Hay
Date
June 18, 2025, 6:43 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.976273] ==================================================================
[   19.976563] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.976696] Write of size 1 at addr fff00000c59a8cf0 by task kunit_try_catch/166
[   19.976809] 
[   19.976892] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.977101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.977165] Hardware name: linux,dummy-virt (DT)
[   19.977240] Call trace:
[   19.977292]  show_stack+0x20/0x38 (C)
[   19.977924]  dump_stack_lvl+0x8c/0xd0
[   19.978120]  print_report+0x118/0x608
[   19.978276]  kasan_report+0xdc/0x128
[   19.978384]  __asan_report_store1_noabort+0x20/0x30
[   19.978474]  krealloc_more_oob_helper+0x5c0/0x678
[   19.978557]  krealloc_more_oob+0x20/0x38
[   19.978643]  kunit_try_run_case+0x170/0x3f0
[   19.978720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.978820]  kthread+0x328/0x630
[   19.978903]  ret_from_fork+0x10/0x20
[   19.979073] 
[   19.979131] Allocated by task 166:
[   19.979214]  kasan_save_stack+0x3c/0x68
[   19.979336]  kasan_save_track+0x20/0x40
[   19.979417]  kasan_save_alloc_info+0x40/0x58
[   19.979532]  __kasan_krealloc+0x118/0x178
[   19.979638]  krealloc_noprof+0x128/0x360
[   19.979747]  krealloc_more_oob_helper+0x168/0x678
[   19.979855]  krealloc_more_oob+0x20/0x38
[   19.979945]  kunit_try_run_case+0x170/0x3f0
[   19.980030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.980111]  kthread+0x328/0x630
[   19.980178]  ret_from_fork+0x10/0x20
[   19.980253] 
[   19.980667] The buggy address belongs to the object at fff00000c59a8c00
[   19.980667]  which belongs to the cache kmalloc-256 of size 256
[   19.980812] The buggy address is located 5 bytes to the right of
[   19.980812]  allocated 235-byte region [fff00000c59a8c00, fff00000c59a8ceb)
[   19.981167] 
[   19.981286] The buggy address belongs to the physical page:
[   19.981466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   19.981634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.981776] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.981932] page_type: f5(slab)
[   19.982046] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.982164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.982276] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.982385] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.982487] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   19.982573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.982643] page dumped because: kasan: bad access detected
[   19.982700] 
[   19.982733] Memory state around the buggy address:
[   19.982794]  fff00000c59a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.982892]  fff00000c59a8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.982979] >fff00000c59a8c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.983424]                                                              ^
[   19.983549]  fff00000c59a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.983647]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.983723] ==================================================================
[   20.125761] ==================================================================
[   20.125927] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   20.128285] Write of size 1 at addr fff00000c76d20eb by task kunit_try_catch/170
[   20.128597] 
[   20.128698] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.129584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.130124] Hardware name: linux,dummy-virt (DT)
[   20.130303] Call trace:
[   20.130355]  show_stack+0x20/0x38 (C)
[   20.130490]  dump_stack_lvl+0x8c/0xd0
[   20.130583]  print_report+0x118/0x608
[   20.130665]  kasan_report+0xdc/0x128
[   20.130748]  __asan_report_store1_noabort+0x20/0x30
[   20.130854]  krealloc_more_oob_helper+0x60c/0x678
[   20.132317]  krealloc_large_more_oob+0x20/0x38
[   20.132590]  kunit_try_run_case+0x170/0x3f0
[   20.132902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.133552]  kthread+0x328/0x630
[   20.134279]  ret_from_fork+0x10/0x20
[   20.134555] 
[   20.134815] The buggy address belongs to the physical page:
[   20.135100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.135506] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.135617] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.135742] page_type: f8(unknown)
[   20.135828] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.136656] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.136817] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.137638] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.138306] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.138598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.138814] page dumped because: kasan: bad access detected
[   20.138990] 
[   20.139120] Memory state around the buggy address:
[   20.139196]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.139292]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.139384] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.139458]                                                           ^
[   20.139544]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.140371]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.141707] ==================================================================
