Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   34.891734] ==================================================================
[   34.899052] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   34.906727] Write of size 1 at addr ffff0000864220da by task kunit_try_catch/260
[   34.914222] 
[   34.915759] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   34.915788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.915796] Hardware name: Thundercomm Dragonboard 845c (DT)
[   34.915808] Call trace:
[   34.915813]  show_stack+0x20/0x38 (C)
[   34.915831]  dump_stack_lvl+0x8c/0xd0
[   34.915850]  print_report+0x118/0x608
[   34.915869]  kasan_report+0xdc/0x128
[   34.915887]  __asan_report_store1_noabort+0x20/0x30
[   34.915904]  krealloc_less_oob_helper+0xa80/0xc50
[   34.915922]  krealloc_large_less_oob+0x20/0x38
[   34.915939]  kunit_try_run_case+0x170/0x3f0
[   34.915956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.915975]  kthread+0x328/0x630
[   34.915989]  ret_from_fork+0x10/0x20
[   34.916005] 
[   34.986751] The buggy address belongs to the physical page:
[   34.992391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   35.000492] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.008244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.015291] page_type: f8(unknown)
[   35.018751] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.026591] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.034431] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.042358] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.050282] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   35.058207] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.066127] page dumped because: kasan: bad access detected
[   35.071766] 
[   35.073289] Memory state around the buggy address:
[   35.078140]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.085454]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.092759] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.100072]                                                     ^
[   35.106239]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.113553]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.120865] ==================================================================
[   33.614804] ==================================================================
[   33.622122] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   33.629787] Write of size 1 at addr ffff000086408aeb by task kunit_try_catch/256
[   33.637280] 
[   33.638805] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.638832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.638839] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.638848] Call trace:
[   33.638853]  show_stack+0x20/0x38 (C)
[   33.638869]  dump_stack_lvl+0x8c/0xd0
[   33.638886]  print_report+0x118/0x608
[   33.638904]  kasan_report+0xdc/0x128
[   33.638921]  __asan_report_store1_noabort+0x20/0x30
[   33.638936]  krealloc_less_oob_helper+0xa58/0xc50
[   33.638953]  krealloc_less_oob+0x20/0x38
[   33.638968]  kunit_try_run_case+0x170/0x3f0
[   33.638985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.639004]  kthread+0x328/0x630
[   33.639017]  ret_from_fork+0x10/0x20
[   33.639033] 
[   33.709274] Allocated by task 256:
[   33.712726]  kasan_save_stack+0x3c/0x68
[   33.716630]  kasan_save_track+0x20/0x40
[   33.720535]  kasan_save_alloc_info+0x40/0x58
[   33.724867]  __kasan_krealloc+0x118/0x178
[   33.728944]  krealloc_noprof+0x128/0x360
[   33.732931]  krealloc_less_oob_helper+0x168/0xc50
[   33.737702]  krealloc_less_oob+0x20/0x38
[   33.741691]  kunit_try_run_case+0x170/0x3f0
[   33.745940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.751500]  kthread+0x328/0x630
[   33.754786]  ret_from_fork+0x10/0x20
[   33.758425] 
[   33.759954] The buggy address belongs to the object at ffff000086408a00
[   33.759954]  which belongs to the cache kmalloc-256 of size 256
[   33.772605] The buggy address is located 34 bytes to the right of
[   33.772605]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   33.785781] 
[   33.787310] The buggy address belongs to the physical page:
[   33.792951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   33.801050] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.808799] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.815844] page_type: f5(slab)
[   33.819041] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.826880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.834719] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.842641] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.850565] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   33.858490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.866409] page dumped because: kasan: bad access detected
[   33.872047] 
[   33.873569] Memory state around the buggy address:
[   33.878420]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.885734]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.893048] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.900359]                                                           ^
[   33.907052]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.914357]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.921669] ==================================================================
[   32.986878] ==================================================================
[   32.994196] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   33.001870] Write of size 1 at addr ffff000086408ada by task kunit_try_catch/256
[   33.009362] 
[   33.010891] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.010921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.010928] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.010939] Call trace:
[   33.010944]  show_stack+0x20/0x38 (C)
[   33.010962]  dump_stack_lvl+0x8c/0xd0
[   33.010979]  print_report+0x118/0x608
[   33.010998]  kasan_report+0xdc/0x128
[   33.011015]  __asan_report_store1_noabort+0x20/0x30
[   33.011031]  krealloc_less_oob_helper+0xa80/0xc50
[   33.011049]  krealloc_less_oob+0x20/0x38
[   33.011065]  kunit_try_run_case+0x170/0x3f0
[   33.011082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.011101]  kthread+0x328/0x630
[   33.011114]  ret_from_fork+0x10/0x20
[   33.011130] 
[   33.081345] Allocated by task 256:
[   33.084798]  kasan_save_stack+0x3c/0x68
[   33.088696]  kasan_save_track+0x20/0x40
[   33.092600]  kasan_save_alloc_info+0x40/0x58
[   33.096935]  __kasan_krealloc+0x118/0x178
[   33.101013]  krealloc_noprof+0x128/0x360
[   33.105004]  krealloc_less_oob_helper+0x168/0xc50
[   33.109775]  krealloc_less_oob+0x20/0x38
[   33.113765]  kunit_try_run_case+0x170/0x3f0
[   33.118015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.123578]  kthread+0x328/0x630
[   33.126863]  ret_from_fork+0x10/0x20
[   33.130495] 
[   33.132025] The buggy address belongs to the object at ffff000086408a00
[   33.132025]  which belongs to the cache kmalloc-256 of size 256
[   33.144674] The buggy address is located 17 bytes to the right of
[   33.144674]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   33.157851] 
[   33.159382] The buggy address belongs to the physical page:
[   33.165025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   33.173126] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.180878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.187925] page_type: f5(slab)
[   33.191124] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.198966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.206807] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.214731] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.222657] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   33.230582] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.238504] page dumped because: kasan: bad access detected
[   33.244143] 
[   33.245664] Memory state around the buggy address:
[   33.250516]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.257822]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.265127] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.272430]                                                     ^
[   33.278598]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.285903]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.293205] ==================================================================
[   32.672387] ==================================================================
[   32.679705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.687382] Write of size 1 at addr ffff000086408ad0 by task kunit_try_catch/256
[   32.694873] 
[   32.696412] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.696441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.696452] Hardware name: Thundercomm Dragonboard 845c (DT)
[   32.696463] Call trace:
[   32.696469]  show_stack+0x20/0x38 (C)
[   32.696487]  dump_stack_lvl+0x8c/0xd0
[   32.696505]  print_report+0x118/0x608
[   32.696524]  kasan_report+0xdc/0x128
[   32.696542]  __asan_report_store1_noabort+0x20/0x30
[   32.696559]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.696579]  krealloc_less_oob+0x20/0x38
[   32.696597]  kunit_try_run_case+0x170/0x3f0
[   32.696615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.696638]  kthread+0x328/0x630
[   32.696653]  ret_from_fork+0x10/0x20
[   32.696671] 
[   32.766953] Allocated by task 256:
[   32.770412]  kasan_save_stack+0x3c/0x68
[   32.774325]  kasan_save_track+0x20/0x40
[   32.778235]  kasan_save_alloc_info+0x40/0x58
[   32.782575]  __kasan_krealloc+0x118/0x178
[   32.786657]  krealloc_noprof+0x128/0x360
[   32.790656]  krealloc_less_oob_helper+0x168/0xc50
[   32.795438]  krealloc_less_oob+0x20/0x38
[   32.799434]  kunit_try_run_case+0x170/0x3f0
[   32.803688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.809261]  kthread+0x328/0x630
[   32.812554]  ret_from_fork+0x10/0x20
[   32.816192] 
[   32.817722] The buggy address belongs to the object at ffff000086408a00
[   32.817722]  which belongs to the cache kmalloc-256 of size 256
[   32.830377] The buggy address is located 7 bytes to the right of
[   32.830377]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   32.843476] 
[   32.845002] The buggy address belongs to the physical page:
[   32.850651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   32.858757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.866514] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.873572] page_type: f5(slab)
[   32.876776] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.884622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.892468] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.900400] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.908334] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   32.916268] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.924196] page dumped because: kasan: bad access detected
[   32.929846] 
[   32.931374] Memory state around the buggy address:
[   32.936233]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.943551]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.950868] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.958179]                                                  ^
[   32.964098]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.971416]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.978730] ==================================================================
[   32.355014] ==================================================================
[   32.366226] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.373905] Write of size 1 at addr ffff000086408ac9 by task kunit_try_catch/256
[   32.381405] 
[   32.382939] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.382967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.382976] Hardware name: Thundercomm Dragonboard 845c (DT)
