Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.537006] ==================================================================
[   32.537327] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.537459] Write of size 1 at addr fff00000c45112c9 by task kunit_try_catch/170
[   32.537580] 
[   32.537781] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.538138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.538203] Hardware name: linux,dummy-virt (DT)
[   32.538275] Call trace:
[   32.538326]  show_stack+0x20/0x38 (C)
[   32.538449]  dump_stack_lvl+0x8c/0xd0
[   32.538671]  print_report+0x118/0x608
[   32.538822]  kasan_report+0xdc/0x128
[   32.539022]  __asan_report_store1_noabort+0x20/0x30
[   32.539435]  krealloc_less_oob_helper+0xa48/0xc50
[   32.539746]  krealloc_less_oob+0x20/0x38
[   32.539932]  kunit_try_run_case+0x170/0x3f0
[   32.540091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.540348]  kthread+0x328/0x630
[   32.540475]  ret_from_fork+0x10/0x20
[   32.540739] 
[   32.541209] Allocated by task 170:
[   32.541328]  kasan_save_stack+0x3c/0x68
[   32.542089]  kasan_save_track+0x20/0x40
[   32.542197]  kasan_save_alloc_info+0x40/0x58
[   32.542375]  __kasan_krealloc+0x118/0x178
[   32.542862]  krealloc_noprof+0x128/0x360
[   32.542986]  krealloc_less_oob_helper+0x168/0xc50
[   32.543102]  krealloc_less_oob+0x20/0x38
[   32.543221]  kunit_try_run_case+0x170/0x3f0
[   32.543442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.543560]  kthread+0x328/0x630
[   32.543746]  ret_from_fork+0x10/0x20
[   32.543842] 
[   32.543922] The buggy address belongs to the object at fff00000c4511200
[   32.543922]  which belongs to the cache kmalloc-256 of size 256
[   32.546071] The buggy address is located 0 bytes to the right of
[   32.546071]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.546162] 
[   32.546191] The buggy address belongs to the physical page:
[   32.546240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.546904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.547039] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.547349] page_type: f5(slab)
[   32.547523] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.547638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.547806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.547995] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.548130] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.548242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.548331] page dumped because: kasan: bad access detected
[   32.548399] 
[   32.548442] Memory state around the buggy address:
[   32.548517]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.548705]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.548807] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.548950]                                               ^
[   32.549167]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.549346]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.549823] ==================================================================
[   32.694732] ==================================================================
[   32.694919] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.695097] Write of size 1 at addr fff00000c577e0c9 by task kunit_try_catch/174
[   32.695226] 
[   32.695304] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.695605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.695691] Hardware name: linux,dummy-virt (DT)
[   32.695848] Call trace:
[   32.695908]  show_stack+0x20/0x38 (C)
[   32.696088]  dump_stack_lvl+0x8c/0xd0
[   32.696217]  print_report+0x118/0x608
[   32.696352]  kasan_report+0xdc/0x128
[   32.696490]  __asan_report_store1_noabort+0x20/0x30
[   32.696778]  krealloc_less_oob_helper+0xa48/0xc50
[   32.697154]  krealloc_large_less_oob+0x20/0x38
[   32.697494]  kunit_try_run_case+0x170/0x3f0
[   32.697842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.697976]  kthread+0x328/0x630
[   32.698120]  ret_from_fork+0x10/0x20
[   32.698351] 
[   32.698412] The buggy address belongs to the physical page:
[   32.698492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.699333] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.700022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.700229] page_type: f8(unknown)
[   32.700325] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.700442] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.700559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.702184] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.702360] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.702576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.703118] page dumped because: kasan: bad access detected
[   32.703215] 
[   32.703261] Memory state around the buggy address:
[   32.703679]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.704405]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.704511] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.705257]                                               ^
[   32.705830]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.706371]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.706493] ==================================================================
[   32.738096] ==================================================================
[   32.738303] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.738425] Write of size 1 at addr fff00000c577e0eb by task kunit_try_catch/174
[   32.738650] 
[   32.738720] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.738958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.739058] Hardware name: linux,dummy-virt (DT)
[   32.739260] Call trace:
[   32.739315]  show_stack+0x20/0x38 (C)
[   32.739445]  dump_stack_lvl+0x8c/0xd0
[   32.739754]  print_report+0x118/0x608
[   32.740048]  kasan_report+0xdc/0x128
[   32.740231]  __asan_report_store1_noabort+0x20/0x30
[   32.740354]  krealloc_less_oob_helper+0xa58/0xc50
[   32.740483]  krealloc_large_less_oob+0x20/0x38
[   32.740598]  kunit_try_run_case+0x170/0x3f0
[   32.740709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.740834]  kthread+0x328/0x630
[   32.740963]  ret_from_fork+0x10/0x20
[   32.741469] 
[   32.741520] The buggy address belongs to the physical page:
[   32.741721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.742172] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.742284] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.742396] page_type: f8(unknown)
[   32.742483] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.742615] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.743832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.743952] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.744463] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.744645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.744743] page dumped because: kasan: bad access detected
[   32.744815] 
[   32.744858] Memory state around the buggy address:
[   32.744937]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.745195]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.745298] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.745414]                                                           ^
[   32.745703]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.745806]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.745893] ==================================================================
[   32.709290] ==================================================================
[   32.709344] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.709478] Write of size 1 at addr fff00000c577e0d0 by task kunit_try_catch/174
[   32.709602] 
[   32.709727] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.709917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.709980] Hardware name: linux,dummy-virt (DT)
[   32.710069] Call trace:
[   32.710121]  show_stack+0x20/0x38 (C)
[   32.710235]  dump_stack_lvl+0x8c/0xd0
[   32.710344]  print_report+0x118/0x608
[   32.710456]  kasan_report+0xdc/0x128
[   32.710580]  __asan_report_store1_noabort+0x20/0x30
[   32.710935]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.711606]  krealloc_large_less_oob+0x20/0x38
[   32.711844]  kunit_try_run_case+0x170/0x3f0
