Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
juno-r2
qemu-arm64
qemu-x86_64

[   35.297829] ==================================================================
[   35.309048] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   35.316722] Write of size 1 at addr ffff00009535e0eb by task kunit_try_catch/246
[   35.324220] 
[   35.325752] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   35.325779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.325787] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.325796] Call trace:
[   35.325803]  show_stack+0x20/0x38 (C)
[   35.325821]  dump_stack_lvl+0x8c/0xd0
[   35.325839]  print_report+0x118/0x608
[   35.325858]  kasan_report+0xdc/0x128
[   35.325877]  __asan_report_store1_noabort+0x20/0x30
[   35.325894]  krealloc_more_oob_helper+0x60c/0x678
[   35.325913]  krealloc_large_more_oob+0x20/0x38
[   35.325931]  kunit_try_run_case+0x170/0x3f0
[   35.325950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.325970]  kthread+0x328/0x630
[   35.325985]  ret_from_fork+0x10/0x20
[   35.326004] 
[   35.396813] The buggy address belongs to the physical page:
[   35.402461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11535c
[   35.410574] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.418329] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.425383] page_type: f8(unknown)
[   35.428846] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.436689] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.444535] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.452464] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.460394] head: 0bfffe0000000002 fffffdffc254d701 00000000ffffffff 00000000ffffffff
[   35.468324] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.476248] page dumped because: kasan: bad access detected
[   35.481896] 
[   35.483425] Memory state around the buggy address:
[   35.488291]  ffff00009535df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.495609]  ffff00009535e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.502931] >ffff00009535e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   35.510248]                                                           ^
[   35.516953]  ffff00009535e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.524275]  ffff00009535e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.531592] ==================================================================
[   35.539044] ==================================================================
[   35.546369] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   35.554042] Write of size 1 at addr ffff00009535e0f0 by task kunit_try_catch/246
[   35.561538] 
[   35.563070] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   35.563099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.563107] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.563119] Call trace:
[   35.563125]  show_stack+0x20/0x38 (C)
[   35.563143]  dump_stack_lvl+0x8c/0xd0
[   35.563162]  print_report+0x118/0x608
[   35.563181]  kasan_report+0xdc/0x128
[   35.563200]  __asan_report_store1_noabort+0x20/0x30
[   35.563217]  krealloc_more_oob_helper+0x5c0/0x678
[   35.563236]  krealloc_large_more_oob+0x20/0x38
[   35.563255]  kunit_try_run_case+0x170/0x3f0
[   35.563273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.563295]  kthread+0x328/0x630
[   35.563310]  ret_from_fork+0x10/0x20
[   35.563327] 
[   35.634141] The buggy address belongs to the physical page:
[   35.639788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11535c
[   35.647898] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.655653] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.662707] page_type: f8(unknown)
[   35.666170] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.674014] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.681858] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.689787] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.697716] head: 0bfffe0000000002 fffffdffc254d701 00000000ffffffff 00000000ffffffff
[   35.705645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.713569] page dumped because: kasan: bad access detected
[   35.719218] 
[   35.720750] Memory state around the buggy address:
[   35.725612]  ffff00009535df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.732934]  ffff00009535e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.740255] >ffff00009535e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   35.747570]                                                              ^
[   35.754532]  ffff00009535e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.761852]  ffff00009535e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.769173] ==================================================================
[   33.082823] ==================================================================
[   33.093771] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   33.101448] Write of size 1 at addr ffff00008036eceb by task kunit_try_catch/242
[   33.108947] 
[   33.110481] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   33.110510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.110519] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.110531] Call trace:
[   33.110538]  show_stack+0x20/0x38 (C)
[   33.110556]  dump_stack_lvl+0x8c/0xd0
[   33.110576]  print_report+0x118/0x608
[   33.110595]  kasan_report+0xdc/0x128
[   33.110614]  __asan_report_store1_noabort+0x20/0x30
[   33.110632]  krealloc_more_oob_helper+0x60c/0x678
[   33.110651]  krealloc_more_oob+0x20/0x38
[   33.110668]  kunit_try_run_case+0x170/0x3f0
[   33.110688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.110711]  kthread+0x328/0x630
[   33.110727]  ret_from_fork+0x10/0x20
[   33.110745] 
[   33.181020] Allocated by task 242:
[   33.184488]  kasan_save_stack+0x3c/0x68
[   33.188394]  kasan_save_track+0x20/0x40
[   33.192298]  kasan_save_alloc_info+0x40/0x58
[   33.196643]  __kasan_krealloc+0x118/0x178
[   33.200720]  krealloc_noprof+0x128/0x360
[   33.204713]  krealloc_more_oob_helper+0x168/0x678
[   33.209492]  krealloc_more_oob+0x20/0x38
[   33.213484]  kunit_try_run_case+0x170/0x3f0
[   33.217743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.223312]  kthread+0x328/0x630
[   33.226598]  ret_from_fork+0x10/0x20
[   33.230242] 
[   33.231772] The buggy address belongs to the object at ffff00008036ec00
[   33.231772]  which belongs to the cache kmalloc-256 of size 256
[   33.244434] The buggy address is located 0 bytes to the right of
[   33.244434]  allocated 235-byte region [ffff00008036ec00, ffff00008036eceb)
[   33.257539] 
[   33.259070] The buggy address belongs to the physical page:
[   33.264716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10036c
[   33.272821] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.280578] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.287636] page_type: f5(slab)
[   33.290837] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.298683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.306529] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.314463] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.322395] head: 0bfffe0000000002 fffffdffc200db01 00000000ffffffff 00000000ffffffff
[   33.330328] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.338255] page dumped because: kasan: bad access detected
[   33.343899] 
[   33.345428] Memory state around the buggy address:
[   33.350286]  ffff00008036eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.357600]  ffff00008036ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.364915] >ffff00008036ec80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   33.372227]                                                           ^
[   33.378932]  ffff00008036ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.386246]  ffff00008036ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.393557] ==================================================================
[   33.400951] ==================================================================
[   33.408275] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   33.415946] Write of size 1 at addr ffff00008036ecf0 by task kunit_try_catch/242
[   33.423439] 
[   33.424977] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   33.425005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.425014] Hardware name: Thundercomm Dragonboard 845c (DT)
[   33.425024] Call trace:
[   33.425031]  show_stack+0x20/0x38 (C)
[   33.425050]  dump_stack_lvl+0x8c/0xd0
[   33.425069]  print_report+0x118/0x608
[   33.425090]  kasan_report+0xdc/0x128
[   33.425109]  __asan_report_store1_noabort+0x20/0x30
[   33.425127]  krealloc_more_oob_helper+0x5c0/0x678
[   33.425146]  krealloc_more_oob+0x20/0x38
[   33.425162]  kunit_try_run_case+0x170/0x3f0
[   33.425181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.425201]  kthread+0x328/0x630
[   33.425216]  ret_from_fork+0x10/0x20
[   33.425234] 
[   33.495515] Allocated by task 242:
[   33.498975]  kasan_save_stack+0x3c/0x68
[   33.502883]  kasan_save_track+0x20/0x40
[   33.506790]  kasan_save_alloc_info+0x40/0x58
[   33.511126]  __kasan_krealloc+0x118/0x178
[   33.515206]  krealloc_noprof+0x128/0x360
[   33.519202]  krealloc_more_oob_helper+0x168/0x678
[   33.523981]  krealloc_more_oob+0x20/0x38
[   33.527974]  kunit_try_run_case+0x170/0x3f0
[   33.532223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.537793]  kthread+0x328/0x630
[   33.541083]  ret_from_fork+0x10/0x20
[   33.544720] 
[   33.546250] The buggy address belongs to the object at ffff00008036ec00
[   33.546250]  which belongs to the cache kmalloc-256 of size 256
[   33.558913] The buggy address is located 5 bytes to the right of
[   33.558913]  allocated 235-byte region [ffff00008036ec00, ffff00008036eceb)
[   33.572016] 
[   33.573542] The buggy address belongs to the physical page:
[   33.579189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10036c
[   33.587298] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.595053] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.602105] page_type: f5(slab)
[   33.605309] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.613152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.620995] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   33.628925] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.636853] head: 0bfffe0000000002 fffffdffc200db01 00000000ffffffff 00000000ffffffff