[   32.382988] Call trace:
[   32.382994]  show_stack+0x20/0x38 (C)
[   32.383013]  dump_stack_lvl+0x8c/0xd0
[   32.383032]  print_report+0x118/0x608
[   32.383050]  kasan_report+0xdc/0x128
[   32.383069]  __asan_report_store1_noabort+0x20/0x30
[   32.383086]  krealloc_less_oob_helper+0xa48/0xc50
[   32.383105]  krealloc_less_oob+0x20/0x38
[   32.383125]  kunit_try_run_case+0x170/0x3f0
[   32.383144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.383166]  kthread+0x328/0x630
[   32.383181]  ret_from_fork+0x10/0x20
[   32.383198] 
[   32.453466] Allocated by task 256:
[   32.456927]  kasan_save_stack+0x3c/0x68
[   32.460840]  kasan_save_track+0x20/0x40
[   32.464753]  kasan_save_alloc_info+0x40/0x58
[   32.469093]  __kasan_krealloc+0x118/0x178
[   32.473177]  krealloc_noprof+0x128/0x360
[   32.477175]  krealloc_less_oob_helper+0x168/0xc50
[   32.481960]  krealloc_less_oob+0x20/0x38
[   32.485956]  kunit_try_run_case+0x170/0x3f0
[   32.490211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.495781]  kthread+0x328/0x630
[   32.499075]  ret_from_fork+0x10/0x20
[   32.502715] 
[   32.504252] The buggy address belongs to the object at ffff000086408a00
[   32.504252]  which belongs to the cache kmalloc-256 of size 256
[   32.516907] The buggy address is located 0 bytes to the right of
[   32.516907]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   32.530008] 
[   32.531537] The buggy address belongs to the physical page:
[   32.537187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   32.545292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.553052] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.560108] page_type: f5(slab)
[   32.563315] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.571163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.579010] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   32.586943] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.594876] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   32.602807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.610737] page dumped because: kasan: bad access detected
[   32.616383] 
[   32.617914] Memory state around the buggy address:
[   32.622778]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.630094]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.637409] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.644721]                                               ^
[   32.650374]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.657691]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665004] ==================================================================
[   35.128228] ==================================================================
[   35.135545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   35.143216] Write of size 1 at addr ffff0000864220ea by task kunit_try_catch/260
[   35.150701] 
[   35.152234] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.152260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.152267] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.152276] Call trace:
[   35.152282]  show_stack+0x20/0x38 (C)
[   35.152299]  dump_stack_lvl+0x8c/0xd0
[   35.152315]  print_report+0x118/0x608
[   35.152334]  kasan_report+0xdc/0x128
[   35.152351]  __asan_report_store1_noabort+0x20/0x30
[   35.152368]  krealloc_less_oob_helper+0xae4/0xc50
[   35.152385]  krealloc_large_less_oob+0x20/0x38
[   35.152402]  kunit_try_run_case+0x170/0x3f0
[   35.152418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.152437]  kthread+0x328/0x630
[   35.152450]  ret_from_fork+0x10/0x20
[   35.152466] 
[   35.223229] The buggy address belongs to the physical page:
[   35.228870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   35.236968] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.244718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.251763] page_type: f8(unknown)
[   35.255220] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.263060] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.270899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.278824] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.286749] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   35.294672] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.302593] page dumped because: kasan: bad access detected
[   35.308231] 
[   35.309753] Memory state around the buggy address:
[   35.314604]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.321920]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.329224] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.336536]                                                           ^
[   35.343231]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.350536]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.357838] ==================================================================
[   33.300563] ==================================================================
[   33.307880] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   33.315550] Write of size 1 at addr ffff000086408aea by task kunit_try_catch/256
[   33.323034] 
[   33.324569] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.324596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.324603] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.324612] Call trace:
[   33.324618]  show_stack+0x20/0x38 (C)
[   33.324635]  dump_stack_lvl+0x8c/0xd0
[   33.324651]  print_report+0x118/0x608
[   33.324669]  kasan_report+0xdc/0x128
[   33.324689]  __asan_report_store1_noabort+0x20/0x30
[   33.324705]  krealloc_less_oob_helper+0xae4/0xc50
[   33.324723]  krealloc_less_oob+0x20/0x38
[   33.324739]  kunit_try_run_case+0x170/0x3f0
[   33.324756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.324776]  kthread+0x328/0x630
[   33.324790]  ret_from_fork+0x10/0x20
[   33.324807] 
[   33.395032] Allocated by task 256:
[   33.398485]  kasan_save_stack+0x3c/0x68
[   33.402389]  kasan_save_track+0x20/0x40
[   33.406293]  kasan_save_alloc_info+0x40/0x58
[   33.410627]  __kasan_krealloc+0x118/0x178
[   33.414706]  krealloc_noprof+0x128/0x360
[   33.418697]  krealloc_less_oob_helper+0x168/0xc50
[   33.423473]  krealloc_less_oob+0x20/0x38
[   33.427463]  kunit_try_run_case+0x170/0x3f0
[   33.431713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.437278]  kthread+0x328/0x630
[   33.440561]  ret_from_fork+0x10/0x20
[   33.444191] 
[   33.445714] The buggy address belongs to the object at ffff000086408a00
[   33.445714]  which belongs to the cache kmalloc-256 of size 256
[   33.458368] The buggy address is located 33 bytes to the right of
[   33.458368]  allocated 201-byte region [ffff000086408a00, ffff000086408ac9)
[   33.471542] 
[   33.473066] The buggy address belongs to the physical page:
[   33.478709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   33.486809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.494561] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.501609] page_type: f5(slab)
[   33.504804] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.512645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.520485] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.528412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.536338] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   33.544264] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.552186] page dumped because: kasan: bad access detected
[   33.557828] 
[   33.559357] Memory state around the buggy address:
[   33.564209]  ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.571514]  ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.578823] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.586135]                                                           ^
[   33.592830]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.600146]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.607450] ==================================================================
[   34.655132] ==================================================================
[   34.662446] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   34.670116] Write of size 1 at addr ffff0000864220d0 by task kunit_try_catch/260
[   34.677612] 
[   34.679145] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   34.679174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.679183] Hardware name: Thundercomm Dragonboard 845c (DT)
[   34.679194] Call trace:
[   34.679200]  show_stack+0x20/0x38 (C)
[   34.679218]  dump_stack_lvl+0x8c/0xd0
[   34.679236]  print_report+0x118/0x608
[   34.679255]  kasan_report+0xdc/0x128
[   34.679273]  __asan_report_store1_noabort+0x20/0x30
[   34.679292]  krealloc_less_oob_helper+0xb9c/0xc50
[   34.679311]  krealloc_large_less_oob+0x20/0x38
[   34.679331]  kunit_try_run_case+0x170/0x3f0
[   34.679349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.679371]  kthread+0x328/0x630
[   34.679387]  ret_from_fork+0x10/0x20
[   34.679405] 
[   34.750213] The buggy address belongs to the physical page:
[   34.755867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   34.763978] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.771732] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.778789] page_type: f8(unknown)
[   34.782253] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.790095] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.797938] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.805866] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.813797] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   34.821726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.829650] page dumped because: kasan: bad access detected
[   34.835296] 
[   34.836831] Memory state around the buggy address:
[   34.841692]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.849014]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.856337] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   34.863649]                                                  ^
[   34.869557]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.876878]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.884197] ==================================================================
[   35.365188] ==================================================================
[   35.372503] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   35.380171] Write of size 1 at addr ffff0000864220eb by task kunit_try_catch/260
[   35.387664] 
[   35.389189] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.389215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.389222] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.389232] Call trace:
[   35.389237]  show_stack+0x20/0x38 (C)
[   35.389253]  dump_stack_lvl+0x8c/0xd0
[   35.389270]  print_report+0x118/0x608
[   35.389287]  kasan_report+0xdc/0x128
[   35.389305]  __asan_report_store1_noabort+0x20/0x30
[   35.389320]  krealloc_less_oob_helper+0xa58/0xc50
[   35.389337]  krealloc_large_less_oob+0x20/0x38
[   35.389354]  kunit_try_run_case+0x170/0x3f0
[   35.389370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.389390]  kthread+0x328/0x630
[   35.389403]  ret_from_fork+0x10/0x20
[   35.389419] 
[   35.460172] The buggy address belongs to the physical page:
[   35.465816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   35.473917] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.481671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.488720] page_type: f8(unknown)
[   35.492176] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.500016] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.507857] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.515785] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.523713] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   35.531641] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.539564] page dumped because: kasan: bad access detected
