Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.733896] ==================================================================
[   30.733960] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.734259] Write of size 1 at addr fff00000c99d60c9 by task kunit_try_catch/195
[   30.734386] 
[   30.734449] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.734563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.734590] Hardware name: linux,dummy-virt (DT)
[   30.734772] Call trace:
[   30.734832]  show_stack+0x20/0x38 (C)
[   30.734893]  dump_stack_lvl+0x8c/0xd0
[   30.734951]  print_report+0x118/0x608
[   30.735298]  kasan_report+0xdc/0x128
[   30.735369]  __asan_report_store1_noabort+0x20/0x30
[   30.735573]  krealloc_less_oob_helper+0xa48/0xc50
[   30.735648]  krealloc_large_less_oob+0x20/0x38
[   30.735696]  kunit_try_run_case+0x170/0x3f0
[   30.735753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.735806]  kthread+0x328/0x630
[   30.736010]  ret_from_fork+0x10/0x20
[   30.736259] 
[   30.736347] The buggy address belongs to the physical page:
[   30.736417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099d4
[   30.736551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.736608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.736729] page_type: f8(unknown)
[   30.736789] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.736865] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.737158] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.737237] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.737431] head: 0bfffe0000000002 ffffc1ffc3267501 00000000ffffffff 00000000ffffffff
[   30.737520] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.737648] page dumped because: kasan: bad access detected
[   30.737706] 
[   30.738052] Memory state around the buggy address:
[   30.738132]  fff00000c99d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.738226]  fff00000c99d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.738384] >fff00000c99d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.738637]                                               ^
[   30.738757]  fff00000c99d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.738821]  fff00000c99d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.738921] ==================================================================
[   30.701607] ==================================================================
[   30.701709] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.701866] Write of size 1 at addr fff00000c8f6faeb by task kunit_try_catch/191
[   30.702013] 
[   30.702047] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.702131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.702375] Hardware name: linux,dummy-virt (DT)
[   30.702422] Call trace:
[   30.702763]  show_stack+0x20/0x38 (C)
[   30.702834]  dump_stack_lvl+0x8c/0xd0
[   30.702883]  print_report+0x118/0x608
[   30.703000]  kasan_report+0xdc/0x128
[   30.703079]  __asan_report_store1_noabort+0x20/0x30
[   30.703136]  krealloc_less_oob_helper+0xa58/0xc50
[   30.703275]  krealloc_less_oob+0x20/0x38
[   30.703321]  kunit_try_run_case+0x170/0x3f0
[   30.703368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.703465]  kthread+0x328/0x630
[   30.703512]  ret_from_fork+0x10/0x20
[   30.703571] 
[   30.703882] Allocated by task 191:
[   30.703948]  kasan_save_stack+0x3c/0x68
[   30.704114]  kasan_save_track+0x20/0x40
[   30.704192]  kasan_save_alloc_info+0x40/0x58
[   30.704317]  __kasan_krealloc+0x118/0x178
[   30.704396]  krealloc_noprof+0x128/0x360
[   30.704510]  krealloc_less_oob_helper+0x168/0xc50
[   30.704552]  krealloc_less_oob+0x20/0x38
[   30.704613]  kunit_try_run_case+0x170/0x3f0
[   30.704657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.704949]  kthread+0x328/0x630
[   30.705133]  ret_from_fork+0x10/0x20
[   30.705204] 
[   30.705254] The buggy address belongs to the object at fff00000c8f6fa00
[   30.705254]  which belongs to the cache kmalloc-256 of size 256
[   30.705424] The buggy address is located 34 bytes to the right of
[   30.705424]  allocated 201-byte region [fff00000c8f6fa00, fff00000c8f6fac9)
[   30.705511] 
[   30.705586] The buggy address belongs to the physical page:
[   30.705634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e
[   30.706182] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.706255] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.706377] page_type: f5(slab)
[   30.706665] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.706827] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.706916] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.707110] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.707188] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff
[   30.707332] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.707372] page dumped because: kasan: bad access detected
[   30.707429] 
[   30.707619] Memory state around the buggy address:
[   30.707684]  fff00000c8f6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.707862]  fff00000c8f6fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.707947] >fff00000c8f6fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.708085]                                                           ^
[   30.708152]  fff00000c8f6fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.708248]  fff00000c8f6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.708305] ==================================================================
[   30.694311] ==================================================================
[   30.694356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.694404] Write of size 1 at addr fff00000c8f6faea by task kunit_try_catch/191