[   32.712196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.712620]  kthread+0x328/0x630
[   32.713439]  ret_from_fork+0x10/0x20
[   32.713565] 
[   32.713612] The buggy address belongs to the physical page:
[   32.714365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.714498] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.714607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.714724] page_type: f8(unknown)
[   32.714830] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.714950] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.716384] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.716636] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.717303] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.717419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.717511] page dumped because: kasan: bad access detected
[   32.718497] 
[   32.718592] Memory state around the buggy address:
[   32.718869]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.718971]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.719709] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.719956]                                                  ^
[   32.720175]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.720364]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.720510] ==================================================================
[   32.731101] ==================================================================
[   32.731196] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.731310] Write of size 1 at addr fff00000c577e0ea by task kunit_try_catch/174
[   32.731435] 
[   32.731556] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.731780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.731858] Hardware name: linux,dummy-virt (DT)
[   32.731990] Call trace:
[   32.732199]  show_stack+0x20/0x38 (C)
[   32.732381]  dump_stack_lvl+0x8c/0xd0
[   32.732514]  print_report+0x118/0x608
[   32.732761]  kasan_report+0xdc/0x128
[   32.732928]  __asan_report_store1_noabort+0x20/0x30
[   32.733007]  krealloc_less_oob_helper+0xae4/0xc50
[   32.733131]  krealloc_large_less_oob+0x20/0x38
[   32.733249]  kunit_try_run_case+0x170/0x3f0
[   32.733447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.733606]  kthread+0x328/0x630
[   32.733815]  ret_from_fork+0x10/0x20
[   32.734040] 
[   32.734106] The buggy address belongs to the physical page:
[   32.734255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.734467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.734731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.734940] page_type: f8(unknown)
[   32.735108] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.735229] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.735349] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.735505] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.735842] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.735976] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.736246] page dumped because: kasan: bad access detected
[   32.736450] 
[   32.736605] Memory state around the buggy address:
[   32.736679]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.736779]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.736879] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.736973]                                                           ^
[   32.737119]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.737352]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.737592] ==================================================================
[   32.721733] ==================================================================
[   32.721964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.722173] Write of size 1 at addr fff00000c577e0da by task kunit_try_catch/174
[   32.722405] 
[   32.722483] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.722712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.722783] Hardware name: linux,dummy-virt (DT)
[   32.722846] Call trace:
[   32.722875]  show_stack+0x20/0x38 (C)
[   32.722938]  dump_stack_lvl+0x8c/0xd0
[   32.723046]  print_report+0x118/0x608
[   32.723212]  kasan_report+0xdc/0x128
[   32.723340]  __asan_report_store1_noabort+0x20/0x30
[   32.723682]  krealloc_less_oob_helper+0xa80/0xc50
[   32.724095]  krealloc_large_less_oob+0x20/0x38
[   32.724224]  kunit_try_run_case+0x170/0x3f0
[   32.724340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.724469]  kthread+0x328/0x630
[   32.724655]  ret_from_fork+0x10/0x20
[   32.725172] 
[   32.725267] The buggy address belongs to the physical page:
[   32.725337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c
[   32.725451] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.726181] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.727160] page_type: f8(unknown)
[   32.727292] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.727642] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.727768] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.727883] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.728085] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff
[   32.728361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.728456] page dumped because: kasan: bad access detected
[   32.728565] 
[   32.728633] Memory state around the buggy address:
[   32.728752]  fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.728946]  fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.729061] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.729180]                                                     ^
[   32.729426]  fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.729526]  fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.729610] ==================================================================
[   32.564958] ==================================================================
[   32.565139] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.565408] Write of size 1 at addr fff00000c45112da by task kunit_try_catch/170
[   32.565997] 
[   32.566155] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.566357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.566418] Hardware name: linux,dummy-virt (DT)
[   32.566492] Call trace:
[   32.566814]  show_stack+0x20/0x38 (C)
[   32.567391]  dump_stack_lvl+0x8c/0xd0
[   32.567629]  print_report+0x118/0x608
[   32.567906]  kasan_report+0xdc/0x128
[   32.568142]  __asan_report_store1_noabort+0x20/0x30
[   32.568337]  krealloc_less_oob_helper+0xa80/0xc50
[   32.568550]  krealloc_less_oob+0x20/0x38
[   32.569022]  kunit_try_run_case+0x170/0x3f0
[   32.569234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.569429]  kthread+0x328/0x630
[   32.569547]  ret_from_fork+0x10/0x20
[   32.570113] 
[   32.570222] Allocated by task 170:
[   32.570314]  kasan_save_stack+0x3c/0x68
[   32.570489]  kasan_save_track+0x20/0x40
[   32.570592]  kasan_save_alloc_info+0x40/0x58
[   32.571094]  __kasan_krealloc+0x118/0x178
[   32.571331]  krealloc_noprof+0x128/0x360
[   32.571694]  krealloc_less_oob_helper+0x168/0xc50
[   32.572006]  krealloc_less_oob+0x20/0x38
[   32.572123]  kunit_try_run_case+0x170/0x3f0
[   32.572213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.572311]  kthread+0x328/0x630
[   32.572389]  ret_from_fork+0x10/0x20
[   32.572519] 
[   32.572567] The buggy address belongs to the object at fff00000c4511200
[   32.572567]  which belongs to the cache kmalloc-256 of size 256
[   32.572694] The buggy address is located 17 bytes to the right of
[   32.572694]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.572869] 
[   32.572936] The buggy address belongs to the physical page:
[   32.573007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.574024] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.574180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.574435] page_type: f5(slab)
[   32.574633] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.574965] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.575113] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.575239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.575588] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.575940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.576268] page dumped because: kasan: bad access detected
[   32.576617] 