[   35.545206] 
[   35.546728] Memory state around the buggy address:
[   35.551578]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.558887]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.566195] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.573501]                                                           ^
[   35.580198]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.587505]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.594813] ==================================================================
[   34.414507] ==================================================================
[   34.426252] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   34.433926] Write of size 1 at addr ffff0000864220c9 by task kunit_try_catch/260
[   34.441424] 
[   34.442959] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   34.442988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.442996] Hardware name: Thundercomm Dragonboard 845c (DT)
[   34.443006] Call trace:
[   34.443013]  show_stack+0x20/0x38 (C)
[   34.443031]  dump_stack_lvl+0x8c/0xd0
[   34.443050]  print_report+0x118/0x608
[   34.443069]  kasan_report+0xdc/0x128
[   34.443087]  __asan_report_store1_noabort+0x20/0x30
[   34.443106]  krealloc_less_oob_helper+0xa48/0xc50
[   34.443126]  krealloc_large_less_oob+0x20/0x38
[   34.443145]  kunit_try_run_case+0x170/0x3f0
[   34.443164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.443185]  kthread+0x328/0x630
[   34.443201]  ret_from_fork+0x10/0x20
[   34.443219] 
[   34.514036] The buggy address belongs to the physical page:
[   34.519680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420
[   34.527790] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.535546] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.542602] page_type: f8(unknown)
[   34.546065] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.553907] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.561751] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.569689] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.577618] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff
[   34.585548] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.593475] page dumped because: kasan: bad access detected
[   34.599123] 
[   34.600657] Memory state around the buggy address:
[   34.605519]  ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.612839]  ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.620161] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   34.627475]                                               ^
[   34.633120]  ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.640443]  ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.647754] ==================================================================

[   32.819229] ==================================================================
[   32.819320] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.819994] Write of size 1 at addr fff00000c775e0ea by task kunit_try_catch/173
[   32.820343] 
[   32.820493] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.820772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.821072] Hardware name: linux,dummy-virt (DT)
[   32.821177] Call trace:
[   32.821287]  show_stack+0x20/0x38 (C)
[   32.821402]  dump_stack_lvl+0x8c/0xd0
[   32.821512]  print_report+0x118/0x608
[   32.821626]  kasan_report+0xdc/0x128
[   32.821791]  __asan_report_store1_noabort+0x20/0x30
[   32.822139]  krealloc_less_oob_helper+0xae4/0xc50
[   32.822300]  krealloc_large_less_oob+0x20/0x38
[   32.822615]  kunit_try_run_case+0x170/0x3f0
[   32.822795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.822961]  kthread+0x328/0x630
[   32.823087]  ret_from_fork+0x10/0x20
[   32.823267] 
[   32.823565] The buggy address belongs to the physical page:
[   32.823793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775c
[   32.823932] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.824040] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.824152] page_type: f8(unknown)
[   32.824237] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.824360] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.824481] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.824597] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.824710] head: 0bfffe0000000002 ffffc1ffc31dd701 00000000ffffffff 00000000ffffffff
[   32.825617] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.825739] page dumped because: kasan: bad access detected
[   32.825817] 
[   32.825908] Memory state around the buggy address:
[   32.826117]  fff00000c775df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.826321]  fff00000c775e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.826457] >fff00000c775e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.826614]                                                           ^
[   32.826757]  fff00000c775e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.827313]  fff00000c775e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.827565] ==================================================================
[   32.680307] ==================================================================
[   32.680413] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.680525] Write of size 1 at addr fff00000c46338d0 by task kunit_try_catch/169
[   32.680637] 
[   32.680724] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.681166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.681230] Hardware name: linux,dummy-virt (DT)
[   32.681438] Call trace:
[   32.681590]  show_stack+0x20/0x38 (C)
[   32.681856]  dump_stack_lvl+0x8c/0xd0
[   32.682007]  print_report+0x118/0x608
[   32.682210]  kasan_report+0xdc/0x128
[   32.682389]  __asan_report_store1_noabort+0x20/0x30
[   32.682527]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.682663]  krealloc_less_oob+0x20/0x38
[   32.682791]  kunit_try_run_case+0x170/0x3f0
[   32.683012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.683256]  kthread+0x328/0x630
[   32.683370]  ret_from_fork+0x10/0x20
[   32.683434] 
[   32.683457] Allocated by task 169:
[   32.683505]  kasan_save_stack+0x3c/0x68
[   32.683586]  kasan_save_track+0x20/0x40
[   32.683634]  kasan_save_alloc_info+0x40/0x58
[   32.683677]  __kasan_krealloc+0x118/0x178
[   32.683721]  krealloc_noprof+0x128/0x360
[   32.683766]  krealloc_less_oob_helper+0x168/0xc50
[   32.683812]  krealloc_less_oob+0x20/0x38
[   32.683854]  kunit_try_run_case+0x170/0x3f0
[   32.683989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.684116]  kthread+0x328/0x630
[   32.684291]  ret_from_fork+0x10/0x20
[   32.684480] 
[   32.684604] The buggy address belongs to the object at fff00000c4633800
[   32.684604]  which belongs to the cache kmalloc-256 of size 256
[   32.684740] The buggy address is located 7 bytes to the right of
[   32.684740]  allocated 201-byte region [fff00000c4633800, fff00000c46338c9)
[   32.684908] 
[   32.684959] The buggy address belongs to the physical page:
[   32.685075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104632
[   32.685268] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.685397] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.685535] page_type: f5(slab)
[   32.685787] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.686046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.686371] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.686546] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.686801] head: 0bfffe0000000001 ffffc1ffc3118c81 00000000ffffffff 00000000ffffffff
[   32.687160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.687271] page dumped because: kasan: bad access detected
[   32.687391] 
[   32.687443] Memory state around the buggy address:
[   32.687524]  fff00000c4633780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.687680]  fff00000c4633800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.688016] >fff00000c4633880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.688365]                                                  ^
[   32.688637]  fff00000c4633900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.688757]  fff00000c4633980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.689300] ==================================================================
[   32.692935] ==================================================================
[   32.693036] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.693137] Write of size 1 at addr fff00000c46338da by task kunit_try_catch/169
[   32.693249] 
[   32.693316] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.693501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.693561] Hardware name: linux,dummy-virt (DT)
[   32.693629] Call trace:
[   32.693677]  show_stack+0x20/0x38 (C)
[   32.693791]  dump_stack_lvl+0x8c/0xd0
[   32.693921]  print_report+0x118/0x608
[   32.694058]  kasan_report+0xdc/0x128
[   32.694193]  __asan_report_store1_noabort+0x20/0x30
[   32.694332]  krealloc_less_oob_helper+0xa80/0xc50
[   32.694491]  krealloc_less_oob+0x20/0x38
[   32.694629]  kunit_try_run_case+0x170/0x3f0
[   32.694765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.694926]  kthread+0x328/0x630
[   32.695054]  ret_from_fork+0x10/0x20
[   32.695279] 
[   32.695464] Allocated by task 169:
[   32.695596]  kasan_save_stack+0x3c/0x68
[   32.695707]  kasan_save_track+0x20/0x40
[   32.695815]  kasan_save_alloc_info+0x40/0x58
[   32.695939]  __kasan_krealloc+0x118/0x178
[   32.696045]  krealloc_noprof+0x128/0x360
[   32.696174]  krealloc_less_oob_helper+0x168/0xc50
[   32.696284]  krealloc_less_oob+0x20/0x38
[   32.696377]  kunit_try_run_case+0x170/0x3f0
[   32.696460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.696559]  kthread+0x328/0x630
[   32.696668]  ret_from_fork+0x10/0x20
[   32.696763] 
[   32.696808] The buggy address belongs to the object at fff00000c4633800
[   32.696808]  which belongs to the cache kmalloc-256 of size 256
[   32.696972] The buggy address is located 17 bytes to the right of
[   32.696972]  allocated 201-byte region [fff00000c4633800, fff00000c46338c9)
[   32.697234] 
[   32.697294] The buggy address belongs to the physical page:
[   32.697451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104632
[   32.697620] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.697852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.698154] page_type: f5(slab)
[   32.698253] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.698475] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.698656] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.699441] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.699680] head: 0bfffe0000000001 ffffc1ffc3118c81 00000000ffffffff 00000000ffffffff
[   32.699800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.699909] page dumped because: kasan: bad access detected
[   32.699989] 
[   32.700039] Memory state around the buggy address:
[   32.700110]  fff00000c4633780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.700202]  fff00000c4633800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.700298] >fff00000c4633880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.700385]                                                     ^
[   32.700479]  fff00000c4633900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.700578]  fff00000c4633980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.700663] ==================================================================
[   32.788658] ==================================================================
[   32.789140] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.790384] Write of size 1 at addr fff00000c775e0c9 by task kunit_try_catch/173