[   30.694453] 
[   30.694481] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.694563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.694589] Hardware name: linux,dummy-virt (DT)
[   30.694637] Call trace:
[   30.694659]  show_stack+0x20/0x38 (C)
[   30.694706]  dump_stack_lvl+0x8c/0xd0
[   30.694758]  print_report+0x118/0x608
[   30.694805]  kasan_report+0xdc/0x128
[   30.694851]  __asan_report_store1_noabort+0x20/0x30
[   30.694899]  krealloc_less_oob_helper+0xae4/0xc50
[   30.695349]  krealloc_less_oob+0x20/0x38
[   30.695404]  kunit_try_run_case+0x170/0x3f0
[   30.695463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.695518]  kthread+0x328/0x630
[   30.695988]  ret_from_fork+0x10/0x20
[   30.696079] 
[   30.696114] Allocated by task 191:
[   30.696349]  kasan_save_stack+0x3c/0x68
[   30.696454]  kasan_save_track+0x20/0x40
[   30.696624]  kasan_save_alloc_info+0x40/0x58
[   30.696705]  __kasan_krealloc+0x118/0x178
[   30.696795]  krealloc_noprof+0x128/0x360
[   30.696888]  krealloc_less_oob_helper+0x168/0xc50
[   30.696965]  krealloc_less_oob+0x20/0x38
[   30.697163]  kunit_try_run_case+0x170/0x3f0
[   30.697335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.697420]  kthread+0x328/0x630
[   30.697602]  ret_from_fork+0x10/0x20
[   30.697670] 
[   30.697718] The buggy address belongs to the object at fff00000c8f6fa00
[   30.697718]  which belongs to the cache kmalloc-256 of size 256
[   30.697867] The buggy address is located 33 bytes to the right of
[   30.697867]  allocated 201-byte region [fff00000c8f6fa00, fff00000c8f6fac9)
[   30.697971] 
[   30.698332] The buggy address belongs to the physical page:
[   30.698391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e
[   30.698519] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.698585] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.698694] page_type: f5(slab)
[   30.698753] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.698847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.699032] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.699095] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.699446] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff
[   30.699518] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.699642] page dumped because: kasan: bad access detected
[   30.699712] 
[   30.699832] Memory state around the buggy address:
[   30.699898]  fff00000c8f6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.699954]  fff00000c8f6fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.700211] >fff00000c8f6fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.700275]                                                           ^
[   30.700523]  fff00000c8f6fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.700610]  fff00000c8f6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.700660] ==================================================================
[   30.673382] ==================================================================
[   30.673436] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.673487] Write of size 1 at addr fff00000c8f6fac9 by task kunit_try_catch/191
[   30.673536] 
[   30.673566] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.673649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.673675] Hardware name: linux,dummy-virt (DT)
[   30.673706] Call trace:
[   30.673727]  show_stack+0x20/0x38 (C)
[   30.673774]  dump_stack_lvl+0x8c/0xd0
[   30.673821]  print_report+0x118/0x608
[   30.673868]  kasan_report+0xdc/0x128
[   30.673914]  __asan_report_store1_noabort+0x20/0x30
[   30.674085]  krealloc_less_oob_helper+0xa48/0xc50
[   30.674251]  krealloc_less_oob+0x20/0x38
[   30.674312]  kunit_try_run_case+0x170/0x3f0
[   30.674360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.674421]  kthread+0x328/0x630
[   30.674464]  ret_from_fork+0x10/0x20
[   30.674560] 
[   30.674580] Allocated by task 191:
[   30.674619]  kasan_save_stack+0x3c/0x68
[   30.674662]  kasan_save_track+0x20/0x40
[   30.674707]  kasan_save_alloc_info+0x40/0x58
[   30.674752]  __kasan_krealloc+0x118/0x178
[   30.674790]  krealloc_noprof+0x128/0x360
[   30.674827]  krealloc_less_oob_helper+0x168/0xc50
[   30.674876]  krealloc_less_oob+0x20/0x38
[   30.674914]  kunit_try_run_case+0x170/0x3f0
[   30.674963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.675011]  kthread+0x328/0x630
[   30.675044]  ret_from_fork+0x10/0x20
[   30.675080] 
[   30.675099] The buggy address belongs to the object at fff00000c8f6fa00
[   30.675099]  which belongs to the cache kmalloc-256 of size 256
[   30.675163] The buggy address is located 0 bytes to the right of
[   30.675163]  allocated 201-byte region [fff00000c8f6fa00, fff00000c8f6fac9)
[   30.675226] 
[   30.675254] The buggy address belongs to the physical page:
[   30.675285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e
[   30.675336] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.675383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.675441] page_type: f5(slab)
[   30.675479] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.675529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.675577] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.675646] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.675695] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff
[   30.675742] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.675780] page dumped because: kasan: bad access detected
[   30.675810] 
[   30.675828] Memory state around the buggy address:
[   30.675859]  fff00000c8f6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.675908]  fff00000c8f6fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.676513] >fff00000c8f6fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.676557]                                               ^