[   33.644781] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.652705] page dumped because: kasan: bad access detected
[   33.658354] 
[   33.659889] Memory state around the buggy address:
[   33.664746]  ffff00008036eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.672070]  ffff00008036ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.679383] >ffff00008036ec80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   33.686704]                                                              ^
[   33.693668]  ffff00008036ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.700988]  ffff00008036ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.708307] ==================================================================

[ 1523.219577] ==================================================================
[ 1523.219598] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[ 1523.219631] Write of size 1 at addr ffff000800d20ef0 by task kunit_try_catch/227
[ 1523.219663] 
[ 1523.219677] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.219735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.219753] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.219773] Call trace:
[ 1523.219784]  show_stack+0x20/0x38 (C)
[ 1523.219820]  dump_stack_lvl+0x8c/0xd0
[ 1523.219857]  print_report+0x118/0x608
[ 1523.219896]  kasan_report+0xdc/0x128
[ 1523.219934]  __asan_report_store1_noabort+0x20/0x30
[ 1523.219970]  krealloc_more_oob_helper+0x5c0/0x678
[ 1523.220010]  krealloc_more_oob+0x20/0x38
[ 1523.220046]  kunit_try_run_case+0x170/0x3f0
[ 1523.220083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.220127]  kthread+0x328/0x630
[ 1523.220156]  ret_from_fork+0x10/0x20
[ 1523.220192] 
[ 1523.220202] Allocated by task 227:
[ 1523.220218]  kasan_save_stack+0x3c/0x68
[ 1523.220250]  kasan_save_track+0x20/0x40
[ 1523.220281]  kasan_save_alloc_info+0x40/0x58
[ 1523.220308]  __kasan_krealloc+0x118/0x178
[ 1523.220340]  krealloc_noprof+0x128/0x360
[ 1523.220371]  krealloc_more_oob_helper+0x168/0x678
[ 1523.220403]  krealloc_more_oob+0x20/0x38
[ 1523.220432]  kunit_try_run_case+0x170/0x3f0
[ 1523.220463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.220500]  kthread+0x328/0x630
[ 1523.220523]  ret_from_fork+0x10/0x20
[ 1523.220551] 
[ 1523.220560] The buggy address belongs to the object at ffff000800d20e00
[ 1523.220560]  which belongs to the cache kmalloc-256 of size 256
[ 1523.220597] The buggy address is located 5 bytes to the right of
[ 1523.220597]  allocated 235-byte region [ffff000800d20e00, ffff000800d20eeb)
[ 1523.220640] 
[ 1523.220650] The buggy address belongs to the physical page:
[ 1523.220667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20
[ 1523.220700] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 1523.220730] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.220762] page_type: f5(slab)
[ 1523.220787] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.220821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.220856] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.220891] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.220926] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff
[ 1523.220960] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[ 1523.220985] page dumped because: kasan: bad access detected
[ 1523.221003] 
[ 1523.221012] Memory state around the buggy address:
[ 1523.221031]  ffff000800d20d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.221059]  ffff000800d20e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1523.221088] >ffff000800d20e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 1523.221112]                                                              ^
[ 1523.221137]  ffff000800d20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.221165]  ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.221189] ==================================================================

[   26.697825] ==================================================================
[   26.698094] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   26.698305] Write of size 1 at addr fff00000c649e0f0 by task kunit_try_catch/172
[   26.698402] 
[   26.698429] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.698509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.698533] Hardware name: linux,dummy-virt (DT)
[   26.698561] Call trace:
[   26.698731]  show_stack+0x20/0x38 (C)
[   26.698976]  dump_stack_lvl+0x8c/0xd0
[   26.699175]  print_report+0x118/0x608
[   26.699290]  kasan_report+0xdc/0x128
[   26.699368]  __asan_report_store1_noabort+0x20/0x30
[   26.699415]  krealloc_more_oob_helper+0x5c0/0x678
[   26.699469]  krealloc_large_more_oob+0x20/0x38
[   26.699554]  kunit_try_run_case+0x170/0x3f0
[   26.699817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.700856]  kthread+0x328/0x630
[   26.701184]  ret_from_fork+0x10/0x20
[   26.701361] 
[   26.701676] The buggy address belongs to the physical page:
[   26.701757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.702485] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.702705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.703390] page_type: f8(unknown)