[   32.790692] 
[   32.790947] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.791217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.791293] Hardware name: linux,dummy-virt (DT)
[   32.791549] Call trace:
[   32.791942]  show_stack+0x20/0x38 (C)
[   32.792103]  dump_stack_lvl+0x8c/0xd0
[   32.792233]  print_report+0x118/0x608
[   32.792972]  kasan_report+0xdc/0x128
[   32.793593]  __asan_report_store1_noabort+0x20/0x30
[   32.793754]  krealloc_less_oob_helper+0xa48/0xc50
[   32.794045]  krealloc_large_less_oob+0x20/0x38
[   32.794169]  kunit_try_run_case+0x170/0x3f0
[   32.794283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.794421]  kthread+0x328/0x630
[   32.794969]  ret_from_fork+0x10/0x20
[   32.795211] 
[   32.795398] The buggy address belongs to the physical page:
[   32.795709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775c
[   32.796333] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.796450] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.796581] page_type: f8(unknown)
[   32.796674] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.797966] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.798134] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.798790] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.798927] head: 0bfffe0000000002 ffffc1ffc31dd701 00000000ffffffff 00000000ffffffff
[   32.799043] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.799178] page dumped because: kasan: bad access detected
[   32.799640] 
[   32.799722] Memory state around the buggy address:
[   32.799940]  fff00000c775df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.800207]  fff00000c775e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.800328] >fff00000c775e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.800417]                                               ^
[   32.801307]  fff00000c775e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.801457]  fff00000c775e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.801909] ==================================================================
[   32.702102] ==================================================================
[   32.702249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.702370] Write of size 1 at addr fff00000c46338ea by task kunit_try_catch/169
[   32.702490] 
[   32.702560] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.702751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.702817] Hardware name: linux,dummy-virt (DT)
[   32.702956] Call trace:
[   32.703052]  show_stack+0x20/0x38 (C)
[   32.703234]  dump_stack_lvl+0x8c/0xd0
[   32.703439]  print_report+0x118/0x608
[   32.703569]  kasan_report+0xdc/0x128
[   32.703733]  __asan_report_store1_noabort+0x20/0x30
[   32.703866]  krealloc_less_oob_helper+0xae4/0xc50
[   32.704043]  krealloc_less_oob+0x20/0x38
[   32.704179]  kunit_try_run_case+0x170/0x3f0
[   32.704403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.704536]  kthread+0x328/0x630
[   32.704650]  ret_from_fork+0x10/0x20
[   32.704856] 
[   32.704944] Allocated by task 169:
[   32.705019]  kasan_save_stack+0x3c/0x68
[   32.705124]  kasan_save_track+0x20/0x40
[   32.705290]  kasan_save_alloc_info+0x40/0x58
[   32.705387]  __kasan_krealloc+0x118/0x178
[   32.705487]  krealloc_noprof+0x128/0x360
[   32.705580]  krealloc_less_oob_helper+0x168/0xc50
[   32.705693]  krealloc_less_oob+0x20/0x38
[   32.705805]  kunit_try_run_case+0x170/0x3f0
[   32.705998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.706200]  kthread+0x328/0x630
[   32.706429]  ret_from_fork+0x10/0x20
[   32.706521] 
[   32.706566] The buggy address belongs to the object at fff00000c4633800
[   32.706566]  which belongs to the cache kmalloc-256 of size 256
[   32.706693] The buggy address is located 33 bytes to the right of
[   32.706693]  allocated 201-byte region [fff00000c4633800, fff00000c46338c9)
[   32.706850] 
[   32.707310] The buggy address belongs to the physical page:
[   32.707387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104632
[   32.707690] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.709994] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.710126] page_type: f5(slab)
[   32.710228] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.710369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.710506] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.710600] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.710682] head: 0bfffe0000000001 ffffc1ffc3118c81 00000000ffffffff 00000000ffffffff
[   32.710743] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.710790] page dumped because: kasan: bad access detected
[   32.710827] 
[   32.710847] Memory state around the buggy address:
[   32.710915]  fff00000c4633780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.710976]  fff00000c4633800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.711029] >fff00000c4633880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.711072]                                                           ^
[   32.711153]  fff00000c4633900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.711208]  fff00000c4633980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.711253] ==================================================================
[   32.714143] ==================================================================
[   32.714242] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.714342] Write of size 1 at addr fff00000c46338eb by task kunit_try_catch/169
[   32.714464] 
[   32.714531] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.714717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.714779] Hardware name: linux,dummy-virt (DT)
[   32.714847] Call trace:
[   32.714912]  show_stack+0x20/0x38 (C)
[   32.715042]  dump_stack_lvl+0x8c/0xd0
[   32.715161]  print_report+0x118/0x608
[   32.715275]  kasan_report+0xdc/0x128
[   32.715385]  __asan_report_store1_noabort+0x20/0x30
[   32.715497]  krealloc_less_oob_helper+0xa58/0xc50
[   32.715610]  krealloc_less_oob+0x20/0x38
[   32.715717]  kunit_try_run_case+0x170/0x3f0
[   32.715837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.716021]  kthread+0x328/0x630
[   32.716149]  ret_from_fork+0x10/0x20
[   32.716285] 
[   32.716362] Allocated by task 169:
[   32.716442]  kasan_save_stack+0x3c/0x68
[   32.716545]  kasan_save_track+0x20/0x40
[   32.716651]  kasan_save_alloc_info+0x40/0x58
[   32.716754]  __kasan_krealloc+0x118/0x178
[   32.716877]  krealloc_noprof+0x128/0x360
[   32.717088]  krealloc_less_oob_helper+0x168/0xc50
[   32.717259]  krealloc_less_oob+0x20/0x38
[   32.717392]  kunit_try_run_case+0x170/0x3f0
[   32.717490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.717703]  kthread+0x328/0x630
[   32.717872]  ret_from_fork+0x10/0x20
[   32.718461] 
[   32.718577] The buggy address belongs to the object at fff00000c4633800
[   32.718577]  which belongs to the cache kmalloc-256 of size 256
[   32.718754] The buggy address is located 34 bytes to the right of
[   32.718754]  allocated 201-byte region [fff00000c4633800, fff00000c46338c9)
[   32.718918] 
[   32.718965] The buggy address belongs to the physical page:
[   32.719032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104632
[   32.719512] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.719727] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.719854] page_type: f5(slab)
[   32.719964] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.720292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.720478] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.720732] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.722974] head: 0bfffe0000000001 ffffc1ffc3118c81 00000000ffffffff 00000000ffffffff
[   32.723095] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.723995] page dumped because: kasan: bad access detected
[   32.724061] 
[   32.724090] Memory state around the buggy address:
[   32.724129]  fff00000c4633780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.724183]  fff00000c4633800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.724234] >fff00000c4633880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.724282]                                                           ^
[   32.724334]  fff00000c4633900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.724385]  fff00000c4633980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.724429] ==================================================================
[   32.810736] ==================================================================
[   32.810825] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.810947] Write of size 1 at addr fff00000c775e0da by task kunit_try_catch/173
[   32.811076] 
[   32.811170] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.811517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.811594] Hardware name: linux,dummy-virt (DT)
[   32.811800] Call trace:
[   32.812096]  show_stack+0x20/0x38 (C)
[   32.812217]  dump_stack_lvl+0x8c/0xd0
[   32.812742]  print_report+0x118/0x608
[   32.813032]  kasan_report+0xdc/0x128
[   32.813157]  __asan_report_store1_noabort+0x20/0x30
[   32.813339]  krealloc_less_oob_helper+0xa80/0xc50
[   32.813514]  krealloc_large_less_oob+0x20/0x38
[   32.814172]  kunit_try_run_case+0x170/0x3f0
[   32.814550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.814700]  kthread+0x328/0x630
[   32.815157]  ret_from_fork+0x10/0x20
[   32.815272] 
[   32.815326] The buggy address belongs to the physical page:
[   32.815384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775c
[   32.815448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.815512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.815603] page_type: f8(unknown)
[   32.815651] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.815710] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.815767] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.815822] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.815878] head: 0bfffe0000000002 ffffc1ffc31dd701 00000000ffffffff 00000000ffffffff
[   32.816240] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.816729] page dumped because: kasan: bad access detected
[   32.816824] 
[   32.817249] Memory state around the buggy address:
[   32.817381]  fff00000c775df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.817533]  fff00000c775e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.817663] >fff00000c775e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.817836]                                                     ^
[   32.818000]  fff00000c775e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.818100]  fff00000c775e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.818246] ==================================================================
[   32.659156] ==================================================================
[   32.659429] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.659560] Write of size 1 at addr fff00000c46338c9 by task kunit_try_catch/169
[   32.659691] 
[   32.659771] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.660328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.660901] Hardware name: linux,dummy-virt (DT)
[   32.660990] Call trace:
[   32.661223]  show_stack+0x20/0x38 (C)
[   32.661426]  dump_stack_lvl+0x8c/0xd0
[   32.661569]  print_report+0x118/0x608
[   32.661873]  kasan_report+0xdc/0x128
[   32.662230]  __asan_report_store1_noabort+0x20/0x30
[   32.662379]  krealloc_less_oob_helper+0xa48/0xc50
[   32.662500]  krealloc_less_oob+0x20/0x38
[   32.662614]  kunit_try_run_case+0x170/0x3f0
[   32.662728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.663577]  kthread+0x328/0x630
[   32.663736]  ret_from_fork+0x10/0x20
[   32.664133] 
[   32.664351] Allocated by task 169:
[   32.664840]  kasan_save_stack+0x3c/0x68