[   30.676596]  fff00000c8f6fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.676638]  fff00000c8f6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.676676] ==================================================================
[   30.740694] ==================================================================
[   30.740808] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.741076] Write of size 1 at addr fff00000c99d60d0 by task kunit_try_catch/195
[   30.741208] 
[   30.741259] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.741537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.741571] Hardware name: linux,dummy-virt (DT)
[   30.741603] Call trace:
[   30.741862]  show_stack+0x20/0x38 (C)
[   30.742051]  dump_stack_lvl+0x8c/0xd0
[   30.742109]  print_report+0x118/0x608
[   30.742448]  kasan_report+0xdc/0x128
[   30.742589]  __asan_report_store1_noabort+0x20/0x30
[   30.742661]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.742718]  krealloc_large_less_oob+0x20/0x38
[   30.742833]  kunit_try_run_case+0x170/0x3f0
[   30.742900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.743014]  kthread+0x328/0x630
[   30.743059]  ret_from_fork+0x10/0x20
[   30.743127] 
[   30.743148] The buggy address belongs to the physical page:
[   30.743185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099d4
[   30.743361] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.743419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.743470] page_type: f8(unknown)
[   30.743508] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.743740] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.743869] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.743917] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.743981] head: 0bfffe0000000002 ffffc1ffc3267501 00000000ffffffff 00000000ffffffff
[   30.744334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.744488] page dumped because: kasan: bad access detected
[   30.744549] 
[   30.744600] Memory state around the buggy address:
[   30.744715]  fff00000c99d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.744782]  fff00000c99d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.744831] >fff00000c99d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.744894]                                                  ^
[   30.745144]  fff00000c99d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.745399]  fff00000c99d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.745489] ==================================================================
[   30.756613] ==================================================================
[   30.756659] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.756707] Write of size 1 at addr fff00000c99d60eb by task kunit_try_catch/195
[   30.757057] 
[   30.757163] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.757571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.757614] Hardware name: linux,dummy-virt (DT)
[   30.757662] Call trace:
[   30.757704]  show_stack+0x20/0x38 (C)
[   30.757756]  dump_stack_lvl+0x8c/0xd0
[   30.757804]  print_report+0x118/0x608
[   30.757882]  kasan_report+0xdc/0x128
[   30.757955]  __asan_report_store1_noabort+0x20/0x30
[   30.758120]  krealloc_less_oob_helper+0xa58/0xc50
[   30.758175]  krealloc_large_less_oob+0x20/0x38
[   30.758265]  kunit_try_run_case+0x170/0x3f0
[   30.758317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.758696]  kthread+0x328/0x630
[   30.758824]  ret_from_fork+0x10/0x20
[   30.758901] 
[   30.758951] The buggy address belongs to the physical page:
[   30.758989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099d4
[   30.759042] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.759120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.759170] page_type: f8(unknown)
[   30.759207] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.759265] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.759314] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.759361] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.759409] head: 0bfffe0000000002 ffffc1ffc3267501 00000000ffffffff 00000000ffffffff
[   30.759467] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.759515] page dumped because: kasan: bad access detected
[   30.759918] 
[   30.759959] Memory state around the buggy address:
[   30.759992]  fff00000c99d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.760056]  fff00000c99d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.760108] >fff00000c99d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.760486]                                                           ^
[   30.760540]  fff00000c99d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.760622]  fff00000c99d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.760691] ==================================================================
[   30.687436] ==================================================================
[   30.687485] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.687534] Write of size 1 at addr fff00000c8f6fada by task kunit_try_catch/191
[   30.687837] 
[   30.687985] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.688187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.688361] Hardware name: linux,dummy-virt (DT)
[   30.688428] Call trace:
[   30.688543]  show_stack+0x20/0x38 (C)
[   30.688619]  dump_stack_lvl+0x8c/0xd0
[   30.688719]  print_report+0x118/0x608
[   30.688787]  kasan_report+0xdc/0x128
[   30.688939]  __asan_report_store1_noabort+0x20/0x30
[   30.689013]  krealloc_less_oob_helper+0xa80/0xc50
[   30.689203]  krealloc_less_oob+0x20/0x38
[   30.689421]  kunit_try_run_case+0x170/0x3f0