[   32.576969] Memory state around the buggy address:
[   32.577102]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.577488]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.577592] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.577643]                                                     ^
[   32.577689]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.577738]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.577780] ==================================================================
[   32.602636] ==================================================================
[   32.602742] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.603170] Write of size 1 at addr fff00000c45112eb by task kunit_try_catch/170
[   32.603330] 
[   32.603407] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.603605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.603676] Hardware name: linux,dummy-virt (DT)
[   32.603818] Call trace:
[   32.604014]  show_stack+0x20/0x38 (C)
[   32.604560]  dump_stack_lvl+0x8c/0xd0
[   32.604790]  print_report+0x118/0x608
[   32.605043]  kasan_report+0xdc/0x128
[   32.605284]  __asan_report_store1_noabort+0x20/0x30
[   32.605451]  krealloc_less_oob_helper+0xa58/0xc50
[   32.605743]  krealloc_less_oob+0x20/0x38
[   32.605954]  kunit_try_run_case+0x170/0x3f0
[   32.606092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.607161]  kthread+0x328/0x630
[   32.607926]  ret_from_fork+0x10/0x20
[   32.608632] 
[   32.609303] Allocated by task 170:
[   32.609473]  kasan_save_stack+0x3c/0x68
[   32.610433]  kasan_save_track+0x20/0x40
[   32.611064]  kasan_save_alloc_info+0x40/0x58
[   32.611169]  __kasan_krealloc+0x118/0x178
[   32.611271]  krealloc_noprof+0x128/0x360
[   32.612292]  krealloc_less_oob_helper+0x168/0xc50
[   32.613136]  krealloc_less_oob+0x20/0x38
[   32.613757]  kunit_try_run_case+0x170/0x3f0
[   32.613859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.614516]  kthread+0x328/0x630
[   32.614645]  ret_from_fork+0x10/0x20
[   32.614799] 
[   32.614902] The buggy address belongs to the object at fff00000c4511200
[   32.614902]  which belongs to the cache kmalloc-256 of size 256
[   32.615043] The buggy address is located 34 bytes to the right of
[   32.615043]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.615189] 
[   32.615245] The buggy address belongs to the physical page:
[   32.615476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.615598] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.615768] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.615920] page_type: f5(slab)
[   32.616013] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.616148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.616261] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.616371] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.616481] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.616668] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.616869] page dumped because: kasan: bad access detected
[   32.616941] 
[   32.617483] Memory state around the buggy address:
[   32.618047]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.618610]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.619239] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.620211]                                                           ^
[   32.620524]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.620626]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.620716] ==================================================================
[   32.551790] ==================================================================
[   32.551879] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.551985] Write of size 1 at addr fff00000c45112d0 by task kunit_try_catch/170
[   32.552201] 
[   32.552306] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.552694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.552761] Hardware name: linux,dummy-virt (DT)
[   32.552898] Call trace:
[   32.552981]  show_stack+0x20/0x38 (C)
[   32.553422]  dump_stack_lvl+0x8c/0xd0
[   32.553729]  print_report+0x118/0x608
[   32.553877]  kasan_report+0xdc/0x128
[   32.553995]  __asan_report_store1_noabort+0x20/0x30
[   32.554882]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.555517]  krealloc_less_oob+0x20/0x38
[   32.555654]  kunit_try_run_case+0x170/0x3f0
[   32.555767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.555901]  kthread+0x328/0x630
[   32.556362]  ret_from_fork+0x10/0x20
[   32.556737] 
[   32.556842] Allocated by task 170:
[   32.556914]  kasan_save_stack+0x3c/0x68
[   32.557074]  kasan_save_track+0x20/0x40
[   32.557204]  kasan_save_alloc_info+0x40/0x58
[   32.557447]  __kasan_krealloc+0x118/0x178
[   32.557592]  krealloc_noprof+0x128/0x360
[   32.557758]  krealloc_less_oob_helper+0x168/0xc50
[   32.558050]  krealloc_less_oob+0x20/0x38
[   32.558166]  kunit_try_run_case+0x170/0x3f0
[   32.558288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.558616]  kthread+0x328/0x630
[   32.558717]  ret_from_fork+0x10/0x20
[   32.558837] 
[   32.558891] The buggy address belongs to the object at fff00000c4511200
[   32.558891]  which belongs to the cache kmalloc-256 of size 256
[   32.559081] The buggy address is located 7 bytes to the right of
[   32.559081]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.559240] 
[   32.559294] The buggy address belongs to the physical page:
[   32.559367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.559534] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.559658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.559791] page_type: f5(slab)
[   32.559889] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.560013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.560162] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.560316] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.560473] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.560597] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.560710] page dumped because: kasan: bad access detected
[   32.560813] 
[   32.560868] Memory state around the buggy address:
[   32.560988]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561117]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.561269] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.561409]                                                  ^
[   32.561514]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561630]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561742] ==================================================================
[   32.583425] ==================================================================
[   32.583527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.583846] Write of size 1 at addr fff00000c45112ea by task kunit_try_catch/170
[   32.584576] 
[   32.584646] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.584941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.585718] Hardware name: linux,dummy-virt (DT)
[   32.585853] Call trace:
[   32.586185]  show_stack+0x20/0x38 (C)
[   32.586502]  dump_stack_lvl+0x8c/0xd0
[   32.586691]  print_report+0x118/0x608
[   32.587339]  kasan_report+0xdc/0x128
[   32.587470]  __asan_report_store1_noabort+0x20/0x30
[   32.587847]  krealloc_less_oob_helper+0xae4/0xc50
[   32.588766]  krealloc_less_oob+0x20/0x38
[   32.588944]  kunit_try_run_case+0x170/0x3f0
[   32.589450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.589969]  kthread+0x328/0x630
[   32.590528]  ret_from_fork+0x10/0x20
[   32.590670] 
[   32.590722] Allocated by task 170:
[   32.590813]  kasan_save_stack+0x3c/0x68
[   32.590927]  kasan_save_track+0x20/0x40
[   32.591024]  kasan_save_alloc_info+0x40/0x58
[   32.591342]  __kasan_krealloc+0x118/0x178
[   32.591527]  krealloc_noprof+0x128/0x360
[   32.592272]  krealloc_less_oob_helper+0x168/0xc50
[   32.592783]  krealloc_less_oob+0x20/0x38
[   32.593472]  kunit_try_run_case+0x170/0x3f0
[   32.593735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.593842]  kthread+0x328/0x630
[   32.594365]  ret_from_fork+0x10/0x20
[   32.594548] 
[   32.594735] The buggy address belongs to the object at fff00000c4511200
[   32.594735]  which belongs to the cache kmalloc-256 of size 256
[   32.594882] The buggy address is located 33 bytes to the right of