[   32.664974]  kasan_save_track+0x20/0x40
[   32.665486]  kasan_save_alloc_info+0x40/0x58
[   32.665602]  __kasan_krealloc+0x118/0x178
[   32.666320]  krealloc_noprof+0x128/0x360
[   32.666719]  krealloc_less_oob_helper+0x168/0xc50
[   32.666959]  krealloc_less_oob+0x20/0x38
[   32.667053]  kunit_try_run_case+0x170/0x3f0
[   32.667517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.668003]  kthread+0x328/0x630
[   32.668375]  ret_from_fork+0x10/0x20
[   32.668749] 
[   32.668958] The buggy address belongs to the object at fff00000c4633800
[   32.668958]  which belongs to the cache kmalloc-256 of size 256
[   32.669557] The buggy address is located 0 bytes to the right of
[   32.669557]  allocated 201-byte region [fff00000c4633800, fff00000c46338c9)
[   32.669709] 
[   32.669759] The buggy address belongs to the physical page:
[   32.670133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104632
[   32.670569] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.671279] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.671426] page_type: f5(slab)
[   32.671947] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.672294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.672435] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.672570] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.672694] head: 0bfffe0000000001 ffffc1ffc3118c81 00000000ffffffff 00000000ffffffff
[   32.672823] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.672937] page dumped because: kasan: bad access detected
[   32.674342] 
[   32.674412] Memory state around the buggy address:
[   32.674858]  fff00000c4633780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.674981]  fff00000c4633800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.675484] >fff00000c4633880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.675587]                                               ^
[   32.676278]  fff00000c4633900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676397]  fff00000c4633980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676489] ==================================================================
[   32.803718] ==================================================================
[   32.803824] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.803961] Write of size 1 at addr fff00000c775e0d0 by task kunit_try_catch/173
[   32.804085] 
[   32.804182] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.804420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.804492] Hardware name: linux,dummy-virt (DT)
[   32.804573] Call trace:
[   32.804663]  show_stack+0x20/0x38 (C)
[   32.804985]  dump_stack_lvl+0x8c/0xd0
[   32.805208]  print_report+0x118/0x608
[   32.805474]  kasan_report+0xdc/0x128
[   32.805660]  __asan_report_store1_noabort+0x20/0x30
[   32.805779]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.805919]  krealloc_large_less_oob+0x20/0x38
[   32.806087]  kunit_try_run_case+0x170/0x3f0
[   32.806330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.806579]  kthread+0x328/0x630
[   32.806800]  ret_from_fork+0x10/0x20
[   32.807083] 
[   32.807159] The buggy address belongs to the physical page:
[   32.807327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775c
[   32.807540] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.807753] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.807906] page_type: f8(unknown)
[   32.808013] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.808139] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.808260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.808368] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.808482] head: 0bfffe0000000002 ffffc1ffc31dd701 00000000ffffffff 00000000ffffffff
[   32.808675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.808807] page dumped because: kasan: bad access detected
[   32.808981] 
[   32.809090] Memory state around the buggy address:
[   32.809170]  fff00000c775df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.809279]  fff00000c775e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.809378] >fff00000c775e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.809485]                                                  ^
[   32.810008]  fff00000c775e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.810126]  fff00000c775e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.810318] ==================================================================
[   32.830675] ==================================================================
[   32.830771] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.830914] Write of size 1 at addr fff00000c775e0eb by task kunit_try_catch/173
[   32.831049] 
[   32.831357] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.831502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.831558] Hardware name: linux,dummy-virt (DT)
[   32.831597] Call trace:
[   32.831623]  show_stack+0x20/0x38 (C)
[   32.831685]  dump_stack_lvl+0x8c/0xd0
[   32.831742]  print_report+0x118/0x608
[   32.831798]  kasan_report+0xdc/0x128
[   32.831852]  __asan_report_store1_noabort+0x20/0x30
[   32.831974]  krealloc_less_oob_helper+0xa58/0xc50
[   32.832097]  krealloc_large_less_oob+0x20/0x38
[   32.832440]  kunit_try_run_case+0x170/0x3f0
[   32.832609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.832704]  kthread+0x328/0x630
[   32.832757]  ret_from_fork+0x10/0x20
[   32.832814] 
[   32.832838] The buggy address belongs to the physical page:
[   32.832873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775c
[   32.832961] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.833017] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.833075] page_type: f8(unknown)
[   32.833119] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.833179] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.833238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.833293] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.833348] head: 0bfffe0000000002 ffffc1ffc31dd701 00000000ffffffff 00000000ffffffff
[   32.833404] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.833449] page dumped because: kasan: bad access detected
[   32.833485] 
[   32.833505] Memory state around the buggy address:
[   32.833541]  fff00000c775df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.833594]  fff00000c775e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.833645] >fff00000c775e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.833688]                                                           ^
[   32.833737]  fff00000c775e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.833786]  fff00000c775e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.833830] ==================================================================

[   28.718513] ==================================================================
[   28.719090] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   28.719516] Write of size 1 at addr ffff888102d660da by task kunit_try_catch/192
[   28.720994] 
[   28.721805] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.721878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.721904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.721953] Call Trace:
[   28.721992]  <TASK>
[   28.722030]  dump_stack_lvl+0x73/0xb0
[   28.722139]  print_report+0xd1/0x650
[   28.722198]  ? __virt_addr_valid+0x1db/0x2d0
[   28.722251]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   28.722311]  ? kasan_addr_to_slab+0x11/0xa0
[   28.722359]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   28.722412]  kasan_report+0x141/0x180
[   28.722463]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   28.722504]  __asan_report_store1_noabort+0x1b/0x30
[   28.722538]  krealloc_less_oob_helper+0xec6/0x11d0
[   28.722594]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.722625]  ? finish_task_switch.isra.0+0x153/0x700
[   28.722670]  ? __switch_to+0x47/0xf50
[   28.722705]  ? __schedule+0x10cc/0x2b60
[   28.722739]  ? __pfx_read_tsc+0x10/0x10
[   28.722771]  krealloc_large_less_oob+0x1c/0x30
[   28.722801]  kunit_try_run_case+0x1a5/0x480
[   28.722833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.722862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.722892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.722923]  ? __kthread_parkme+0x82/0x180
[   28.722949]  ? preempt_count_sub+0x50/0x80
[   28.722978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.723008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.723038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.723087]  kthread+0x337/0x6f0
[   28.723132]  ? trace_preempt_on+0x20/0xc0
[   28.723174]  ? __pfx_kthread+0x10/0x10
[   28.723201]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.723232]  ? calculate_sigpending+0x7b/0xa0
[   28.723263]  ? __pfx_kthread+0x10/0x10
[   28.723290]  ret_from_fork+0x116/0x1d0
[   28.723316]  ? __pfx_kthread+0x10/0x10
[   28.723343]  ret_from_fork_asm+0x1a/0x30
[   28.723383]  </TASK>
[   28.723397] 
[   28.740847] The buggy address belongs to the physical page:
[   28.741688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d64
[   28.742687] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.743214] flags: 0x200000000000040(head|node=0|zone=2)
[   28.743639] page_type: f8(unknown)
[   28.744268] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.744804] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.745934] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.746613] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.747371] head: 0200000000000002 ffffea00040b5901 00000000ffffffff 00000000ffffffff
[   28.747893] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.748812] page dumped because: kasan: bad access detected
[   28.749524] 
[   28.749696] Memory state around the buggy address:
[   28.750281]  ffff888102d65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.750854]  ffff888102d66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.751574] >ffff888102d66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   28.752271]                                                     ^
[   28.752726]  ffff888102d66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.753869]  ffff888102d66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.754437] ==================================================================
[   28.485969] ==================================================================
[   28.487170] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   28.487732] Write of size 1 at addr ffff888100385eea by task kunit_try_catch/188
[   28.488262] 
[   28.488603] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.488748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.488806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.488865] Call Trace:
[   28.488926]  <TASK>
[   28.488982]  dump_stack_lvl+0x73/0xb0
[   28.489075]  print_report+0xd1/0x650
[   28.489171]  ? __virt_addr_valid+0x1db/0x2d0
[   28.489258]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   28.489336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.489403]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   28.489519]  kasan_report+0x141/0x180
[   28.489599]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   28.489686]  __asan_report_store1_noabort+0x1b/0x30
[   28.489723]  krealloc_less_oob_helper+0xe90/0x11d0
[   28.489757]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.489788]  ? finish_task_switch.isra.0+0x153/0x700
[   28.489816]  ? __switch_to+0x47/0xf50
[   28.489849]  ? __schedule+0x10cc/0x2b60
[   28.489881]  ? __pfx_read_tsc+0x10/0x10
[   28.489913]  krealloc_less_oob+0x1c/0x30
[   28.489941]  kunit_try_run_case+0x1a5/0x480
[   28.489973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.490002]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.490033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.490063]  ? __kthread_parkme+0x82/0x180