[   30.689499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.689840]  kthread+0x328/0x630
[   30.689948]  ret_from_fork+0x10/0x20
[   30.690045] 
[   30.690221] Allocated by task 191:
[   30.690421]  kasan_save_stack+0x3c/0x68
[   30.690625]  kasan_save_track+0x20/0x40
[   30.690975]  kasan_save_alloc_info+0x40/0x58
[   30.691047]  __kasan_krealloc+0x118/0x178
[   30.691155]  krealloc_noprof+0x128/0x360
[   30.691235]  krealloc_less_oob_helper+0x168/0xc50
[   30.691304]  krealloc_less_oob+0x20/0x38
[   30.691613]  kunit_try_run_case+0x170/0x3f0
[   30.691740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.691839]  kthread+0x328/0x630
[   30.691887]  ret_from_fork+0x10/0x20
[   30.691939] 
[   30.692101] The buggy address belongs to the object at fff00000c8f6fa00
[   30.692101]  which belongs to the cache kmalloc-256 of size 256
[   30.692284] The buggy address is located 17 bytes to the right of
[   30.692284]  allocated 201-byte region [fff00000c8f6fa00, fff00000c8f6fac9)
[   30.692438] 
[   30.692490] The buggy address belongs to the physical page:
[   30.692528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e
[   30.692783] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.692852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.693082] page_type: f5(slab)
[   30.693153] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.693211] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.693307] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.693357] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.693405] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff
[   30.693469] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.693516] page dumped because: kasan: bad access detected
[   30.693547] 
[   30.693565] Memory state around the buggy address:
[   30.693595]  fff00000c8f6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.693636]  fff00000c8f6fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.693677] >fff00000c8f6fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.693733]                                                     ^
[   30.693770]  fff00000c8f6fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.693820]  fff00000c8f6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.693871] ==================================================================
[   30.745993] ==================================================================
[   30.746037] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.746082] Write of size 1 at addr fff00000c99d60da by task kunit_try_catch/195
[   30.746293] 
[   30.746335] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.746421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.746449] Hardware name: linux,dummy-virt (DT)
[   30.746478] Call trace:
[   30.746524]  show_stack+0x20/0x38 (C)
[   30.746576]  dump_stack_lvl+0x8c/0xd0
[   30.746631]  print_report+0x118/0x608
[   30.746679]  kasan_report+0xdc/0x128
[   30.746725]  __asan_report_store1_noabort+0x20/0x30
[   30.746773]  krealloc_less_oob_helper+0xa80/0xc50
[   30.746837]  krealloc_large_less_oob+0x20/0x38
[   30.746885]  kunit_try_run_case+0x170/0x3f0
[   30.746943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.746996]  kthread+0x328/0x630
[   30.747038]  ret_from_fork+0x10/0x20
[   30.747085] 
[   30.747104] The buggy address belongs to the physical page:
[   30.747143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099d4
[   30.747202] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.747250] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.747299] page_type: f8(unknown)
[   30.747336] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.747383] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.747431] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.747477] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.747526] head: 0bfffe0000000002 ffffc1ffc3267501 00000000ffffffff 00000000ffffffff
[   30.748139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.748185] page dumped because: kasan: bad access detected
[   30.748229] 
[   30.748259] Memory state around the buggy address:
[   30.748292]  fff00000c99d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.748871]  fff00000c99d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.749077] >fff00000c99d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.749546]                                                     ^
[   30.749785]  fff00000c99d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.750243]  fff00000c99d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.750325] ==================================================================
[   30.750891] ==================================================================
[   30.751055] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.751136] Write of size 1 at addr fff00000c99d60ea by task kunit_try_catch/195
[   30.751204] 
[   30.751242] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.751360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.751406] Hardware name: linux,dummy-virt (DT)
[   30.751588] Call trace:
[   30.751663]  show_stack+0x20/0x38 (C)
[   30.751719]  dump_stack_lvl+0x8c/0xd0
[   30.751774]  print_report+0x118/0x608
[   30.752151]  kasan_report+0xdc/0x128
[   30.752282]  __asan_report_store1_noabort+0x20/0x30
[   30.752371]  krealloc_less_oob_helper+0xae4/0xc50
[   30.752498]  krealloc_large_less_oob+0x20/0x38
[   30.752587]  kunit_try_run_case+0x170/0x3f0
[   30.752716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.752806]  kthread+0x328/0x630
[   30.752920]  ret_from_fork+0x10/0x20
[   30.753025] 
[   30.753130] The buggy address belongs to the physical page:
[   30.753167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099d4
[   30.753218] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.753390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.753473] page_type: f8(unknown)
[   30.753654] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.753793] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.753872] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.754213] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.754349] head: 0bfffe0000000002 ffffc1ffc3267501 00000000ffffffff 00000000ffffffff
[   30.754418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.754485] page dumped because: kasan: bad access detected
[   30.754516] 
[   30.754670] Memory state around the buggy address:
[   30.755172]  fff00000c99d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.755233]  fff00000c99d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.755333] >fff00000c99d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.755400]                                                           ^
[   30.755451]  fff00000c99d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.755771]  fff00000c99d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.755838] ==================================================================
[   30.677954] ==================================================================
[   30.678288] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.678542] Write of size 1 at addr fff00000c8f6fad0 by task kunit_try_catch/191
[   30.678694] 
[   30.678730] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.679270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.679318] Hardware name: linux,dummy-virt (DT)
[   30.679360] Call trace:
[   30.679391]  show_stack+0x20/0x38 (C)
[   30.679444]  dump_stack_lvl+0x8c/0xd0
[   30.679611]  print_report+0x118/0x608
[   30.680185]  kasan_report+0xdc/0x128
[   30.680281]  __asan_report_store1_noabort+0x20/0x30
[   30.680341]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.680393]  krealloc_less_oob+0x20/0x38
[   30.680440]  kunit_try_run_case+0x170/0x3f0
[   30.681118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.681271]  kthread+0x328/0x630
[   30.681328]  ret_from_fork+0x10/0x20
[   30.681499] 
[   30.681548] Allocated by task 191:
[   30.681675]  kasan_save_stack+0x3c/0x68
[   30.681754]  kasan_save_track+0x20/0x40
[   30.681862]  kasan_save_alloc_info+0x40/0x58
[   30.681949]  __kasan_krealloc+0x118/0x178
[   30.682052]  krealloc_noprof+0x128/0x360
[   30.682104]  krealloc_less_oob_helper+0x168/0xc50
[   30.682161]  krealloc_less_oob+0x20/0x38
[   30.682414]  kunit_try_run_case+0x170/0x3f0
[   30.682592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.682671]  kthread+0x328/0x630
[   30.682704]  ret_from_fork+0x10/0x20
[   30.682901] 
[   30.682960] The buggy address belongs to the object at fff00000c8f6fa00
[   30.682960]  which belongs to the cache kmalloc-256 of size 256
[   30.683254] The buggy address is located 7 bytes to the right of
[   30.683254]  allocated 201-byte region [fff00000c8f6fa00, fff00000c8f6fac9)
[   30.683332] 
[   30.683351] The buggy address belongs to the physical page:
[   30.683409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e
[   30.683586] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.683760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.683835] page_type: f5(slab)
[   30.683874] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.684115] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.684348] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.684419] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.684483] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff
[   30.684857] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.684939] page dumped because: kasan: bad access detected
[   30.684972] 
[   30.685022] Memory state around the buggy address:
[   30.685215]  fff00000c8f6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.685381]  fff00000c8f6fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.685635] >fff00000c8f6fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.685808]                                                  ^
[   30.685913]  fff00000c8f6fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.686006]  fff00000c8f6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.686200] ==================================================================

[   32.534045] ==================================================================
[   32.534094] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.534143] Write of size 1 at addr fff00000c99f20ea by task kunit_try_catch/193
[   32.534243] 
[   32.534274] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.534358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.534384] Hardware name: linux,dummy-virt (DT)
[   32.534414] Call trace:
[   32.534437]  show_stack+0x20/0x38 (C)
[   32.534486]  dump_stack_lvl+0x8c/0xd0
[   32.535310]  print_report+0x118/0x608
[   32.535601]  kasan_report+0xdc/0x128
[   32.535662]  __asan_report_store1_noabort+0x20/0x30
[   32.535709]  krealloc_less_oob_helper+0xae4/0xc50
[   32.535780]  krealloc_large_less_oob+0x20/0x38
[   32.535828]  kunit_try_run_case+0x170/0x3f0
[   32.535877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.535929]  kthread+0x328/0x630
[   32.536224]  ret_from_fork+0x10/0x20
[   32.536331] 
[   32.536352] The buggy address belongs to the physical page:
[   32.536419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.536505] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.536550] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.536600] page_type: f8(unknown)