[   32.594882]  allocated 201-byte region [fff00000c4511200, fff00000c45112c9)
[   32.595023] 
[   32.596041] The buggy address belongs to the physical page:
[   32.596117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510
[   32.596467] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.596626] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.596751] page_type: f5(slab)
[   32.597338] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.597537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.597810] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.598208] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.598417] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff
[   32.598536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.598630] page dumped because: kasan: bad access detected
[   32.599086] 
[   32.599144] Memory state around the buggy address:
[   32.599408]  fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.599874]  fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.599979] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.600334]                                                           ^
[   32.600926]  fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.601394]  fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.601523] ==================================================================

[   21.439034] ==================================================================
[   21.439410] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   21.439969] Write of size 1 at addr ffff888100ab4eea by task kunit_try_catch/187
[   21.440356] 
[   21.440522] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.440804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.440821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.440857] Call Trace:
[   21.440871]  <TASK>
[   21.440886]  dump_stack_lvl+0x73/0xb0
[   21.440925]  print_report+0xd1/0x650
[   21.440951]  ? __virt_addr_valid+0x1db/0x2d0
[   21.440971]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.440990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.441010]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.441029]  kasan_report+0x141/0x180
[   21.441047]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.441070]  __asan_report_store1_noabort+0x1b/0x30
[   21.441089]  krealloc_less_oob_helper+0xe90/0x11d0
[   21.441110]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.441129]  ? finish_task_switch.isra.0+0x153/0x700
[   21.441146]  ? __switch_to+0x47/0xf50
[   21.441167]  ? __schedule+0x10cc/0x2b60
[   21.441184]  ? __pfx_read_tsc+0x10/0x10
[   21.441205]  krealloc_less_oob+0x1c/0x30
[   21.441222]  kunit_try_run_case+0x1a5/0x480
[   21.441241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.441259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.441277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.441295]  ? __kthread_parkme+0x82/0x180
[   21.441311]  ? preempt_count_sub+0x50/0x80
[   21.441330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.441349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.441367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.441421]  kthread+0x337/0x6f0
[   21.441460]  ? trace_preempt_on+0x20/0xc0
[   21.441498]  ? __pfx_kthread+0x10/0x10
[   21.441535]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.441571]  ? calculate_sigpending+0x7b/0xa0
[   21.441604]  ? __pfx_kthread+0x10/0x10
[   21.441623]  ret_from_fork+0x116/0x1d0
[   21.441639]  ? __pfx_kthread+0x10/0x10
[   21.441655]  ret_from_fork_asm+0x1a/0x30
[   21.441682]  </TASK>
[   21.441692] 
[   21.450110] Allocated by task 187:
[   21.450392]  kasan_save_stack+0x45/0x70
[   21.450609]  kasan_save_track+0x18/0x40
[   21.450767]  kasan_save_alloc_info+0x3b/0x50
[   21.450967]  __kasan_krealloc+0x190/0x1f0
[   21.451116]  krealloc_noprof+0xf3/0x340
[   21.451265]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.451593]  krealloc_less_oob+0x1c/0x30
[   21.451909]  kunit_try_run_case+0x1a5/0x480
[   21.452201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.452558]  kthread+0x337/0x6f0
[   21.452736]  ret_from_fork+0x116/0x1d0
[   21.452900]  ret_from_fork_asm+0x1a/0x30
[   21.453052] 
[   21.453138] The buggy address belongs to the object at ffff888100ab4e00
[   21.453138]  which belongs to the cache kmalloc-256 of size 256
[   21.453768] The buggy address is located 33 bytes to the right of
[   21.453768]  allocated 201-byte region [ffff888100ab4e00, ffff888100ab4ec9)
[   21.454609] 
[   21.454759] The buggy address belongs to the physical page:
[   21.455151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   21.455535] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.455908] flags: 0x200000000000040(head|node=0|zone=2)
[   21.456217] page_type: f5(slab)
[   21.456447] raw: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.456740] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.457111] head: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.457434] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.457774] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   21.458039] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.458273] page dumped because: kasan: bad access detected
[   21.458626] 
[   21.458768] Memory state around the buggy address:
[   21.459124]  ffff888100ab4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.459575]  ffff888100ab4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.460029] >ffff888100ab4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.460328]                                                           ^
[   21.460537]  ffff888100ab4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.460916]  ffff888100ab4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.461349] ==================================================================
[   21.642277] ==================================================================
[   21.642768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   21.643375] Write of size 1 at addr ffff8881028320eb by task kunit_try_catch/191
[   21.644321] 
[   21.644491] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.644567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.644590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.644623] Call Trace:
[   21.644648]  <TASK>
[   21.644674]  dump_stack_lvl+0x73/0xb0
[   21.644712]  print_report+0xd1/0x650
[   21.644732]  ? __virt_addr_valid+0x1db/0x2d0
[   21.644751]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.644771]  ? kasan_addr_to_slab+0x11/0xa0
[   21.644788]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.644808]  kasan_report+0x141/0x180
[   21.644827]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.644866]  __asan_report_store1_noabort+0x1b/0x30
[   21.644900]  krealloc_less_oob_helper+0xd47/0x11d0
[   21.644942]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.644980]  ? irqentry_exit+0x2a/0x60
[   21.645016]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.645063]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   21.645098]  krealloc_large_less_oob+0x1c/0x30
[   21.645126]  kunit_try_run_case+0x1a5/0x480
[   21.645157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.645185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.645213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.645240]  ? __kthread_parkme+0x82/0x180
[   21.645265]  ? preempt_count_sub+0x50/0x80
[   21.645292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.645322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.645351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.645398]  kthread+0x337/0x6f0
[   21.645424]  ? trace_preempt_on+0x20/0xc0
[   21.645452]  ? __pfx_kthread+0x10/0x10
[   21.645476]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.645505]  ? calculate_sigpending+0x7b/0xa0
[   21.645536]  ? __pfx_kthread+0x10/0x10
[   21.645564]  ret_from_fork+0x116/0x1d0
[   21.645588]  ? __pfx_kthread+0x10/0x10
[   21.645615]  ret_from_fork_asm+0x1a/0x30
[   21.645659]  </TASK>
[   21.645690] 
[   21.655818] The buggy address belongs to the physical page:
[   21.656042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102830
[   21.656680] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.657552] flags: 0x200000000000040(head|node=0|zone=2)