[   26.703536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.704023] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.704259] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.704306] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.705353] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.705544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.705633] page dumped because: kasan: bad access detected
[   26.705663] 
[   26.706177] Memory state around the buggy address:
[   26.706244]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.706791]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.707417] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   26.707767]                                                              ^
[   26.707813]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.708095]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.708133] ==================================================================
[   26.628468] ==================================================================
[   26.628514] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   26.628583] Write of size 1 at addr fff00000c1c40af0 by task kunit_try_catch/168
[   26.628828] 
[   26.628862] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.628943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.628968] Hardware name: linux,dummy-virt (DT)
[   26.628996] Call trace:
[   26.629026]  show_stack+0x20/0x38 (C)
[   26.629086]  dump_stack_lvl+0x8c/0xd0
[   26.629131]  print_report+0x118/0x608
[   26.629176]  kasan_report+0xdc/0x128
[   26.629220]  __asan_report_store1_noabort+0x20/0x30
[   26.629276]  krealloc_more_oob_helper+0x5c0/0x678
[   26.629408]  krealloc_more_oob+0x20/0x38
[   26.629453]  kunit_try_run_case+0x170/0x3f0
[   26.629498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.629549]  kthread+0x328/0x630
[   26.629589]  ret_from_fork+0x10/0x20
[   26.629643] 
[   26.629661] Allocated by task 168:
[   26.629686]  kasan_save_stack+0x3c/0x68
[   26.629724]  kasan_save_track+0x20/0x40
[   26.629760]  kasan_save_alloc_info+0x40/0x58
[   26.629794]  __kasan_krealloc+0x118/0x178
[   26.629830]  krealloc_noprof+0x128/0x360
[   26.629865]  krealloc_more_oob_helper+0x168/0x678
[   26.630013]  krealloc_more_oob+0x20/0x38
[   26.630048]  kunit_try_run_case+0x170/0x3f0
[   26.630134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.630255]  kthread+0x328/0x630
[   26.630339]  ret_from_fork+0x10/0x20
[   26.630536] 
[   26.630554] The buggy address belongs to the object at fff00000c1c40a00
[   26.630554]  which belongs to the cache kmalloc-256 of size 256
[   26.630613] The buggy address is located 5 bytes to the right of
[   26.630613]  allocated 235-byte region [fff00000c1c40a00, fff00000c1c40aeb)
[   26.630879] 
[   26.630898] The buggy address belongs to the physical page:
[   26.630926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.630980] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.631579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.631741] page_type: f5(slab)
[   26.631865] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.631914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.631961] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.632007] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.632061] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.632107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.632145] page dumped because: kasan: bad access detected
[   26.632173] 
[   26.632190] Memory state around the buggy address:
[   26.632218]  fff00000c1c40980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.632258]  fff00000c1c40a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.632297] >fff00000c1c40a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   26.632383]                                                              ^
[   26.632420]  fff00000c1c40b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.632461]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.632564] ==================================================================
[   26.693611] ==================================================================
[   26.693673] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   26.693856] Write of size 1 at addr fff00000c649e0eb by task kunit_try_catch/172
[   26.693919] 
[   26.694033] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.694204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.694229] Hardware name: linux,dummy-virt (DT)
[   26.694258] Call trace:
[   26.694279]  show_stack+0x20/0x38 (C)
[   26.694329]  dump_stack_lvl+0x8c/0xd0
[   26.694377]  print_report+0x118/0x608
[   26.694422]  kasan_report+0xdc/0x128
[   26.694476]  __asan_report_store1_noabort+0x20/0x30
[   26.694524]  krealloc_more_oob_helper+0x60c/0x678
[   26.694573]  krealloc_large_more_oob+0x20/0x38
[   26.694681]  kunit_try_run_case+0x170/0x3f0
[   26.695174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.695410]  kthread+0x328/0x630
[   26.695515]  ret_from_fork+0x10/0x20
[   26.695639] 
[   26.695659] The buggy address belongs to the physical page:
[   26.695689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c
[   26.695741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.695793] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.695844] page_type: f8(unknown)
[   26.695882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.695930] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.695977] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.696395] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.696446] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff
[   26.696493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.696546] page dumped because: kasan: bad access detected
[   26.696626] 
[   26.696673] Memory state around the buggy address:
[   26.696740]  fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.696865]  fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.696969] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   26.697140]                                                           ^
[   26.697273]  fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.697315]  fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.697649] ==================================================================
[   26.624607] ==================================================================
[   26.624665] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   26.624760] Write of size 1 at addr fff00000c1c40aeb by task kunit_try_catch/168
[   26.624938] 
[   26.624969] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.625064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.625089] Hardware name: linux,dummy-virt (DT)
[   26.625128] Call trace:
[   26.625149]  show_stack+0x20/0x38 (C)
[   26.625198]  dump_stack_lvl+0x8c/0xd0
[   26.625244]  print_report+0x118/0x608
[   26.625289]  kasan_report+0xdc/0x128
[   26.625334]  __asan_report_store1_noabort+0x20/0x30
[   26.625508]  krealloc_more_oob_helper+0x60c/0x678
[   26.625559]  krealloc_more_oob+0x20/0x38
[   26.625605]  kunit_try_run_case+0x170/0x3f0
[   26.625662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.625714]  kthread+0x328/0x630
[   26.625755]  ret_from_fork+0x10/0x20
[   26.625802] 
[   26.625819] Allocated by task 168:
[   26.625846]  kasan_save_stack+0x3c/0x68
[   26.625886]  kasan_save_track+0x20/0x40
[   26.625922]  kasan_save_alloc_info+0x40/0x58
[   26.626016]  __kasan_krealloc+0x118/0x178
[   26.626063]  krealloc_noprof+0x128/0x360
[   26.626139]  krealloc_more_oob_helper+0x168/0x678
[   26.626217]  krealloc_more_oob+0x20/0x38
[   26.626254]  kunit_try_run_case+0x170/0x3f0
[   26.626291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.626332]  kthread+0x328/0x630
[   26.626363]  ret_from_fork+0x10/0x20
[   26.626397] 
[   26.626415] The buggy address belongs to the object at fff00000c1c40a00
[   26.626415]  which belongs to the cache kmalloc-256 of size 256
[   26.626528] The buggy address is located 0 bytes to the right of
[   26.626528]  allocated 235-byte region [fff00000c1c40a00, fff00000c1c40aeb)
[   26.626688] 
[   26.626732] The buggy address belongs to the physical page:
[   26.626900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40
[   26.627079] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.627124] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.627174] page_type: f5(slab)
[   26.627211] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.627259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.627306] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   26.627353] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.627399] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff
[   26.627445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.627483] page dumped because: kasan: bad access detected
[   26.627512] 
[   26.627529] Memory state around the buggy address:
[   26.627570]  fff00000c1c40980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.627611]  fff00000c1c40a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.627651] >fff00000c1c40a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   26.627733]                                                           ^
[   26.627836]  fff00000c1c40b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.627878]  fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.627949] ==================================================================

[   21.801089] ==================================================================
[   21.801427] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   21.801750] Write of size 1 at addr ffff888103aaa6f0 by task kunit_try_catch/185
[   21.802041] 
[   21.802156] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   21.802214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.802288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.802311] Call Trace:
[   21.802324]  <TASK>
[   21.802342]  dump_stack_lvl+0x73/0xb0
[   21.802370]  print_report+0xd1/0x650
[   21.802391]  ? __virt_addr_valid+0x1db/0x2d0
[   21.802413]  ? krealloc_more_oob_helper+0x7eb/0x930
[   21.802435]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.802471]  ? krealloc_more_oob_helper+0x7eb/0x930
