virt_addr_valid+0x1db/0x2d0
[   11.006753]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.006775]  ? kasan_addr_to_slab+0x11/0xa0
[   11.006794]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.006816]  kasan_report+0x141/0x180
[   11.006836]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.006862]  __asan_report_store1_noabort+0x1b/0x30
[   11.006885]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.006909]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.006932]  ? finish_task_switch.isra.0+0x153/0x700
[   11.006954]  ? __switch_to+0x47/0xf50
[   11.006978]  ? __schedule+0x10cc/0x2b60
[   11.006998]  ? __pfx_read_tsc+0x10/0x10
[   11.007021]  krealloc_large_less_oob+0x1c/0x30
[   11.007043]  kunit_try_run_case+0x1a5/0x480
[   11.007065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.007086]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.007108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.007128]  ? __kthread_parkme+0x82/0x180
[   11.007147]  ? preempt_count_sub+0x50/0x80
[   11.007192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.007223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.007245]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.007267]  kthread+0x337/0x6f0
[   11.007285]  ? trace_preempt_on+0x20/0xc0
[   11.007307]  ? __pfx_kthread+0x10/0x10
[   11.007326]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.007346]  ? calculate_sigpending+0x7b/0xa0
[   11.007368]  ? __pfx_kthread+0x10/0x10
[   11.007388]  ret_from_fork+0x116/0x1d0
[   11.007405]  ? __pfx_kthread+0x10/0x10
[   11.007476]  ret_from_fork_asm+0x1a/0x30
[   11.007507]  </TASK>
[   11.007518] 
[   11.014688] The buggy address belongs to the physical page:
[   11.014940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c44
[   11.015313] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.015640] flags: 0x200000000000040(head|node=0|zone=2)
[   11.015881] page_type: f8(unknown)
[   11.016048] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.016346] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   11.016611] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.017046] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   11.017406] head: 0200000000000002 ffffea00040b1101 00000000ffffffff 00000000ffffffff
[   11.017893] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.018175] page dumped because: kasan: bad access detected
[   11.018419] 
[   11.018492] Memory state around the buggy address:
[   11.018820]  ffff888102c45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.019090]  ffff888102c46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.019322] >ffff888102c46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.019529]                                                     ^
[   11.019709]  ffff888102c46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.019916]  ffff888102c46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.020565] ==================================================================
[   10.989762] ==================================================================
[   10.990107] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   10.990562] Write of size 1 at addr ffff888102c460d0 by task kunit_try_catch/188
[   10.990849] 
[   10.990935] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.990979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.990990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.991010] Call Trace:
[   10.991023]  <TASK>
[   10.991037]  dump_stack_lvl+0x73/0xb0
[   10.991066]  print_report+0xd1/0x650
[   10.991087]  ? __virt_addr_valid+0x1db/0x2d0
[   10.991110]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.991132]  ? kasan_addr_to_slab+0x11/0xa0
[   10.991151]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.991173]  kasan_report+0x141/0x180
[   10.991193]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.991232]  __asan_report_store1_noabort+0x1b/0x30
[   10.991255]  krealloc_less_oob_helper+0xe23/0x11d0
[   10.991279]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.991301]  ? finish_task_switch.isra.0+0x153/0x700
[   10.991323]  ? __switch_to+0x47/0xf50
[   10.991348]  ? __schedule+0x10cc/0x2b60
[   10.991368]  ? __pfx_read_tsc+0x10/0x10
[   10.991392]  krealloc_large_less_oob+0x1c/0x30
[   10.991413]  kunit_try_run_case+0x1a5/0x480
[   10.991437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.991457]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.991479]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.991500]  ? __kthread_parkme+0x82/0x180
[   10.991520]  ? preempt_count_sub+0x50/0x80
[   10.991541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.991563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.991584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.991605]  kthread+0x337/0x6f0
[   10.991624]  ? trace_preempt_on+0x20/0xc0
[   10.991646]  ? __pfx_kthread+0x10/0x10
[   10.991666]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.991685]  ? calculate_sigpending+0x7b/0xa0
[   10.991708]  ? __pfx_kthread+0x10/0x10
[   10.991728]  ret_from_fork+0x116/0x1d0