[   21.657952] page_type: f8(unknown)
[   21.658336] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.659499] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.660085] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.660825] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.661457] head: 0200000000000002 ffffea00040a0c01 00000000ffffffff 00000000ffffffff
[   21.662205] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.663005] page dumped because: kasan: bad access detected
[   21.663372] 
[   21.663473] Memory state around the buggy address:
[   21.663719]  ffff888102831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.664028]  ffff888102832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.664990] >ffff888102832080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.665558]                                                           ^
[   21.665769]  ffff888102832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.666286]  ffff888102832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.666702] ==================================================================
[   21.405745] ==================================================================
[   21.406929] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   21.407851] Write of size 1 at addr ffff888100ab4eda by task kunit_try_catch/187
[   21.408329] 
[   21.408469] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.408769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.408790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.408813] Call Trace:
[   21.408829]  <TASK>
[   21.408849]  dump_stack_lvl+0x73/0xb0
[   21.408881]  print_report+0xd1/0x650
[   21.408911]  ? __virt_addr_valid+0x1db/0x2d0
[   21.408934]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.408953]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.408974]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.408993]  kasan_report+0x141/0x180
[   21.409010]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.409033]  __asan_report_store1_noabort+0x1b/0x30
[   21.409052]  krealloc_less_oob_helper+0xec6/0x11d0
[   21.409072]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.409091]  ? finish_task_switch.isra.0+0x153/0x700
[   21.409108]  ? __switch_to+0x47/0xf50
[   21.409129]  ? __schedule+0x10cc/0x2b60
[   21.409147]  ? __pfx_read_tsc+0x10/0x10
[   21.409167]  krealloc_less_oob+0x1c/0x30
[   21.409184]  kunit_try_run_case+0x1a5/0x480
[   21.409203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.409221]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.409239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.409257]  ? __kthread_parkme+0x82/0x180
[   21.409273]  ? preempt_count_sub+0x50/0x80
[   21.409292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.409311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.409329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.409348]  kthread+0x337/0x6f0
[   21.409363]  ? trace_preempt_on+0x20/0xc0
[   21.409405]  ? __pfx_kthread+0x10/0x10
[   21.409437]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.409472]  ? calculate_sigpending+0x7b/0xa0
[   21.409509]  ? __pfx_kthread+0x10/0x10
[   21.409547]  ret_from_fork+0x116/0x1d0
[   21.409581]  ? __pfx_kthread+0x10/0x10
[   21.409618]  ret_from_fork_asm+0x1a/0x30
[   21.409651]  </TASK>
[   21.409662] 
[   21.421259] Allocated by task 187:
[   21.421502]  kasan_save_stack+0x45/0x70
[   21.421987]  kasan_save_track+0x18/0x40
[   21.422200]  kasan_save_alloc_info+0x3b/0x50
[   21.422630]  __kasan_krealloc+0x190/0x1f0
[   21.423088]  krealloc_noprof+0xf3/0x340
[   21.423234]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.423651]  krealloc_less_oob+0x1c/0x30
[   21.424065]  kunit_try_run_case+0x1a5/0x480
[   21.424296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.424653]  kthread+0x337/0x6f0
[   21.424809]  ret_from_fork+0x116/0x1d0
[   21.425162]  ret_from_fork_asm+0x1a/0x30
[   21.425494] 
[   21.425818] The buggy address belongs to the object at ffff888100ab4e00
[   21.425818]  which belongs to the cache kmalloc-256 of size 256
[   21.426471] The buggy address is located 17 bytes to the right of
[   21.426471]  allocated 201-byte region [ffff888100ab4e00, ffff888100ab4ec9)
[   21.427373] 
[   21.427547] The buggy address belongs to the physical page:
[   21.427982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   21.428339] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.428950] flags: 0x200000000000040(head|node=0|zone=2)
[   21.429286] page_type: f5(slab)
[   21.429649] raw: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.430100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.430636] head: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.431203] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.431645] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   21.432069] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.432614] page dumped because: kasan: bad access detected
[   21.433139] 
[   21.433232] Memory state around the buggy address:
[   21.433502]  ffff888100ab4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.433869]  ffff888100ab4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.434226] >ffff888100ab4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.434589]                                                     ^
[   21.434884]  ffff888100ab4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.435815]  ffff888100ab4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.436224] ==================================================================
[   21.616646] ==================================================================
[   21.616984] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   21.617801] Write of size 1 at addr ffff8881028320ea by task kunit_try_catch/191
[   21.618066] 
[   21.618250] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.618335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.618360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.618410] Call Trace:
[   21.618439]  <TASK>
[   21.618467]  dump_stack_lvl+0x73/0xb0
[   21.618522]  print_report+0xd1/0x650
[   21.618559]  ? __virt_addr_valid+0x1db/0x2d0
[   21.618592]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.618625]  ? kasan_addr_to_slab+0x11/0xa0
[   21.618656]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.618695]  kasan_report+0x141/0x180
[   21.618729]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.619292]  __asan_report_store1_noabort+0x1b/0x30
[   21.619349]  krealloc_less_oob_helper+0xe90/0x11d0
[   21.619408]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.619445]  ? irqentry_exit+0x2a/0x60
[   21.619486]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.619531]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   21.619590]  krealloc_large_less_oob+0x1c/0x30
[   21.619628]  kunit_try_run_case+0x1a5/0x480
[   21.619673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.619708]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.619747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.619786]  ? __kthread_parkme+0x82/0x180
[   21.619822]  ? preempt_count_sub+0x50/0x80
[   21.619858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.619890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.619928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.619967]  kthread+0x337/0x6f0
[   21.620006]  ? trace_preempt_on+0x20/0xc0
[   21.620091]  ? __pfx_kthread+0x10/0x10
[   21.620131]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.620168]  ? calculate_sigpending+0x7b/0xa0
[   21.620209]  ? __pfx_kthread+0x10/0x10
[   21.620249]  ret_from_fork+0x116/0x1d0
[   21.620284]  ? __pfx_kthread+0x10/0x10
[   21.620319]  ret_from_fork_asm+0x1a/0x30
[   21.620392]  </TASK>
[   21.620408] 
[   21.630750] The buggy address belongs to the physical page:
[   21.631641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102830
[   21.632477] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.633147] flags: 0x200000000000040(head|node=0|zone=2)
[   21.633556] page_type: f8(unknown)
[   21.633988] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.634619] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.634873] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.635104] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.635458] head: 0200000000000002 ffffea00040a0c01 00000000ffffffff 00000000ffffffff