[   21.802493]  kasan_report+0x141/0x180
[   21.802513]  ? krealloc_more_oob_helper+0x7eb/0x930
[   21.802551]  __asan_report_store1_noabort+0x1b/0x30
[   21.802574]  krealloc_more_oob_helper+0x7eb/0x930
[   21.802594]  ? __schedule+0x10cc/0x2b60
[   21.802619]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.802641]  ? finish_task_switch.isra.0+0x153/0x700
[   21.802662]  ? __switch_to+0x47/0xf50
[   21.802687]  ? __schedule+0x10cc/0x2b60
[   21.802709]  ? __pfx_read_tsc+0x10/0x10
[   21.802732]  krealloc_more_oob+0x1c/0x30
[   21.802761]  kunit_try_run_case+0x1a5/0x480
[   21.802822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.802846]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.802870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.802894]  ? __kthread_parkme+0x82/0x180
[   21.802913]  ? preempt_count_sub+0x50/0x80
[   21.802936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.802959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.802981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.803004]  kthread+0x337/0x6f0
[   21.803047]  ? trace_preempt_on+0x20/0xc0
[   21.803077]  ? __pfx_kthread+0x10/0x10
[   21.803097]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.803131]  ? calculate_sigpending+0x7b/0xa0
[   21.803154]  ? __pfx_kthread+0x10/0x10
[   21.803175]  ret_from_fork+0x116/0x1d0
[   21.803193]  ? __pfx_kthread+0x10/0x10
[   21.803213]  ret_from_fork_asm+0x1a/0x30
[   21.803251]  </TASK>
[   21.803262] 
[   21.811322] Allocated by task 185:
[   21.811762]  kasan_save_stack+0x45/0x70
[   21.811980]  kasan_save_track+0x18/0x40
[   21.812167]  kasan_save_alloc_info+0x3b/0x50
[   21.812458]  __kasan_krealloc+0x190/0x1f0
[   21.812620]  krealloc_noprof+0xf3/0x340
[   21.812878]  krealloc_more_oob_helper+0x1a9/0x930
[   21.813119]  krealloc_more_oob+0x1c/0x30
[   21.813272]  kunit_try_run_case+0x1a5/0x480
[   21.813487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.813710]  kthread+0x337/0x6f0
[   21.813901]  ret_from_fork+0x116/0x1d0
[   21.814169]  ret_from_fork_asm+0x1a/0x30
[   21.814369] 
[   21.814462] The buggy address belongs to the object at ffff888103aaa600
[   21.814462]  which belongs to the cache kmalloc-256 of size 256
[   21.814977] The buggy address is located 5 bytes to the right of
[   21.814977]  allocated 235-byte region [ffff888103aaa600, ffff888103aaa6eb)
[   21.815364] 
[   21.815439] The buggy address belongs to the physical page:
[   21.815676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aaa
[   21.816661] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.817016] flags: 0x200000000000040(head|node=0|zone=2)
[   21.817309] page_type: f5(slab)
[   21.817450] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.817674] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.818162] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.818514] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.818914] head: 0200000000000001 ffffea00040eaa81 00000000ffffffff 00000000ffffffff
[   21.819331] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.819668] page dumped because: kasan: bad access detected
[   21.819950] 
[   21.820051] Memory state around the buggy address:
[   21.820269]  ffff888103aaa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.820561]  ffff888103aaa600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.820971] >ffff888103aaa680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.821536]                                                              ^
[   21.821924]  ffff888103aaa700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.822283]  ffff888103aaa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.822603] ==================================================================
[   21.962499] ==================================================================
[   21.962997] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   21.963569] Write of size 1 at addr ffff888102c8e0f0 by task kunit_try_catch/189
[   21.964100] 
[   21.964207] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   21.964277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.964289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.964311] Call Trace:
[   21.964325]  <TASK>
[   21.964343]  dump_stack_lvl+0x73/0xb0
[   21.964373]  print_report+0xd1/0x650
[   21.964405]  ? __virt_addr_valid+0x1db/0x2d0
[   21.964429]  ? krealloc_more_oob_helper+0x7eb/0x930
[   21.964452]  ? kasan_addr_to_slab+0x11/0xa0
[   21.964481]  ? krealloc_more_oob_helper+0x7eb/0x930
[   21.964504]  kasan_report+0x141/0x180
[   21.964525]  ? krealloc_more_oob_helper+0x7eb/0x930
[   21.964552]  __asan_report_store1_noabort+0x1b/0x30
[   21.964575]  krealloc_more_oob_helper+0x7eb/0x930
[   21.964596]  ? __schedule+0x10cc/0x2b60
[   21.964619]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.964644]  ? __kasan_check_write+0x18/0x20
[   21.964665]  ? queued_spin_lock_slowpath+0x116/0xb40
[   21.964691]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   21.964716]  ? __pfx_read_tsc+0x10/0x10
[   21.964740]  krealloc_large_more_oob+0x1c/0x30
[   21.964770]  kunit_try_run_case+0x1a5/0x480