[   28.490090]  ? preempt_count_sub+0x50/0x80
[   28.490119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.490150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.490180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.490210]  kthread+0x337/0x6f0
[   28.490235]  ? trace_preempt_on+0x20/0xc0
[   28.490265]  ? __pfx_kthread+0x10/0x10
[   28.490291]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.490320]  ? calculate_sigpending+0x7b/0xa0
[   28.490351]  ? __pfx_kthread+0x10/0x10
[   28.490378]  ret_from_fork+0x116/0x1d0
[   28.490402]  ? __pfx_kthread+0x10/0x10
[   28.490429]  ret_from_fork_asm+0x1a/0x30
[   28.490467]  </TASK>
[   28.490482] 
[   28.505522] Allocated by task 188:
[   28.506083]  kasan_save_stack+0x45/0x70
[   28.506535]  kasan_save_track+0x18/0x40
[   28.507067]  kasan_save_alloc_info+0x3b/0x50
[   28.507578]  __kasan_krealloc+0x190/0x1f0
[   28.508105]  krealloc_noprof+0xf3/0x340
[   28.508570]  krealloc_less_oob_helper+0x1aa/0x11d0
[   28.509060]  krealloc_less_oob+0x1c/0x30
[   28.509315]  kunit_try_run_case+0x1a5/0x480
[   28.509710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.510329]  kthread+0x337/0x6f0
[   28.510779]  ret_from_fork+0x116/0x1d0
[   28.511238]  ret_from_fork_asm+0x1a/0x30
[   28.511770] 
[   28.512033] The buggy address belongs to the object at ffff888100385e00
[   28.512033]  which belongs to the cache kmalloc-256 of size 256
[   28.512803] The buggy address is located 33 bytes to the right of
[   28.512803]  allocated 201-byte region [ffff888100385e00, ffff888100385ec9)
[   28.514035] 
[   28.514222] The buggy address belongs to the physical page:
[   28.514602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100384
[   28.515376] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.516098] flags: 0x200000000000040(head|node=0|zone=2)
[   28.516718] page_type: f5(slab)
[   28.517043] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.517698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.518396] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.518965] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.519778] head: 0200000000000001 ffffea000400e101 00000000ffffffff 00000000ffffffff
[   28.520390] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.520991] page dumped because: kasan: bad access detected
[   28.521451] 
[   28.521746] Memory state around the buggy address:
[   28.522166]  ffff888100385d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.522728]  ffff888100385e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.523394] >ffff888100385e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   28.524027]                                                           ^
[   28.524483]  ffff888100385f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.525137]  ffff888100385f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.525701] ==================================================================
[   28.647794] ==================================================================
[   28.649292] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   28.649921] Write of size 1 at addr ffff888102d660c9 by task kunit_try_catch/192
[   28.650995] 
[   28.651317] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.651441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.651472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.651845] Call Trace:
[   28.651873]  <TASK>
[   28.651896]  dump_stack_lvl+0x73/0xb0
[   28.651944]  print_report+0xd1/0x650
[   28.651977]  ? __virt_addr_valid+0x1db/0x2d0
[   28.652011]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   28.652042]  ? kasan_addr_to_slab+0x11/0xa0
[   28.652110]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   28.652163]  kasan_report+0x141/0x180
[   28.652213]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   28.652251]  __asan_report_store1_noabort+0x1b/0x30
[   28.652285]  krealloc_less_oob_helper+0xd70/0x11d0
[   28.652318]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.652349]  ? finish_task_switch.isra.0+0x153/0x700
[   28.652379]  ? __switch_to+0x47/0xf50
[   28.652414]  ? __schedule+0x10cc/0x2b60
[   28.652447]  ? __pfx_read_tsc+0x10/0x10
[   28.652479]  krealloc_large_less_oob+0x1c/0x30
[   28.652508]  kunit_try_run_case+0x1a5/0x480
[   28.652564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.652596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.652630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.652674]  ? __kthread_parkme+0x82/0x180
[   28.652702]  ? preempt_count_sub+0x50/0x80
[   28.652732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.652763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.652793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.652823]  kthread+0x337/0x6f0
[   28.652849]  ? trace_preempt_on+0x20/0xc0
[   28.652880]  ? __pfx_kthread+0x10/0x10
[   28.652907]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.652936]  ? calculate_sigpending+0x7b/0xa0
[   28.652967]  ? __pfx_kthread+0x10/0x10
[   28.652994]  ret_from_fork+0x116/0x1d0
[   28.653019]  ? __pfx_kthread+0x10/0x10
[   28.653045]  ret_from_fork_asm+0x1a/0x30
[   28.653113]  </TASK>
[   28.653138] 
[   28.669530] The buggy address belongs to the physical page:
[   28.670050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d64
[   28.670627] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.671263] flags: 0x200000000000040(head|node=0|zone=2)
[   28.671606] page_type: f8(unknown)
[   28.672304] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.673371] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.674015] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.674229] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.674417] head: 0200000000000002 ffffea00040b5901 00000000ffffffff 00000000ffffffff
[   28.674792] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.675539] page dumped because: kasan: bad access detected
[   28.676354] 
[   28.676491] Memory state around the buggy address:
[   28.676800]  ffff888102d65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.677647]  ffff888102d66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.678348] >ffff888102d66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   28.679084]                                               ^
[   28.679564]  ffff888102d66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.680207]  ffff888102d66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.680689] ==================================================================
[   28.793703] ==================================================================
[   28.794235] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   28.794969] Write of size 1 at addr ffff888102d660eb by task kunit_try_catch/192
[   28.795568] 
[   28.795803] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.795926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.795955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.796537] Call Trace:
[   28.796618]  <TASK>
[   28.796672]  dump_stack_lvl+0x73/0xb0
[   28.796728]  print_report+0xd1/0x650
[   28.796760]  ? __virt_addr_valid+0x1db/0x2d0
[   28.796792]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   28.796821]  ? kasan_addr_to_slab+0x11/0xa0
[   28.796848]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   28.796878]  kasan_report+0x141/0x180
[   28.796906]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   28.796941]  __asan_report_store1_noabort+0x1b/0x30
[   28.796973]  krealloc_less_oob_helper+0xd47/0x11d0
[   28.797005]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.797035]  ? finish_task_switch.isra.0+0x153/0x700
[   28.797079]  ? __switch_to+0x47/0xf50
[   28.797135]  ? __schedule+0x10cc/0x2b60
[   28.797179]  ? __pfx_read_tsc+0x10/0x10
[   28.797213]  krealloc_large_less_oob+0x1c/0x30
[   28.797243]  kunit_try_run_case+0x1a5/0x480
[   28.797276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.797305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.797337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.797368]  ? __kthread_parkme+0x82/0x180
[   28.797394]  ? preempt_count_sub+0x50/0x80
[   28.797423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.797453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.797483]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.797513]  kthread+0x337/0x6f0
[   28.797555]  ? trace_preempt_on+0x20/0xc0
[   28.797590]  ? __pfx_kthread+0x10/0x10
[   28.797617]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.797661]  ? calculate_sigpending+0x7b/0xa0
[   28.797693]  ? __pfx_kthread+0x10/0x10
[   28.797721]  ret_from_fork+0x116/0x1d0
[   28.797746]  ? __pfx_kthread+0x10/0x10
[   28.797773]  ret_from_fork_asm+0x1a/0x30
[   28.797811]  </TASK>
[   28.797825] 
[   28.813694] The buggy address belongs to the physical page:
[   28.814463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d64
[   28.815250] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.815899] flags: 0x200000000000040(head|node=0|zone=2)
[   28.816500] page_type: f8(unknown)
[   28.817082] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.817923] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.818483] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.819267] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.820261] head: 0200000000000002 ffffea00040b5901 00000000ffffffff 00000000ffffffff
[   28.820769] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.821442] page dumped because: kasan: bad access detected
[   28.821956] 
[   28.822565] Memory state around the buggy address:
[   28.822820]  ffff888102d65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.823302]  ffff888102d66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.823784] >ffff888102d66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   28.824656]                                                           ^
[   28.825056]  ffff888102d66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.825523]  ffff888102d66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.826118] ==================================================================
[   28.446946] ==================================================================
[   28.447975] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   28.448609] Write of size 1 at addr ffff888100385eda by task kunit_try_catch/188
[   28.449210] 
[   28.449514] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.449689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.449724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.449773] Call Trace:
[   28.449806]  <TASK>
[   28.449846]  dump_stack_lvl+0x73/0xb0
[   28.449915]  print_report+0xd1/0x650
[   28.449969]  ? __virt_addr_valid+0x1db/0x2d0
[   28.450027]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   28.450150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.450252]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   28.450336]  kasan_report+0x141/0x180
[   28.450398]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   28.450469]  __asan_report_store1_noabort+0x1b/0x30
[   28.450524]  krealloc_less_oob_helper+0xec6/0x11d0
[   28.450581]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.450614]  ? finish_task_switch.isra.0+0x153/0x700
[   28.450657]  ? __switch_to+0x47/0xf50
[   28.450694]  ? __schedule+0x10cc/0x2b60
[   28.450729]  ? __pfx_read_tsc+0x10/0x10
[   28.450761]  krealloc_less_oob+0x1c/0x30
[   28.450789]  kunit_try_run_case+0x1a5/0x480
[   28.450820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.450850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.450881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.450912]  ? __kthread_parkme+0x82/0x180