[   21.636083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.636653] page dumped because: kasan: bad access detected
[   21.637389] 
[   21.637563] Memory state around the buggy address:
[   21.637877]  ffff888102831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.638370]  ffff888102832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.639208] >ffff888102832080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.639835]                                                           ^
[   21.640473]  ffff888102832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.641023]  ffff888102832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.641593] ==================================================================
[   21.541414] ==================================================================
[   21.542225] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   21.542888] Write of size 1 at addr ffff8881028320c9 by task kunit_try_catch/191
[   21.543600] 
[   21.543765] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.543969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.543997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.544219] Call Trace:
[   21.544263]  <TASK>
[   21.544296]  dump_stack_lvl+0x73/0xb0
[   21.544688]  print_report+0xd1/0x650
[   21.544715]  ? __virt_addr_valid+0x1db/0x2d0
[   21.544751]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.544772]  ? kasan_addr_to_slab+0x11/0xa0
[   21.544789]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.544809]  kasan_report+0x141/0x180
[   21.544829]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.544862]  __asan_report_store1_noabort+0x1b/0x30
[   21.544883]  krealloc_less_oob_helper+0xd70/0x11d0
[   21.544905]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.544924]  ? irqentry_exit+0x2a/0x60
[   21.544943]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.544967]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   21.544990]  krealloc_large_less_oob+0x1c/0x30
[   21.545009]  kunit_try_run_case+0x1a5/0x480
[   21.545031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.545050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.545070]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.545109]  ? __kthread_parkme+0x82/0x180
[   21.545136]  ? preempt_count_sub+0x50/0x80
[   21.545165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.545196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.545225]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.545255]  kthread+0x337/0x6f0
[   21.545281]  ? trace_preempt_on+0x20/0xc0
[   21.545311]  ? __pfx_kthread+0x10/0x10
[   21.545339]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.545368]  ? calculate_sigpending+0x7b/0xa0
[   21.545417]  ? __pfx_kthread+0x10/0x10
[   21.545438]  ret_from_fork+0x116/0x1d0
[   21.545456]  ? __pfx_kthread+0x10/0x10
[   21.545473]  ret_from_fork_asm+0x1a/0x30
[   21.545500]  </TASK>
[   21.545512] 
[   21.557747] The buggy address belongs to the physical page:
[   21.557960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102830
[   21.558820] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.559361] flags: 0x200000000000040(head|node=0|zone=2)
[   21.559583] page_type: f8(unknown)
[   21.560008] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.560875] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.561417] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.561737] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.562601] head: 0200000000000002 ffffea00040a0c01 00000000ffffffff 00000000ffffffff
[   21.563309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.563520] page dumped because: kasan: bad access detected
[   21.564007] 
[   21.564287] Memory state around the buggy address:
[   21.564563]  ffff888102831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.565038]  ffff888102832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.565530] >ffff888102832080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.565820]                                               ^
[   21.566683]  ffff888102832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.567101]  ffff888102832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.567572] ==================================================================
[   21.568438] ==================================================================
[   21.569022] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   21.569907] Write of size 1 at addr ffff8881028320d0 by task kunit_try_catch/191
[   21.570266] 
[   21.570402] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.570748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.570800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.570890] Call Trace:
[   21.570920]  <TASK>
[   21.570946]  dump_stack_lvl+0x73/0xb0
[   21.571001]  print_report+0xd1/0x650
[   21.571040]  ? __virt_addr_valid+0x1db/0x2d0
[   21.571081]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.571122]  ? kasan_addr_to_slab+0x11/0xa0
[   21.571159]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.571201]  kasan_report+0x141/0x180
[   21.571239]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.571394]  __asan_report_store1_noabort+0x1b/0x30
[   21.571422]  krealloc_less_oob_helper+0xe23/0x11d0
[   21.571445]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.571465]  ? irqentry_exit+0x2a/0x60
[   21.571483]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.571507]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   21.571529]  krealloc_large_less_oob+0x1c/0x30
[   21.571548]  kunit_try_run_case+0x1a5/0x480
[   21.571568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.571587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.571606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.571625]  ? __kthread_parkme+0x82/0x180
[   21.571641]  ? preempt_count_sub+0x50/0x80
[   21.571661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.571681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.571700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.571720]  kthread+0x337/0x6f0
[   21.571736]  ? trace_preempt_on+0x20/0xc0
[   21.571754]  ? __pfx_kthread+0x10/0x10
[   21.571772]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.571789]  ? calculate_sigpending+0x7b/0xa0
[   21.571809]  ? __pfx_kthread+0x10/0x10
[   21.571827]  ret_from_fork+0x116/0x1d0
[   21.571852]  ? __pfx_kthread+0x10/0x10
[   21.571871]  ret_from_fork_asm+0x1a/0x30
[   21.571898]  </TASK>
[   21.571909] 
[   21.582195] The buggy address belongs to the physical page:
[   21.582334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102830
[   21.582807] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.583278] flags: 0x200000000000040(head|node=0|zone=2)
[   21.584554] page_type: f8(unknown)
[   21.584726] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.585170] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.585855] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.586570] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.587129] head: 0200000000000002 ffffea00040a0c01 00000000ffffffff 00000000ffffffff
[   21.587580] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.588415] page dumped because: kasan: bad access detected
[   21.588696] 
[   21.588792] Memory state around the buggy address:
[   21.589178]  ffff888102831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.589995]  ffff888102832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.590882] >ffff888102832080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.591324]                                                  ^
[   21.591819]  ffff888102832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.592293]  ffff888102832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.592731] ==================================================================
[   21.348830] ==================================================================
[   21.349243] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   21.349848] Write of size 1 at addr ffff888100ab4ec9 by task kunit_try_catch/187
[   21.350820] 
[   21.350952] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.351070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.351094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.351142] Call Trace:
[   21.351166]  <TASK>
[   21.351191]  dump_stack_lvl+0x73/0xb0
[   21.351241]  print_report+0xd1/0x650
[   21.351274]  ? __virt_addr_valid+0x1db/0x2d0
[   21.351312]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.351352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.351409]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.351444]  kasan_report+0x141/0x180
[   21.351464]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.351487]  __asan_report_store1_noabort+0x1b/0x30
[   21.351506]  krealloc_less_oob_helper+0xd70/0x11d0
[   21.351527]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.351546]  ? finish_task_switch.isra.0+0x153/0x700
[   21.351564]  ? __switch_to+0x47/0xf50
[   21.351585]  ? __schedule+0x10cc/0x2b60
[   21.351603]  ? __pfx_read_tsc+0x10/0x10
[   21.351623]  krealloc_less_oob+0x1c/0x30
[   21.351640]  kunit_try_run_case+0x1a5/0x480
[   21.351660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.351678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.351696]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.351715]  ? __kthread_parkme+0x82/0x180
[   21.351732]  ? preempt_count_sub+0x50/0x80
[   21.351750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.351769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.351787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.351806]  kthread+0x337/0x6f0
[   21.351822]  ? trace_preempt_on+0x20/0xc0
[   21.351860]  ? __pfx_kthread+0x10/0x10
[   21.351877]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.351894]  ? calculate_sigpending+0x7b/0xa0
[   21.351913]  ? __pfx_kthread+0x10/0x10
[   21.351931]  ret_from_fork+0x116/0x1d0
[   21.351946]  ? __pfx_kthread+0x10/0x10
[   21.351962]  ret_from_fork_asm+0x1a/0x30
[   21.351989]  </TASK>
[   21.352000] 
[   21.361724] Allocated by task 187:
[   21.362557]  kasan_save_stack+0x45/0x70
[   21.362762]  kasan_save_track+0x18/0x40
[   21.363035]  kasan_save_alloc_info+0x3b/0x50
[   21.363254]  __kasan_krealloc+0x190/0x1f0
[   21.363508]  krealloc_noprof+0xf3/0x340
[   21.363715]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.364624]  krealloc_less_oob+0x1c/0x30
[   21.364788]  kunit_try_run_case+0x1a5/0x480
[   21.365202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.365466]  kthread+0x337/0x6f0
[   21.365619]  ret_from_fork+0x116/0x1d0
[   21.365785]  ret_from_fork_asm+0x1a/0x30
[   21.366785] 
[   21.366942] The buggy address belongs to the object at ffff888100ab4e00
[   21.366942]  which belongs to the cache kmalloc-256 of size 256
[   21.367409] The buggy address is located 0 bytes to the right of
[   21.367409]  allocated 201-byte region [ffff888100ab4e00, ffff888100ab4ec9)
[   21.368150] 
[   21.368287] The buggy address belongs to the physical page:
[   21.368648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   21.369082] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.369506] flags: 0x200000000000040(head|node=0|zone=2)
[   21.369820] page_type: f5(slab)
[   21.369959] raw: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.370448] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.370762] head: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.371165] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.371723] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   21.372249] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.372720] page dumped because: kasan: bad access detected
[   21.373093] 
[   21.373253] Memory state around the buggy address:
[   21.373642]  ffff888100ab4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.374172]  ffff888100ab4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.374580] >ffff888100ab4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.375251]                                               ^
[   21.375552]  ffff888100ab4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.375816]  ffff888100ab4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.376339] ==================================================================
[   21.462646] ==================================================================
[   21.463489] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   21.463995] Write of size 1 at addr ffff888100ab4eeb by task kunit_try_catch/187
[   21.464460] 
[   21.464640] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.464715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.464735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.464768] Call Trace:
[   21.464792]  <TASK>
[   21.464818]  dump_stack_lvl+0x73/0xb0
[   21.464901]  print_report+0xd1/0x650
[   21.464942]  ? __virt_addr_valid+0x1db/0x2d0
[   21.464981]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.465021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.465065]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.465106]  kasan_report+0x141/0x180
[   21.465144]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.465194]  __asan_report_store1_noabort+0x1b/0x30
[   21.465230]  krealloc_less_oob_helper+0xd47/0x11d0
[   21.465267]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.465690]  ? finish_task_switch.isra.0+0x153/0x700
[   21.465759]  ? __switch_to+0x47/0xf50
[   21.465793]  ? __schedule+0x10cc/0x2b60
[   21.465828]  ? __pfx_read_tsc+0x10/0x10
[   21.465892]  krealloc_less_oob+0x1c/0x30
[   21.465927]  kunit_try_run_case+0x1a5/0x480
[   21.465965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.466003]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.466050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.466091]  ? __kthread_parkme+0x82/0x180
[   21.466130]  ? preempt_count_sub+0x50/0x80
[   21.466173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.466216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.466257]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.466299]  kthread+0x337/0x6f0
[   21.466335]  ? trace_preempt_on+0x20/0xc0
[   21.466391]  ? __pfx_kthread+0x10/0x10
[   21.466433]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.466473]  ? calculate_sigpending+0x7b/0xa0
[   21.466513]  ? __pfx_kthread+0x10/0x10
[   21.466569]  ret_from_fork+0x116/0x1d0
[   21.466604]  ? __pfx_kthread+0x10/0x10
[   21.466639]  ret_from_fork_asm+0x1a/0x30
[   21.466697]  </TASK>
[   21.466719] 
[   21.476538] Allocated by task 187:
[   21.476735]  kasan_save_stack+0x45/0x70
[   21.477003]  kasan_save_track+0x18/0x40
[   21.477217]  kasan_save_alloc_info+0x3b/0x50
[   21.477522]  __kasan_krealloc+0x190/0x1f0
[   21.477692]  krealloc_noprof+0xf3/0x340
[   21.477967]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.478221]  krealloc_less_oob+0x1c/0x30
[   21.478536]  kunit_try_run_case+0x1a5/0x480
[   21.478751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.479115]  kthread+0x337/0x6f0
[   21.479356]  ret_from_fork+0x116/0x1d0
[   21.479593]  ret_from_fork_asm+0x1a/0x30
[   21.479805] 
[   21.479976] The buggy address belongs to the object at ffff888100ab4e00
[   21.479976]  which belongs to the cache kmalloc-256 of size 256
[   21.480550] The buggy address is located 34 bytes to the right of
[   21.480550]  allocated 201-byte region [ffff888100ab4e00, ffff888100ab4ec9)
[   21.481216] 
[   21.481356] The buggy address belongs to the physical page:
[   21.481589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   21.481904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.482425] flags: 0x200000000000040(head|node=0|zone=2)
[   21.482856] page_type: f5(slab)
[   21.483105] raw: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.483372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.483649] head: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.484151] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.484565] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   21.484858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.485083] page dumped because: kasan: bad access detected
[   21.485253] 
[   21.485334] Memory state around the buggy address:
[   21.485503]  ffff888100ab4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.485956]  ffff888100ab4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.486437] >ffff888100ab4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.486890]                                                           ^