[   19.960643] ==================================================================
[   19.960983] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.961154] Write of size 1 at addr fff00000c59a8ceb by task kunit_try_catch/166
[   19.961455] 
[   19.961616] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.961856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.961924] Hardware name: linux,dummy-virt (DT)
[   19.962001] Call trace:
[   19.962099]  show_stack+0x20/0x38 (C)
[   19.962218]  dump_stack_lvl+0x8c/0xd0
[   19.962328]  print_report+0x118/0x608
[   19.962422]  kasan_report+0xdc/0x128
[   19.962510]  __asan_report_store1_noabort+0x20/0x30
[   19.962648]  krealloc_more_oob_helper+0x60c/0x678
[   19.962788]  krealloc_more_oob+0x20/0x38
[   19.962931]  kunit_try_run_case+0x170/0x3f0
[   19.963433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.963584]  kthread+0x328/0x630
[   19.963694]  ret_from_fork+0x10/0x20
[   19.963888] 
[   19.963934] Allocated by task 166:
[   19.964126]  kasan_save_stack+0x3c/0x68
[   19.964502]  kasan_save_track+0x20/0x40
[   19.964633]  kasan_save_alloc_info+0x40/0x58
[   19.965216]  __kasan_krealloc+0x118/0x178
[   19.965746]  krealloc_noprof+0x128/0x360
[   19.965992]  krealloc_more_oob_helper+0x168/0x678
[   19.966110]  krealloc_more_oob+0x20/0x38
[   19.966195]  kunit_try_run_case+0x170/0x3f0
[   19.966265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.966820]  kthread+0x328/0x630
[   19.966998]  ret_from_fork+0x10/0x20
[   19.967113] 
[   19.967279] The buggy address belongs to the object at fff00000c59a8c00
[   19.967279]  which belongs to the cache kmalloc-256 of size 256
[   19.967490] The buggy address is located 0 bytes to the right of
[   19.967490]  allocated 235-byte region [fff00000c59a8c00, fff00000c59a8ceb)
[   19.967638] 
[   19.967680] The buggy address belongs to the physical page:
[   19.968010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   19.968325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.968446] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.968593] page_type: f5(slab)
[   19.968695] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.968892] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.969218] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.969539] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.969841] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   19.970139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.970239] page dumped because: kasan: bad access detected
[   19.970560] 
[   19.970608] Memory state around the buggy address:
[   19.970696]  fff00000c59a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.970787]  fff00000c59a8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.970875] >fff00000c59a8c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.971136]                                                           ^
[   19.971231]  fff00000c59a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.971356]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.971489] ==================================================================
[   20.143791] ==================================================================
[   20.143890] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   20.143997] Write of size 1 at addr fff00000c76d20f0 by task kunit_try_catch/170
[   20.145888] 
[   20.146299] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.146462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.146514] Hardware name: linux,dummy-virt (DT)
[   20.146576] Call trace:
[   20.146620]  show_stack+0x20/0x38 (C)
[   20.146734]  dump_stack_lvl+0x8c/0xd0
[   20.146836]  print_report+0x118/0x608
[   20.146937]  kasan_report+0xdc/0x128
[   20.148935]  __asan_report_store1_noabort+0x20/0x30
[   20.149405]  krealloc_more_oob_helper+0x5c0/0x678
[   20.150113]  krealloc_large_more_oob+0x20/0x38
[   20.150321]  kunit_try_run_case+0x170/0x3f0
[   20.150984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.151367]  kthread+0x328/0x630
[   20.151891]  ret_from_fork+0x10/0x20
[   20.152617] 
[   20.152859] The buggy address belongs to the physical page:
[   20.152931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.153106] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.153824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.154284] page_type: f8(unknown)
[   20.154365] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.155099] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.155399] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.155504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.155611] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.155717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.155803] page dumped because: kasan: bad access detected
[   20.155870] 
[   20.155906] Memory state around the buggy address:
[   20.155975]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.157658]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.158482] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.158675]                                                              ^
[   20.158805]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.158896]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.158967] ==================================================================

[   10.774425] ==================================================================