[   28.450938]  ? preempt_count_sub+0x50/0x80
[   28.450966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.450997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.451026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.451057]  kthread+0x337/0x6f0
[   28.451082]  ? trace_preempt_on+0x20/0xc0
[   28.451112]  ? __pfx_kthread+0x10/0x10
[   28.451138]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.451167]  ? calculate_sigpending+0x7b/0xa0
[   28.451196]  ? __pfx_kthread+0x10/0x10
[   28.451223]  ret_from_fork+0x116/0x1d0
[   28.451248]  ? __pfx_kthread+0x10/0x10
[   28.451273]  ret_from_fork_asm+0x1a/0x30
[   28.451312]  </TASK>
[   28.451325] 
[   28.464664] Allocated by task 188:
[   28.465078]  kasan_save_stack+0x45/0x70
[   28.465417]  kasan_save_track+0x18/0x40
[   28.465682]  kasan_save_alloc_info+0x3b/0x50
[   28.466118]  __kasan_krealloc+0x190/0x1f0
[   28.466710]  krealloc_noprof+0xf3/0x340
[   28.467174]  krealloc_less_oob_helper+0x1aa/0x11d0
[   28.467744]  krealloc_less_oob+0x1c/0x30
[   28.468169]  kunit_try_run_case+0x1a5/0x480
[   28.468585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.469018]  kthread+0x337/0x6f0
[   28.469247]  ret_from_fork+0x116/0x1d0
[   28.469475]  ret_from_fork_asm+0x1a/0x30
[   28.469928] 
[   28.470123] The buggy address belongs to the object at ffff888100385e00
[   28.470123]  which belongs to the cache kmalloc-256 of size 256
[   28.471284] The buggy address is located 17 bytes to the right of
[   28.471284]  allocated 201-byte region [ffff888100385e00, ffff888100385ec9)
[   28.472148] 
[   28.472295] The buggy address belongs to the physical page:
[   28.472586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100384
[   28.473458] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.474226] flags: 0x200000000000040(head|node=0|zone=2)
[   28.474741] page_type: f5(slab)
[   28.475023] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.475490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.476447] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.477405] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.478241] head: 0200000000000001 ffffea000400e101 00000000ffffffff 00000000ffffffff
[   28.479049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.479412] page dumped because: kasan: bad access detected
[   28.479772] 
[   28.479971] Memory state around the buggy address:
[   28.480631]  ffff888100385d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.481314]  ffff888100385e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.481968] >ffff888100385e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   28.482661]                                                     ^
[   28.483014]  ffff888100385f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.483359]  ffff888100385f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.483926] ==================================================================
[   28.400021] ==================================================================
[   28.401074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   28.401814] Write of size 1 at addr ffff888100385ed0 by task kunit_try_catch/188
[   28.402662] 
[   28.403311] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.403461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.403512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.403577] Call Trace:
[   28.403611]  <TASK>
[   28.403672]  dump_stack_lvl+0x73/0xb0
[   28.403723]  print_report+0xd1/0x650
[   28.403753]  ? __virt_addr_valid+0x1db/0x2d0
[   28.403785]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   28.403815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.403860]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   28.403890]  kasan_report+0x141/0x180
[   28.403919]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   28.403954]  __asan_report_store1_noabort+0x1b/0x30
[   28.403985]  krealloc_less_oob_helper+0xe23/0x11d0
[   28.404018]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.404048]  ? finish_task_switch.isra.0+0x153/0x700
[   28.404089]  ? __switch_to+0x47/0xf50
[   28.404144]  ? __schedule+0x10cc/0x2b60
[   28.404197]  ? __pfx_read_tsc+0x10/0x10
[   28.404250]  krealloc_less_oob+0x1c/0x30
[   28.404300]  kunit_try_run_case+0x1a5/0x480
[   28.404354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.404405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.404460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.404498]  ? __kthread_parkme+0x82/0x180
[   28.404527]  ? preempt_count_sub+0x50/0x80
[   28.404581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.404614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.404660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.404693]  kthread+0x337/0x6f0
[   28.404720]  ? trace_preempt_on+0x20/0xc0
[   28.404751]  ? __pfx_kthread+0x10/0x10
[   28.404778]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.404808]  ? calculate_sigpending+0x7b/0xa0
[   28.404839]  ? __pfx_kthread+0x10/0x10
[   28.404866]  ret_from_fork+0x116/0x1d0
[   28.404891]  ? __pfx_kthread+0x10/0x10
[   28.404919]  ret_from_fork_asm+0x1a/0x30
[   28.404957]  </TASK>
[   28.404971] 
[   28.421814] Allocated by task 188:
[   28.422136]  kasan_save_stack+0x45/0x70
[   28.422457]  kasan_save_track+0x18/0x40
[   28.423208]  kasan_save_alloc_info+0x3b/0x50
[   28.423696]  __kasan_krealloc+0x190/0x1f0
[   28.424564]  krealloc_noprof+0xf3/0x340
[   28.425042]  krealloc_less_oob_helper+0x1aa/0x11d0
[   28.425527]  krealloc_less_oob+0x1c/0x30
[   28.426018]  kunit_try_run_case+0x1a5/0x480
[   28.426367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.426694]  kthread+0x337/0x6f0
[   28.427249]  ret_from_fork+0x116/0x1d0
[   28.427862]  ret_from_fork_asm+0x1a/0x30
[   28.428512] 
[   28.428966] The buggy address belongs to the object at ffff888100385e00
[   28.428966]  which belongs to the cache kmalloc-256 of size 256
[   28.430113] The buggy address is located 7 bytes to the right of
[   28.430113]  allocated 201-byte region [ffff888100385e00, ffff888100385ec9)
[   28.431054] 
[   28.431436] The buggy address belongs to the physical page:
[   28.432023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100384
[   28.433177] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.433783] flags: 0x200000000000040(head|node=0|zone=2)
[   28.434469] page_type: f5(slab)
[   28.434842] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.435564] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.436211] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.437279] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.437920] head: 0200000000000001 ffffea000400e101 00000000ffffffff 00000000ffffffff
[   28.438621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.439189] page dumped because: kasan: bad access detected
[   28.439856] 
[   28.440155] Memory state around the buggy address:
[   28.441004]  ffff888100385d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.441600]  ffff888100385e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.442225] >ffff888100385e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   28.442870]                                                  ^
[   28.443476]  ffff888100385f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.444208]  ffff888100385f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.445011] ==================================================================
[   28.682047] ==================================================================
[   28.683026] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   28.683925] Write of size 1 at addr ffff888102d660d0 by task kunit_try_catch/192
[   28.685429] 
[   28.685765] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.685901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.685928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.685954] Call Trace:
[   28.685972]  <TASK>
[   28.685994]  dump_stack_lvl+0x73/0xb0
[   28.686038]  print_report+0xd1/0x650
[   28.686219]  ? __virt_addr_valid+0x1db/0x2d0
[   28.686319]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   28.686452]  ? kasan_addr_to_slab+0x11/0xa0
[   28.686485]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   28.686516]  kasan_report+0x141/0x180
[   28.686566]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   28.686604]  __asan_report_store1_noabort+0x1b/0x30
[   28.686643]  krealloc_less_oob_helper+0xe23/0x11d0
[   28.686697]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.686731]  ? finish_task_switch.isra.0+0x153/0x700
[   28.686760]  ? __switch_to+0x47/0xf50
[   28.686793]  ? __schedule+0x10cc/0x2b60
[   28.686826]  ? __pfx_read_tsc+0x10/0x10
[   28.686859]  krealloc_large_less_oob+0x1c/0x30
[   28.686888]  kunit_try_run_case+0x1a5/0x480
[   28.686920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.686949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.686979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.687009]  ? __kthread_parkme+0x82/0x180
[   28.687035]  ? preempt_count_sub+0x50/0x80
[   28.687075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.687128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.687179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.687212]  kthread+0x337/0x6f0
[   28.687239]  ? trace_preempt_on+0x20/0xc0
[   28.687271]  ? __pfx_kthread+0x10/0x10
[   28.687298]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.687327]  ? calculate_sigpending+0x7b/0xa0
[   28.687358]  ? __pfx_kthread+0x10/0x10
[   28.687385]  ret_from_fork+0x116/0x1d0
[   28.687410]  ? __pfx_kthread+0x10/0x10
[   28.687437]  ret_from_fork_asm+0x1a/0x30
[   28.687475]  </TASK>
[   28.687489] 
[   28.703680] The buggy address belongs to the physical page:
[   28.704438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d64
[   28.705664] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.706211] flags: 0x200000000000040(head|node=0|zone=2)
[   28.706827] page_type: f8(unknown)
[   28.707215] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.707836] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.708670] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.709745] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.710467] head: 0200000000000002 ffffea00040b5901 00000000ffffffff 00000000ffffffff
[   28.711037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.711777] page dumped because: kasan: bad access detected
[   28.712319] 
[   28.712527] Memory state around the buggy address:
[   28.712955]  ffff888102d65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.714065]  ffff888102d66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.714777] >ffff888102d66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   28.715467]                                                  ^
[   28.715970]  ffff888102d66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.716665]  ffff888102d66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.717570] ==================================================================
[   28.353711] ==================================================================
[   28.354254] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   28.355578] Write of size 1 at addr ffff888100385ec9 by task kunit_try_catch/188
[   28.356599] 
[   28.356785] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.356894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.356920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.356946] Call Trace:
[   28.356963]  <TASK>
[   28.356985]  dump_stack_lvl+0x73/0xb0
[   28.357030]  print_report+0xd1/0x650
[   28.357173]  ? __virt_addr_valid+0x1db/0x2d0
[   28.357281]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   28.357351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.357430]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   28.357510]  kasan_report+0x141/0x180