[   32.536638] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.536686] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.536734] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.536955] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.537076] head: 0bfffe0000000002 ffffc1ffc3267c01 00000000ffffffff 00000000ffffffff
[   32.537126] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.537176] page dumped because: kasan: bad access detected
[   32.537215] 
[   32.537250] Memory state around the buggy address:
[   32.537280]  fff00000c99f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537377]  fff00000c99f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537418] >fff00000c99f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.537453]                                                           ^
[   32.537623]  fff00000c99f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.537922]  fff00000c99f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.537960] ==================================================================
[   32.490861] ==================================================================
[   32.490930] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.490997] Write of size 1 at addr fff00000c893f4eb by task kunit_try_catch/189
[   32.491052] 
[   32.491087] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.491184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.491219] Hardware name: linux,dummy-virt (DT)
[   32.491250] Call trace:
[   32.491271]  show_stack+0x20/0x38 (C)
[   32.491392]  dump_stack_lvl+0x8c/0xd0
[   32.491447]  print_report+0x118/0x608
[   32.491495]  kasan_report+0xdc/0x128
[   32.491541]  __asan_report_store1_noabort+0x20/0x30
[   32.491589]  krealloc_less_oob_helper+0xa58/0xc50
[   32.491637]  krealloc_less_oob+0x20/0x38
[   32.491683]  kunit_try_run_case+0x170/0x3f0
[   32.491893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.492020]  kthread+0x328/0x630
[   32.492077]  ret_from_fork+0x10/0x20
[   32.492225] 
[   32.492290] Allocated by task 189:
[   32.492377]  kasan_save_stack+0x3c/0x68
[   32.492419]  kasan_save_track+0x20/0x40
[   32.492477]  kasan_save_alloc_info+0x40/0x58
[   32.492514]  __kasan_krealloc+0x118/0x178
[   32.492845]  krealloc_noprof+0x128/0x360
[   32.492923]  krealloc_less_oob_helper+0x168/0xc50
[   32.493011]  krealloc_less_oob+0x20/0x38
[   32.493082]  kunit_try_run_case+0x170/0x3f0
[   32.493187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.493257]  kthread+0x328/0x630
[   32.493289]  ret_from_fork+0x10/0x20
[   32.493324] 
[   32.493343] The buggy address belongs to the object at fff00000c893f400
[   32.493343]  which belongs to the cache kmalloc-256 of size 256
[   32.493398] The buggy address is located 34 bytes to the right of
[   32.493398]  allocated 201-byte region [fff00000c893f400, fff00000c893f4c9)
[   32.493474] 
[   32.493521] The buggy address belongs to the physical page:
[   32.493673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e
[   32.493780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.493858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.493936] page_type: f5(slab)
[   32.493983] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.494039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.494089] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.494137] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.494194] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff
[   32.494247] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.494297] page dumped because: kasan: bad access detected
[   32.494327] 
[   32.494345] Memory state around the buggy address:
[   32.494374]  fff00000c893f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.494417]  fff00000c893f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.494468] >fff00000c893f480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.494505]                                                           ^
[   32.494542]  fff00000c893f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.494583]  fff00000c893f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.494629] ==================================================================
[   32.516976] ==================================================================
[   32.517035] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.517091] Write of size 1 at addr fff00000c99f20c9 by task kunit_try_catch/193
[   32.517152] 
[   32.517199] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.517462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.517501] Hardware name: linux,dummy-virt (DT)
[   32.517535] Call trace:
[   32.517557]  show_stack+0x20/0x38 (C)
[   32.517618]  dump_stack_lvl+0x8c/0xd0
[   32.517784]  print_report+0x118/0x608
[   32.517838]  kasan_report+0xdc/0x128
[   32.517990]  __asan_report_store1_noabort+0x20/0x30
[   32.518037]  krealloc_less_oob_helper+0xa48/0xc50
[   32.518086]  krealloc_large_less_oob+0x20/0x38
[   32.518133]  kunit_try_run_case+0x170/0x3f0
[   32.518192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.518463]  kthread+0x328/0x630
[   32.518516]  ret_from_fork+0x10/0x20
[   32.518598] 
[   32.518618] The buggy address belongs to the physical page:
[   32.518649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.518701] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.518747] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.518808] page_type: f8(unknown)
[   32.518847] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.518898] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.519319] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.519430] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.519527] head: 0bfffe0000000002 ffffc1ffc3267c01 00000000ffffffff 00000000ffffffff