[   10.774792] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.775095] Write of size 1 at addr ffff888100a22af0 by task kunit_try_catch/182
[   10.775562] 
[   10.775706] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.775751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.775763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.775782] Call Trace:
[   10.775794]  <TASK>
[   10.775808]  dump_stack_lvl+0x73/0xb0
[   10.775834]  print_report+0xd1/0x650
[   10.775854]  ? __virt_addr_valid+0x1db/0x2d0
[   10.775875]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.775896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.775920]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.775942]  kasan_report+0x141/0x180
[   10.775963]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.775990]  __asan_report_store1_noabort+0x1b/0x30
[   10.776012]  krealloc_more_oob_helper+0x7eb/0x930
[   10.776032]  ? __schedule+0x10cc/0x2b60
[   10.776106]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.776143]  ? finish_task_switch.isra.0+0x153/0x700
[   10.776164]  ? __switch_to+0x47/0xf50
[   10.776187]  ? __schedule+0x10cc/0x2b60
[   10.776222]  ? __pfx_read_tsc+0x10/0x10
[   10.776245]  krealloc_more_oob+0x1c/0x30
[   10.776266]  kunit_try_run_case+0x1a5/0x480
[   10.776299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.776319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.776339]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.776360]  ? __kthread_parkme+0x82/0x180
[   10.776378]  ? preempt_count_sub+0x50/0x80
[   10.776399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.776421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.776442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.776463]  kthread+0x337/0x6f0
[   10.776480]  ? trace_preempt_on+0x20/0xc0
[   10.776502]  ? __pfx_kthread+0x10/0x10
[   10.776521]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.776548]  ? calculate_sigpending+0x7b/0xa0
[   10.776640]  ? __pfx_kthread+0x10/0x10
[   10.776665]  ret_from_fork+0x116/0x1d0
[   10.776684]  ? __pfx_kthread+0x10/0x10
[   10.776703]  ret_from_fork_asm+0x1a/0x30
[   10.776731]  </TASK>
[   10.776741] 
[   10.789246] Allocated by task 182:
[   10.790014]  kasan_save_stack+0x45/0x70
[   10.790367]  kasan_save_track+0x18/0x40
[   10.790981]  kasan_save_alloc_info+0x3b/0x50
[   10.791390]  __kasan_krealloc+0x190/0x1f0
[   10.791811]  krealloc_noprof+0xf3/0x340
[   10.791994]  krealloc_more_oob_helper+0x1a9/0x930
[   10.792180]  krealloc_more_oob+0x1c/0x30
[   10.792347]  kunit_try_run_case+0x1a5/0x480
[   10.792985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.793353]  kthread+0x337/0x6f0
[   10.793740]  ret_from_fork+0x116/0x1d0
[   10.794196]  ret_from_fork_asm+0x1a/0x30
[   10.794905] 
[   10.795189] The buggy address belongs to the object at ffff888100a22a00
[   10.795189]  which belongs to the cache kmalloc-256 of size 256
[   10.796074] The buggy address is located 5 bytes to the right of
[   10.796074]  allocated 235-byte region [ffff888100a22a00, ffff888100a22aeb)
[   10.797008] 
[   10.797102] The buggy address belongs to the physical page:
[   10.797659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22
[   10.798054] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.798626] anon flags: 0x200000000000040(head|node=0|zone=2)
[   10.799096] page_type: f5(slab)
[   10.799512] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001
[   10.799960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.800501] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001
[   10.801120] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.801770] head: 0200000000000001 ffffea0004028881 00000000ffffffff 00000000ffffffff
[   10.802179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.802440] page dumped because: kasan: bad access detected
[   10.802900] 
[   10.803053] Memory state around the buggy address:
[   10.803574]  ffff888100a22980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.803831]  ffff888100a22a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.804041] >ffff888100a22a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.804269]                                                              ^
[   10.804585]  ffff888100a22b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.804838]  ffff888100a22b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.805356] ==================================================================
[   10.741756] ==================================================================
[   10.743265] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.743714] Write of size 1 at addr ffff888100a22aeb by task kunit_try_catch/182
[   10.745263] 
[   10.745357] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.745629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.745644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.745702] Call Trace:
[   10.745715]  <TASK>
[   10.745731]  dump_stack_lvl+0x73/0xb0
[   10.745760]  print_report+0xd1/0x650
[   10.745780]  ? __virt_addr_valid+0x1db/0x2d0
[   10.745801]  ? krealloc_more_oob_helper+0x821/0x930
[   10.745823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.745847]  ? krealloc_more_oob_helper+0x821/0x930
[   10.745869]  kasan_report+0x141/0x180
[   10.745889]  ? krealloc_more_oob_helper+0x821/0x930
[   10.745915]  __asan_report_store1_noabort+0x1b/0x30
[   10.745938]  krealloc_more_oob_helper+0x821/0x930