[   21.964794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.964816]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   21.964859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.964883]  ? __kthread_parkme+0x82/0x180
[   21.964903]  ? preempt_count_sub+0x50/0x80
[   21.964925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.964948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.965016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.965051]  kthread+0x337/0x6f0
[   21.965070]  ? trace_preempt_on+0x20/0xc0
[   21.965093]  ? __pfx_kthread+0x10/0x10
[   21.965112]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.965135]  ? calculate_sigpending+0x7b/0xa0
[   21.965159]  ? __pfx_kthread+0x10/0x10
[   21.965179]  ret_from_fork+0x116/0x1d0
[   21.965198]  ? __pfx_kthread+0x10/0x10
[   21.965217]  ret_from_fork_asm+0x1a/0x30
[   21.965255]  </TASK>
[   21.965267] 
[   21.974331] The buggy address belongs to the physical page:
[   21.974598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8c
[   21.974874] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.975237] flags: 0x200000000000040(head|node=0|zone=2)
[   21.975439] page_type: f8(unknown)
[   21.975742] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.976208] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.976531] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.976936] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.977246] head: 0200000000000002 ffffea00040b2301 00000000ffffffff 00000000ffffffff
[   21.977470] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.977986] page dumped because: kasan: bad access detected
[   21.978334] 
[   21.978398] Memory state around the buggy address:
[   21.978548]  ffff888102c8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.978754]  ffff888102c8e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.979595] >ffff888102c8e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.980084]                                                              ^
[   21.980417]  ffff888102c8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.980689]  ffff888102c8e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.981139] ==================================================================
[   21.943244] ==================================================================
[   21.943677] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   21.944361] Write of size 1 at addr ffff888102c8e0eb by task kunit_try_catch/189
[   21.944693] 
[   21.944798] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   21.944849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.944861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.944884] Call Trace:
[   21.944898]  <TASK>
[   21.944917]  dump_stack_lvl+0x73/0xb0
[   21.944989]  print_report+0xd1/0x650
[   21.945014]  ? __virt_addr_valid+0x1db/0x2d0
[   21.945037]  ? krealloc_more_oob_helper+0x821/0x930
[   21.945084]  ? kasan_addr_to_slab+0x11/0xa0
[   21.945103]  ? krealloc_more_oob_helper+0x821/0x930
[   21.945125]  kasan_report+0x141/0x180
[   21.945146]  ? krealloc_more_oob_helper+0x821/0x930
[   21.945173]  __asan_report_store1_noabort+0x1b/0x30
[   21.945196]  krealloc_more_oob_helper+0x821/0x930
[   21.945217]  ? __schedule+0x10cc/0x2b60
[   21.945260]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.945284]  ? __kasan_check_write+0x18/0x20
[   21.945306]  ? queued_spin_lock_slowpath+0x116/0xb40
[   21.945343]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   21.945368]  ? __pfx_read_tsc+0x10/0x10
[   21.945393]  krealloc_large_more_oob+0x1c/0x30
[   21.945414]  kunit_try_run_case+0x1a5/0x480
[   21.945447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.945469]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   21.945492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.945527]  ? __kthread_parkme+0x82/0x180
[   21.945547]  ? preempt_count_sub+0x50/0x80
[   21.945569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.945592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.945614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.945636]  kthread+0x337/0x6f0
[   21.945655]  ? trace_preempt_on+0x20/0xc0
[   21.945677]  ? __pfx_kthread+0x10/0x10
[   21.945697]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.945720]  ? calculate_sigpending+0x7b/0xa0
[   21.945743]  ? __pfx_kthread+0x10/0x10
[   21.945763]  ret_from_fork+0x116/0x1d0
[   21.945782]  ? __pfx_kthread+0x10/0x10
[   21.945844]  ret_from_fork_asm+0x1a/0x30
[   21.945875]  </TASK>
[   21.945887] 
[   21.954006] The buggy address belongs to the physical page:
[   21.954313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8c
[   21.954677] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.954994] flags: 0x200000000000040(head|node=0|zone=2)
[   21.955344] page_type: f8(unknown)
[   21.955519] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.955793] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.956151] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.956547] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.956921] head: 0200000000000002 ffffea00040b2301 00000000ffffffff 00000000ffffffff
[   21.957245] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.957625] page dumped because: kasan: bad access detected