[   10.991745]  ? __pfx_kthread+0x10/0x10
[   10.991765]  ret_from_fork_asm+0x1a/0x30
[   10.991794]  </TASK>
[   10.991804] 
[   10.999329] The buggy address belongs to the physical page:
[   10.999567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c44
[   10.999948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.000229] flags: 0x200000000000040(head|node=0|zone=2)
[   11.000463] page_type: f8(unknown)
[   11.000852] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.001180] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   11.001557] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.001874] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   11.002165] head: 0200000000000002 ffffea00040b1101 00000000ffffffff 00000000ffffffff
[   11.002457] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.002735] page dumped because: kasan: bad access detected
[   11.002926] 
[   11.003014] Memory state around the buggy address:
[   11.003283]  ffff888102c45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.003634]  ffff888102c46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.003843] >ffff888102c46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.004053]                                                  ^
[   11.004255]  ffff888102c46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.004556]  ffff888102c46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.004856] ==================================================================
[   11.037056] ==================================================================
[   11.037709] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.038059] Write of size 1 at addr ffff888102c460eb by task kunit_try_catch/188
[   11.038602] 
[   11.038687] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   11.038732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.038744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.038763] Call Trace:
[   11.038775]  <TASK>
[   11.038789]  dump_stack_lvl+0x73/0xb0
[   11.038815]  print_report+0xd1/0x650
[   11.038835]  ? __virt_addr_valid+0x1db/0x2d0
[   11.038856]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.038878]  ? kasan_addr_to_slab+0x11/0xa0
[   11.038897]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.038919]  kasan_report+0x141/0x180
[   11.038939]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.038965]  __asan_report_store1_noabort+0x1b/0x30
[   11.038988]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.039012]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.039034]  ? finish_task_switch.isra.0+0x153/0x700
[   11.039056]  ? __switch_to+0x47/0xf50
[   11.039079]  ? __schedule+0x10cc/0x2b60
[   11.039099]  ? __pfx_read_tsc+0x10/0x10
[   11.039122]  krealloc_large_less_oob+0x1c/0x30
[   11.039143]  kunit_try_run_case+0x1a5/0x480
[   11.039166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.039187]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.039220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.039241]  ? __kthread_parkme+0x82/0x180
[   11.039260]  ? preempt_count_sub+0x50/0x80
[   11.039281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.039303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.039324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.039346]  kthread+0x337/0x6f0
[   11.039364]  ? trace_preempt_on+0x20/0xc0
[   11.039386]  ? __pfx_kthread+0x10/0x10
[   11.039406]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.039425]  ? calculate_sigpending+0x7b/0xa0
[   11.039448]  ? __pfx_kthread+0x10/0x10
[   11.039468]  ret_from_fork+0x116/0x1d0
[   11.039486]  ? __pfx_kthread+0x10/0x10
[   11.039506]  ret_from_fork_asm+0x1a/0x30
[   11.039534]  </TASK>
[   11.039544] 
[   11.047052] The buggy address belongs to the physical page:
[   11.047394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c44
[   11.047771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.048106] flags: 0x200000000000040(head|node=0|zone=2)
[   11.048347] page_type: f8(unknown)
[   11.048469] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.048695] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   11.048922] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.049154] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   11.049689] head: 0200000000000002 ffffea00040b1101 00000000ffffffff 00000000ffffffff
[   11.050193] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.050530] page dumped because: kasan: bad access detected
[   11.050733] 
[   11.050795] Memory state around the buggy address:
[   11.050941]  ffff888102c45f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.051151]  ffff888102c46000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.051368] >ffff888102c46080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.051793]                                                           ^
[   11.052089]  ffff888102c46100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.052408]  ffff888102c46180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.052768] ==================================================================