[   10.745958]  ? __schedule+0x10cc/0x2b60
[   10.745978]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.746000]  ? finish_task_switch.isra.0+0x153/0x700
[   10.746021]  ? __switch_to+0x47/0xf50
[   10.746047]  ? __schedule+0x10cc/0x2b60
[   10.746066]  ? __pfx_read_tsc+0x10/0x10
[   10.746089]  krealloc_more_oob+0x1c/0x30
[   10.746109]  kunit_try_run_case+0x1a5/0x480
[   10.746131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.746151]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.746192]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.746222]  ? __kthread_parkme+0x82/0x180
[   10.746242]  ? preempt_count_sub+0x50/0x80
[   10.746263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.746285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.746305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.746327]  kthread+0x337/0x6f0
[   10.746345]  ? trace_preempt_on+0x20/0xc0
[   10.746367]  ? __pfx_kthread+0x10/0x10
[   10.746386]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.746405]  ? calculate_sigpending+0x7b/0xa0
[   10.746446]  ? __pfx_kthread+0x10/0x10
[   10.746465]  ret_from_fork+0x116/0x1d0
[   10.746482]  ? __pfx_kthread+0x10/0x10
[   10.746501]  ret_from_fork_asm+0x1a/0x30
[   10.746530]  </TASK>
[   10.746541] 
[   10.761085] Allocated by task 182:
[   10.761238]  kasan_save_stack+0x45/0x70
[   10.761373]  kasan_save_track+0x18/0x40
[   10.761510]  kasan_save_alloc_info+0x3b/0x50
[   10.761643]  __kasan_krealloc+0x190/0x1f0
[   10.761913]  krealloc_noprof+0xf3/0x340
[   10.762087]  krealloc_more_oob_helper+0x1a9/0x930
[   10.762408]  krealloc_more_oob+0x1c/0x30
[   10.762550]  kunit_try_run_case+0x1a5/0x480
[   10.762688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.763134]  kthread+0x337/0x6f0
[   10.763355]  ret_from_fork+0x116/0x1d0
[   10.763534]  ret_from_fork_asm+0x1a/0x30
[   10.763708] 
[   10.763770] The buggy address belongs to the object at ffff888100a22a00
[   10.763770]  which belongs to the cache kmalloc-256 of size 256
[   10.764588] The buggy address is located 0 bytes to the right of
[   10.764588]  allocated 235-byte region [ffff888100a22a00, ffff888100a22aeb)
[   10.765223] 
[   10.765296] The buggy address belongs to the physical page:
[   10.765562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a22
[   10.765976] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.766361] anon flags: 0x200000000000040(head|node=0|zone=2)
[   10.766540] page_type: f5(slab)
[   10.766731] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001
[   10.767084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.767541] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001
[   10.767935] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.768331] head: 0200000000000001 ffffea0004028881 00000000ffffffff 00000000ffffffff
[   10.769115] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.769879] page dumped because: kasan: bad access detected
[   10.770345] 
[   10.770511] Memory state around the buggy address:
[   10.770859]  ffff888100a22980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.771064]  ffff888100a22a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.771612] >ffff888100a22a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.772250]                                                           ^
[   10.772985]  ffff888100a22b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.773495]  ffff888100a22b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.773835] ==================================================================
[   10.955907] ==================================================================
[   10.956221] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   10.956590] Write of size 1 at addr ffff888103ab60f0 by task kunit_try_catch/186
[   10.956990] 
[   10.957073] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.957117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.957129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.957149] Call Trace:
[   10.957161]  <TASK>
[   10.957174]  dump_stack_lvl+0x73/0xb0
[   10.957200]  print_report+0xd1/0x650
[   10.957233]  ? __virt_addr_valid+0x1db/0x2d0
[   10.957254]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.957276]  ? kasan_addr_to_slab+0x11/0xa0
[   10.957295]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.957316]  kasan_report+0x141/0x180
[   10.957337]  ? krealloc_more_oob_helper+0x7eb/0x930
[   10.957364]  __asan_report_store1_noabort+0x1b/0x30
[   10.957387]  krealloc_more_oob_helper+0x7eb/0x930
[   10.957407]  ? __schedule+0x10cc/0x2b60
[   10.957428]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.957450]  ? finish_task_switch.isra.0+0x153/0x700
[   10.957470]  ? __switch_to+0x47/0xf50
[   10.957494]  ? __schedule+0x10cc/0x2b60
[   10.957513]  ? __pfx_read_tsc+0x10/0x10
[   10.957536]  krealloc_large_more_oob+0x1c/0x30
[   10.957557]  kunit_try_run_case+0x1a5/0x480
[   10.957580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.957601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.957622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.957643]  ? __kthread_parkme+0x82/0x180
[   10.957662]  ? preempt_count_sub+0x50/0x80
[   10.957683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.957706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.957727]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.957748]  kthread+0x337/0x6f0