[   21.957931] 
[   21.957994] Memory state around the buggy address:
[   21.958141]  ffff888102c8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.958356]  ffff888102c8e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.958812] >ffff888102c8e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.959256]                                                           ^
[   21.959461]  ffff888102c8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.959670]  ffff888102c8e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.960140] ==================================================================
[   21.772929] ==================================================================
[   21.773540] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   21.774030] Write of size 1 at addr ffff888103aaa6eb by task kunit_try_catch/185
[   21.774535] 
[   21.774626] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   21.774714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.774727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.774751] Call Trace:
[   21.774777]  <TASK>
[   21.774796]  dump_stack_lvl+0x73/0xb0
[   21.774827]  print_report+0xd1/0x650
[   21.774862]  ? __virt_addr_valid+0x1db/0x2d0
[   21.774885]  ? krealloc_more_oob_helper+0x821/0x930
[   21.774908]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.775057]  ? krealloc_more_oob_helper+0x821/0x930
[   21.775081]  kasan_report+0x141/0x180
[   21.775103]  ? krealloc_more_oob_helper+0x821/0x930
[   21.775141]  __asan_report_store1_noabort+0x1b/0x30
[   21.775164]  krealloc_more_oob_helper+0x821/0x930
[   21.775206]  ? __schedule+0x10cc/0x2b60
[   21.775240]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.775263]  ? finish_task_switch.isra.0+0x153/0x700
[   21.775284]  ? __switch_to+0x47/0xf50
[   21.775312]  ? __schedule+0x10cc/0x2b60
[   21.775334]  ? __pfx_read_tsc+0x10/0x10
[   21.775358]  krealloc_more_oob+0x1c/0x30
[   21.775378]  kunit_try_run_case+0x1a5/0x480
[   21.775403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.775425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.775448]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.775472]  ? __kthread_parkme+0x82/0x180
[   21.775492]  ? preempt_count_sub+0x50/0x80
[   21.775513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.775536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.775559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.775581]  kthread+0x337/0x6f0
[   21.775601]  ? trace_preempt_on+0x20/0xc0
[   21.775623]  ? __pfx_kthread+0x10/0x10
[   21.775645]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.775667]  ? calculate_sigpending+0x7b/0xa0
[   21.775691]  ? __pfx_kthread+0x10/0x10
[   21.775713]  ret_from_fork+0x116/0x1d0
[   21.775734]  ? __pfx_kthread+0x10/0x10
[   21.775755]  ret_from_fork_asm+0x1a/0x30
[   21.775802]  </TASK>
[   21.775814] 
[   21.787116] Allocated by task 185:
[   21.787515]  kasan_save_stack+0x45/0x70
[   21.787807]  kasan_save_track+0x18/0x40
[   21.788164]  kasan_save_alloc_info+0x3b/0x50
[   21.788480]  __kasan_krealloc+0x190/0x1f0
[   21.788633]  krealloc_noprof+0xf3/0x340
[   21.788940]  krealloc_more_oob_helper+0x1a9/0x930
[   21.789626]  krealloc_more_oob+0x1c/0x30
[   21.789829]  kunit_try_run_case+0x1a5/0x480
[   21.790267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.790519]  kthread+0x337/0x6f0
[   21.790667]  ret_from_fork+0x116/0x1d0
[   21.791086]  ret_from_fork_asm+0x1a/0x30
[   21.791382] 
[   21.791472] The buggy address belongs to the object at ffff888103aaa600
[   21.791472]  which belongs to the cache kmalloc-256 of size 256
[   21.792260] The buggy address is located 0 bytes to the right of
[   21.792260]  allocated 235-byte region [ffff888103aaa600, ffff888103aaa6eb)
[   21.792818] 
[   21.793232] The buggy address belongs to the physical page:
[   21.793441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aaa
[   21.794044] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.794358] flags: 0x200000000000040(head|node=0|zone=2)
[   21.794613] page_type: f5(slab)
[   21.794766] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.795426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.795785] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.796265] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.796573] head: 0200000000000001 ffffea00040eaa81 00000000ffffffff 00000000ffffffff
[   21.796920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.797353] page dumped because: kasan: bad access detected
[   21.797576] 
[   21.797666] Memory state around the buggy address:
[   21.797967]  ffff888103aaa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.798372]  ffff888103aaa600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.798649] >ffff888103aaa680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.799041]                                                           ^
[   21.799423]  ffff888103aaa700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.799720]  ffff888103aaa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.800087] ==================================================================