[   21.487282]  ffff888100ab4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.487667]  ffff888100ab4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.487954] ==================================================================
[   21.593428] ==================================================================
[   21.593731] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   21.594412] Write of size 1 at addr ffff8881028320da by task kunit_try_catch/191
[   21.594673] 
[   21.594787] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.594904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.594943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.594979] Call Trace:
[   21.595005]  <TASK>
[   21.595028]  dump_stack_lvl+0x73/0xb0
[   21.595085]  print_report+0xd1/0x650
[   21.595122]  ? __virt_addr_valid+0x1db/0x2d0
[   21.595159]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.595196]  ? kasan_addr_to_slab+0x11/0xa0
[   21.595232]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.595273]  kasan_report+0x141/0x180
[   21.595312]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.595364]  __asan_report_store1_noabort+0x1b/0x30
[   21.595420]  krealloc_less_oob_helper+0xec6/0x11d0
[   21.595465]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.595504]  ? irqentry_exit+0x2a/0x60
[   21.595542]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.595591]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   21.595628]  krealloc_large_less_oob+0x1c/0x30
[   21.595659]  kunit_try_run_case+0x1a5/0x480
[   21.595696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.595730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.595764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.595802]  ? __kthread_parkme+0x82/0x180
[   21.595836]  ? preempt_count_sub+0x50/0x80
[   21.595872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.595905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.595941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.595976]  kthread+0x337/0x6f0
[   21.596007]  ? trace_preempt_on+0x20/0xc0
[   21.596045]  ? __pfx_kthread+0x10/0x10
[   21.596082]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.596120]  ? calculate_sigpending+0x7b/0xa0
[   21.596161]  ? __pfx_kthread+0x10/0x10
[   21.596200]  ret_from_fork+0x116/0x1d0
[   21.596235]  ? __pfx_kthread+0x10/0x10
[   21.596288]  ret_from_fork_asm+0x1a/0x30
[   21.596357]  </TASK>
[   21.596375] 
[   21.607487] The buggy address belongs to the physical page:
[   21.607909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102830
[   21.608214] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.608453] flags: 0x200000000000040(head|node=0|zone=2)
[   21.608643] page_type: f8(unknown)
[   21.608830] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.609399] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.609860] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.610781] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.611588] head: 0200000000000002 ffffea00040a0c01 00000000ffffffff 00000000ffffffff
[   21.611859] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.612520] page dumped because: kasan: bad access detected
[   21.612794] 
[   21.612962] Memory state around the buggy address:
[   21.613337]  ffff888102831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.613655]  ffff888102832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.614542] >ffff888102832080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.614845]                                                     ^
[   21.615052]  ffff888102832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.615264]  ffff888102832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.615726] ==================================================================
[   21.377956] ==================================================================
[   21.378751] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   21.379148] Write of size 1 at addr ffff888100ab4ed0 by task kunit_try_catch/187
[   21.379360] 
[   21.379485] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   21.379564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.379583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.379644] Call Trace:
[   21.379670]  <TASK>
[   21.379694]  dump_stack_lvl+0x73/0xb0
[   21.379745]  print_report+0xd1/0x650
[   21.379789]  ? __virt_addr_valid+0x1db/0x2d0
[   21.379822]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.379853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.379891]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.379927]  kasan_report+0x141/0x180
[   21.379964]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.380013]  __asan_report_store1_noabort+0x1b/0x30
[   21.380047]  krealloc_less_oob_helper+0xe23/0x11d0
[   21.380091]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.380131]  ? finish_task_switch.isra.0+0x153/0x700
[   21.380169]  ? __switch_to+0x47/0xf50
[   21.380214]  ? __schedule+0x10cc/0x2b60
[   21.380254]  ? __pfx_read_tsc+0x10/0x10
[   21.380298]  krealloc_less_oob+0x1c/0x30
[   21.380331]  kunit_try_run_case+0x1a5/0x480
[   21.380363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.380400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.380421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.380440]  ? __kthread_parkme+0x82/0x180
[   21.380457]  ? preempt_count_sub+0x50/0x80
[   21.380475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.380494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.380513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.380534]  kthread+0x337/0x6f0
[   21.380550]  ? trace_preempt_on+0x20/0xc0
[   21.380569]  ? __pfx_kthread+0x10/0x10
[   21.380585]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.380602]  ? calculate_sigpending+0x7b/0xa0
[   21.380622]  ? __pfx_kthread+0x10/0x10
[   21.380640]  ret_from_fork+0x116/0x1d0
[   21.380655]  ? __pfx_kthread+0x10/0x10
[   21.380671]  ret_from_fork_asm+0x1a/0x30
[   21.380697]  </TASK>
[   21.380707] 
[   21.390103] Allocated by task 187:
[   21.390412]  kasan_save_stack+0x45/0x70
[   21.390612]  kasan_save_track+0x18/0x40
[   21.390806]  kasan_save_alloc_info+0x3b/0x50
[   21.391398]  __kasan_krealloc+0x190/0x1f0
[   21.391573]  krealloc_noprof+0xf3/0x340
[   21.391719]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.392297]  krealloc_less_oob+0x1c/0x30
[   21.392514]  kunit_try_run_case+0x1a5/0x480
[   21.392720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.393261]  kthread+0x337/0x6f0
[   21.393436]  ret_from_fork+0x116/0x1d0
[   21.393607]  ret_from_fork_asm+0x1a/0x30
[   21.393785] 
[   21.394300] The buggy address belongs to the object at ffff888100ab4e00
[   21.394300]  which belongs to the cache kmalloc-256 of size 256
[   21.395192] The buggy address is located 7 bytes to the right of
[   21.395192]  allocated 201-byte region [ffff888100ab4e00, ffff888100ab4ec9)
[   21.395788] 
[   21.395961] The buggy address belongs to the physical page:
[   21.396310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   21.396598] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.397041] flags: 0x200000000000040(head|node=0|zone=2)
[   21.397287] page_type: f5(slab)
[   21.398096] raw: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.398475] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.398797] head: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   21.399559] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.400397] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   21.400731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.401302] page dumped because: kasan: bad access detected
[   21.401524] 
[   21.401818] Memory state around the buggy address:
[   21.402285]  ffff888100ab4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.402603]  ffff888100ab4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.403216] >ffff888100ab4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.403586]                                                  ^
[   21.403772]  ffff888100ab4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.404170]  ffff888100ab4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.404501] ==================================================================