[   10.957766]  ? trace_preempt_on+0x20/0xc0
[   10.957788]  ? __pfx_kthread+0x10/0x10
[   10.957807]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.957826]  ? calculate_sigpending+0x7b/0xa0
[   10.957849]  ? __pfx_kthread+0x10/0x10
[   10.957869]  ret_from_fork+0x116/0x1d0
[   10.957887]  ? __pfx_kthread+0x10/0x10
[   10.957906]  ret_from_fork_asm+0x1a/0x30
[   10.957934]  </TASK>
[   10.957944] 
[   10.965823] The buggy address belongs to the physical page:
[   10.966054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab4
[   10.966423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.966696] flags: 0x200000000000040(head|node=0|zone=2)
[   10.966940] page_type: f8(unknown)
[   10.967108] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.967481] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   10.967790] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.968078] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   10.968391] head: 0200000000000002 ffffea00040ead01 00000000ffffffff 00000000ffffffff
[   10.968864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.969180] page dumped because: kasan: bad access detected
[   10.969368] 
[   10.969430] Memory state around the buggy address:
[   10.969575]  ffff888103ab5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.969782]  ffff888103ab6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.970323] >ffff888103ab6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   10.970548]                                                              ^
[   10.970745]  ffff888103ab6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.970952]  ffff888103ab6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.971159] ==================================================================
[   10.934618] ==================================================================
[   10.935054] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   10.935658] Write of size 1 at addr ffff888103ab60eb by task kunit_try_catch/186
[   10.935963] 
[   10.936070] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   10.936117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.936130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.936149] Call Trace:
[   10.936163]  <TASK>
[   10.936179]  dump_stack_lvl+0x73/0xb0
[   10.936217]  print_report+0xd1/0x650
[   10.936238]  ? __virt_addr_valid+0x1db/0x2d0
[   10.936260]  ? krealloc_more_oob_helper+0x821/0x930
[   10.936283]  ? kasan_addr_to_slab+0x11/0xa0
[   10.936302]  ? krealloc_more_oob_helper+0x821/0x930
[   10.936324]  kasan_report+0x141/0x180
[   10.936344]  ? krealloc_more_oob_helper+0x821/0x930
[   10.936370]  __asan_report_store1_noabort+0x1b/0x30
[   10.936393]  krealloc_more_oob_helper+0x821/0x930
[   10.936414]  ? __schedule+0x10cc/0x2b60
[   10.936435]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.936458]  ? finish_task_switch.isra.0+0x153/0x700
[   10.936479]  ? __switch_to+0x47/0xf50
[   10.936504]  ? __schedule+0x10cc/0x2b60
[   10.936523]  ? __pfx_read_tsc+0x10/0x10
[   10.936546]  krealloc_large_more_oob+0x1c/0x30
[   10.936567]  kunit_try_run_case+0x1a5/0x480
[   10.936589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.936610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.936631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.936659]  ? __kthread_parkme+0x82/0x180
[   10.936678]  ? preempt_count_sub+0x50/0x80
[   10.936700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.936723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.936747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.936769]  kthread+0x337/0x6f0
[   10.936789]  ? trace_preempt_on+0x20/0xc0
[   10.936811]  ? __pfx_kthread+0x10/0x10
[   10.936830]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.936849]  ? calculate_sigpending+0x7b/0xa0
[   10.936873]  ? __pfx_kthread+0x10/0x10
[   10.936893]  ret_from_fork+0x116/0x1d0
[   10.936910]  ? __pfx_kthread+0x10/0x10
[   10.936929]  ret_from_fork_asm+0x1a/0x30
[   10.936957]  </TASK>
[   10.936968] 
[   10.947171] The buggy address belongs to the physical page:
[   10.947550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab4
[   10.947878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.948382] flags: 0x200000000000040(head|node=0|zone=2)
[   10.948747] page_type: f8(unknown)
[   10.949158] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.949660] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   10.950115] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.950742] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   10.951056] head: 0200000000000002 ffffea00040ead01 00000000ffffffff 00000000ffffffff
[   10.951550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.951892] page dumped because: kasan: bad access detected
[   10.952266] 
[   10.952360] Memory state around the buggy address:
[   10.952914]  ffff888103ab5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.953380]  ffff888103ab6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.954051] >ffff888103ab6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   10.954355]                                                           ^
[   10.954750]  ffff888103ab6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.955047]  ffff888103ab6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.955361] ==================================================================