[   28.357587]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   28.357674]  __asan_report_store1_noabort+0x1b/0x30
[   28.357740]  krealloc_less_oob_helper+0xd70/0x11d0
[   28.357797]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.357845]  ? finish_task_switch.isra.0+0x153/0x700
[   28.357898]  ? __switch_to+0x47/0xf50
[   28.357954]  ? __schedule+0x10cc/0x2b60
[   28.358015]  ? __pfx_read_tsc+0x10/0x10
[   28.358076]  krealloc_less_oob+0x1c/0x30
[   28.358125]  kunit_try_run_case+0x1a5/0x480
[   28.358181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.358234]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.358286]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.358340]  ? __kthread_parkme+0x82/0x180
[   28.358388]  ? preempt_count_sub+0x50/0x80
[   28.358443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.358506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.358581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.358642]  kthread+0x337/0x6f0
[   28.358688]  ? trace_preempt_on+0x20/0xc0
[   28.358737]  ? __pfx_kthread+0x10/0x10
[   28.358781]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.358833]  ? calculate_sigpending+0x7b/0xa0
[   28.358889]  ? __pfx_kthread+0x10/0x10
[   28.358940]  ret_from_fork+0x116/0x1d0
[   28.358987]  ? __pfx_kthread+0x10/0x10
[   28.359033]  ret_from_fork_asm+0x1a/0x30
[   28.359102]  </TASK>
[   28.359128] 
[   28.376593] Allocated by task 188:
[   28.376998]  kasan_save_stack+0x45/0x70
[   28.377431]  kasan_save_track+0x18/0x40
[   28.377970]  kasan_save_alloc_info+0x3b/0x50
[   28.378249]  __kasan_krealloc+0x190/0x1f0
[   28.378644]  krealloc_noprof+0xf3/0x340
[   28.379061]  krealloc_less_oob_helper+0x1aa/0x11d0
[   28.379727]  krealloc_less_oob+0x1c/0x30
[   28.380623]  kunit_try_run_case+0x1a5/0x480
[   28.381229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.381619]  kthread+0x337/0x6f0
[   28.382070]  ret_from_fork+0x116/0x1d0
[   28.382356]  ret_from_fork_asm+0x1a/0x30
[   28.382976] 
[   28.383188] The buggy address belongs to the object at ffff888100385e00
[   28.383188]  which belongs to the cache kmalloc-256 of size 256
[   28.384159] The buggy address is located 0 bytes to the right of
[   28.384159]  allocated 201-byte region [ffff888100385e00, ffff888100385ec9)
[   28.385368] 
[   28.385602] The buggy address belongs to the physical page:
[   28.386355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100384
[   28.386935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.387313] flags: 0x200000000000040(head|node=0|zone=2)
[   28.387868] page_type: f5(slab)
[   28.388180] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.388738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.389190] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.389883] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.390771] head: 0200000000000001 ffffea000400e101 00000000ffffffff 00000000ffffffff
[   28.391339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.392538] page dumped because: kasan: bad access detected
[   28.392853] 
[   28.393050] Memory state around the buggy address:
[   28.393431]  ffff888100385d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.394053]  ffff888100385e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.394438] >ffff888100385e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   28.395105]                                               ^
[   28.396581]  ffff888100385f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.397156]  ffff888100385f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.397941] ==================================================================
[   28.527876] ==================================================================
[   28.528236] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   28.528718] Write of size 1 at addr ffff888100385eeb by task kunit_try_catch/188
[   28.529329] 
[   28.529684] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.529832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.529884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.529950] Call Trace:
[   28.529991]  <TASK>
[   28.530045]  dump_stack_lvl+0x73/0xb0
[   28.530123]  print_report+0xd1/0x650
[   28.530181]  ? __virt_addr_valid+0x1db/0x2d0
[   28.530255]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   28.530335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.530406]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   28.530467]  kasan_report+0x141/0x180
[   28.530515]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   28.530574]  __asan_report_store1_noabort+0x1b/0x30
[   28.530609]  krealloc_less_oob_helper+0xd47/0x11d0
[   28.530666]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.530699]  ? finish_task_switch.isra.0+0x153/0x700
[   28.530729]  ? __switch_to+0x47/0xf50
[   28.530763]  ? __schedule+0x10cc/0x2b60
[   28.530796]  ? __pfx_read_tsc+0x10/0x10
[   28.530828]  krealloc_less_oob+0x1c/0x30
[   28.530856]  kunit_try_run_case+0x1a5/0x480
[   28.530889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.530919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.530950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.530981]  ? __kthread_parkme+0x82/0x180
[   28.531007]  ? preempt_count_sub+0x50/0x80
[   28.531036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.531067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.531097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.531127]  kthread+0x337/0x6f0
[   28.531153]  ? trace_preempt_on+0x20/0xc0
[   28.531183]  ? __pfx_kthread+0x10/0x10
[   28.531209]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.531238]  ? calculate_sigpending+0x7b/0xa0
[   28.531270]  ? __pfx_kthread+0x10/0x10
[   28.531297]  ret_from_fork+0x116/0x1d0
[   28.531322]  ? __pfx_kthread+0x10/0x10
[   28.531349]  ret_from_fork_asm+0x1a/0x30
[   28.531388]  </TASK>
[   28.531401] 
[   28.544061] Allocated by task 188:
[   28.544458]  kasan_save_stack+0x45/0x70
[   28.544947]  kasan_save_track+0x18/0x40
[   28.545355]  kasan_save_alloc_info+0x3b/0x50
[   28.545835]  __kasan_krealloc+0x190/0x1f0
[   28.546237]  krealloc_noprof+0xf3/0x340
[   28.546531]  krealloc_less_oob_helper+0x1aa/0x11d0
[   28.546993]  krealloc_less_oob+0x1c/0x30
[   28.547244]  kunit_try_run_case+0x1a5/0x480
[   28.547499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.548066]  kthread+0x337/0x6f0
[   28.548517]  ret_from_fork+0x116/0x1d0
[   28.549128]  ret_from_fork_asm+0x1a/0x30
[   28.549582] 
[   28.549811] The buggy address belongs to the object at ffff888100385e00
[   28.549811]  which belongs to the cache kmalloc-256 of size 256
[   28.550656] The buggy address is located 34 bytes to the right of
[   28.550656]  allocated 201-byte region [ffff888100385e00, ffff888100385ec9)
[   28.551583] 
[   28.551853] The buggy address belongs to the physical page:
[   28.552353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100384
[   28.552938] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.553562] flags: 0x200000000000040(head|node=0|zone=2)
[   28.553965] page_type: f5(slab)
[   28.554248] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.554631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.554993] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.555355] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.556041] head: 0200000000000001 ffffea000400e101 00000000ffffffff 00000000ffffffff
[   28.556778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.557856] page dumped because: kasan: bad access detected
[   28.558351] 
[   28.558560] Memory state around the buggy address:
[   28.559018]  ffff888100385d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.559603]  ffff888100385e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.560063] >ffff888100385e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   28.560406]                                                           ^
[   28.560909]  ffff888100385f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.561601]  ffff888100385f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.562258] ==================================================================
[   28.755391] ==================================================================
[   28.755924] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   28.756841] Write of size 1 at addr ffff888102d660ea by task kunit_try_catch/192
[   28.757982] 
[   28.758353] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.758474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.758502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.758560] Call Trace:
[   28.758600]  <TASK>
[   28.758690]  dump_stack_lvl+0x73/0xb0
[   28.758775]  print_report+0xd1/0x650
[   28.758832]  ? __virt_addr_valid+0x1db/0x2d0
[   28.758894]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   28.758983]  ? kasan_addr_to_slab+0x11/0xa0
[   28.759178]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   28.759270]  kasan_report+0x141/0x180
[   28.759329]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   28.759402]  __asan_report_store1_noabort+0x1b/0x30
[   28.759470]  krealloc_less_oob_helper+0xe90/0x11d0
[   28.759556]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   28.759606]  ? finish_task_switch.isra.0+0x153/0x700
[   28.759657]  ? __switch_to+0x47/0xf50
[   28.759696]  ? __schedule+0x10cc/0x2b60
[   28.759731]  ? __pfx_read_tsc+0x10/0x10
[   28.759765]  krealloc_large_less_oob+0x1c/0x30
[   28.759795]  kunit_try_run_case+0x1a5/0x480
[   28.759839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.759869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.759903]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.759934]  ? __kthread_parkme+0x82/0x180
[   28.759961]  ? preempt_count_sub+0x50/0x80
[   28.759990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.760020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.760053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.760108]  kthread+0x337/0x6f0
[   28.760152]  ? trace_preempt_on+0x20/0xc0
[   28.760193]  ? __pfx_kthread+0x10/0x10
[   28.760221]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.760251]  ? calculate_sigpending+0x7b/0xa0
[   28.760282]  ? __pfx_kthread+0x10/0x10
[   28.760309]  ret_from_fork+0x116/0x1d0
[   28.760335]  ? __pfx_kthread+0x10/0x10
[   28.760361]  ret_from_fork_asm+0x1a/0x30
[   28.760401]  </TASK>
[   28.760414] 
[   28.777608] The buggy address belongs to the physical page:
[   28.778090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d64
[   28.778852] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.780003] flags: 0x200000000000040(head|node=0|zone=2)
[   28.780729] page_type: f8(unknown)
[   28.781247] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.781898] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.782622] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.783612] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.784413] head: 0200000000000002 ffffea00040b5901 00000000ffffffff 00000000ffffffff
[   28.785401] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.786214] page dumped because: kasan: bad access detected
[   28.786641] 
[   28.786789] Memory state around the buggy address:
[   28.787597]  ffff888102d65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.788453]  ffff888102d66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.789092] >ffff888102d66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   28.789682]                                                           ^
[   28.790798]  ffff888102d66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.791447]  ffff888102d66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.792463] ==================================================================