[   32.519575] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.519614] page dumped because: kasan: bad access detected
[   32.519644] 
[   32.519843] Memory state around the buggy address:
[   32.519927]  fff00000c99f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.520061]  fff00000c99f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.520104] >fff00000c99f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.520172]                                               ^
[   32.520206]  fff00000c99f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.520356]  fff00000c99f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.520393] ==================================================================
[   32.486477] ==================================================================
[   32.486523] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.486668] Write of size 1 at addr fff00000c893f4ea by task kunit_try_catch/189
[   32.486717] 
[   32.486774] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.486859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.486885] Hardware name: linux,dummy-virt (DT)
[   32.486915] Call trace:
[   32.486937]  show_stack+0x20/0x38 (C)
[   32.486984]  dump_stack_lvl+0x8c/0xd0
[   32.487052]  print_report+0x118/0x608
[   32.487100]  kasan_report+0xdc/0x128
[   32.487147]  __asan_report_store1_noabort+0x20/0x30
[   32.487208]  krealloc_less_oob_helper+0xae4/0xc50
[   32.487256]  krealloc_less_oob+0x20/0x38
[   32.487302]  kunit_try_run_case+0x170/0x3f0
[   32.487350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.487402]  kthread+0x328/0x630
[   32.487480]  ret_from_fork+0x10/0x20
[   32.487528] 
[   32.487546] Allocated by task 189:
[   32.487573]  kasan_save_stack+0x3c/0x68
[   32.487613]  kasan_save_track+0x20/0x40
[   32.487823]  kasan_save_alloc_info+0x40/0x58
[   32.487896]  __kasan_krealloc+0x118/0x178
[   32.487935]  krealloc_noprof+0x128/0x360
[   32.487975]  krealloc_less_oob_helper+0x168/0xc50
[   32.488014]  krealloc_less_oob+0x20/0x38
[   32.488050]  kunit_try_run_case+0x170/0x3f0
[   32.488087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.488129]  kthread+0x328/0x630
[   32.488301]  ret_from_fork+0x10/0x20
[   32.488350] 
[   32.488433] The buggy address belongs to the object at fff00000c893f400
[   32.488433]  which belongs to the cache kmalloc-256 of size 256
[   32.488523] The buggy address is located 33 bytes to the right of
[   32.488523]  allocated 201-byte region [fff00000c893f400, fff00000c893f4c9)
[   32.488639] 
[   32.488666] The buggy address belongs to the physical page:
[   32.488719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e
[   32.488815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.488879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.488938] page_type: f5(slab)
[   32.488976] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.489024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.489180] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.489291] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.489367] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff
[   32.489471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.489545] page dumped because: kasan: bad access detected
[   32.489619] 
[   32.489685] Memory state around the buggy address:
[   32.489744]  fff00000c893f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.489807]  fff00000c893f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.489848] >fff00000c893f480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.490079]                                                           ^
[   32.490131]  fff00000c893f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.490200]  fff00000c893f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.490279] ==================================================================
[   32.478027] ==================================================================
[   32.478091] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.478145] Write of size 1 at addr fff00000c893f4d0 by task kunit_try_catch/189
[   32.478208] 
[   32.478237] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.478320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.478423] Hardware name: linux,dummy-virt (DT)
[   32.478461] Call trace:
[   32.478520]  show_stack+0x20/0x38 (C)
[   32.478590]  dump_stack_lvl+0x8c/0xd0
[   32.478656]  print_report+0x118/0x608
[   32.478731]  kasan_report+0xdc/0x128
[   32.478796]  __asan_report_store1_noabort+0x20/0x30
[   32.478852]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.478911]  krealloc_less_oob+0x20/0x38
[   32.478957]  kunit_try_run_case+0x170/0x3f0
[   32.479023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.479076]  kthread+0x328/0x630
[   32.479125]  ret_from_fork+0x10/0x20
[   32.479201] 
[   32.479241] Allocated by task 189:
[   32.479269]  kasan_save_stack+0x3c/0x68
[   32.479324]  kasan_save_track+0x20/0x40
[   32.479362]  kasan_save_alloc_info+0x40/0x58
[   32.479487]  __kasan_krealloc+0x118/0x178
[   32.479641]  krealloc_noprof+0x128/0x360
[   32.479741]  krealloc_less_oob_helper+0x168/0xc50
[   32.479889]  krealloc_less_oob+0x20/0x38
[   32.479925]  kunit_try_run_case+0x170/0x3f0
[   32.479962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.480005]  kthread+0x328/0x630
[   32.480037]  ret_from_fork+0x10/0x20
[   32.480195] 
[   32.480272] The buggy address belongs to the object at fff00000c893f400
[   32.480272]  which belongs to the cache kmalloc-256 of size 256
[   32.480359] The buggy address is located 7 bytes to the right of
[   32.480359]  allocated 201-byte region [fff00000c893f400, fff00000c893f4c9)
[   32.480472] 
[   32.480519] The buggy address belongs to the physical page:
[   32.480571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e
[   32.480639] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.480710] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.480813] page_type: f5(slab)
[   32.480871] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.480959] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.481036] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.481103] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.481190] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff
[   32.481278] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.481336] page dumped because: kasan: bad access detected
[   32.481395] 
[   32.481457] Memory state around the buggy address:
[   32.481523]  fff00000c893f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.481593]  fff00000c893f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.481635] >fff00000c893f480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.481672]                                                  ^
[   32.481707]  fff00000c893f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.481859]  fff00000c893f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.481927] ==================================================================
[   32.520571] ==================================================================
[   32.520613] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.520658] Write of size 1 at addr fff00000c99f20d0 by task kunit_try_catch/193
[   32.520705] 
[   32.520733] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.520815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.521094] Hardware name: linux,dummy-virt (DT)
[   32.521294] Call trace:
[   32.521323]  show_stack+0x20/0x38 (C)
[   32.521445]  dump_stack_lvl+0x8c/0xd0
[   32.521498]  print_report+0x118/0x608
[   32.521550]  kasan_report+0xdc/0x128
[   32.521763]  __asan_report_store1_noabort+0x20/0x30
[   32.521865]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.522034]  krealloc_large_less_oob+0x20/0x38
[   32.522082]  kunit_try_run_case+0x170/0x3f0
[   32.522129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.522189]  kthread+0x328/0x630
[   32.522231]  ret_from_fork+0x10/0x20
[   32.522279] 
[   32.522299] The buggy address belongs to the physical page:
[   32.522329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.522380] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.522425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.522474] page_type: f8(unknown)
[   32.522512] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.522567] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.522792] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.522987] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.523059] head: 0bfffe0000000002 ffffc1ffc3267c01 00000000ffffffff 00000000ffffffff
[   32.523236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.523340] page dumped because: kasan: bad access detected
[   32.523370] 
[   32.523387] Memory state around the buggy address:
[   32.523416]  fff00000c99f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.523481]  fff00000c99f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.523523] >fff00000c99f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.523558]                                                  ^
[   32.523593]  fff00000c99f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.524345]  fff00000c99f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.524498] ==================================================================
[   32.538422] ==================================================================
[   32.538472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.538520] Write of size 1 at addr fff00000c99f20eb by task kunit_try_catch/193
[   32.538580] 
[   32.538674] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.538904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.539115] Hardware name: linux,dummy-virt (DT)
[   32.539226] Call trace:
[   32.539282]  show_stack+0x20/0x38 (C)
[   32.539332]  dump_stack_lvl+0x8c/0xd0
[   32.539379]  print_report+0x118/0x608
[   32.539426]  kasan_report+0xdc/0x128
[   32.539554]  __asan_report_store1_noabort+0x20/0x30
[   32.539603]  krealloc_less_oob_helper+0xa58/0xc50
[   32.539812]  krealloc_large_less_oob+0x20/0x38
[   32.539865]  kunit_try_run_case+0x170/0x3f0
[   32.539913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.540025]  kthread+0x328/0x630
[   32.540069]  ret_from_fork+0x10/0x20
[   32.540138] 
[   32.540398] The buggy address belongs to the physical page:
[   32.540429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.540482] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.540706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.540945] page_type: f8(unknown)
[   32.541139] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.541215] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.541538] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.541680] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.541728] head: 0bfffe0000000002 ffffc1ffc3267c01 00000000ffffffff 00000000ffffffff
[   32.541775] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.541814] page dumped because: kasan: bad access detected
[   32.541844] 
[   32.541875] Memory state around the buggy address:
[   32.541934]  fff00000c99f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.541975]  fff00000c99f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.542048] >fff00000c99f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.542085]                                                           ^
[   32.542123]  fff00000c99f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.542174]  fff00000c99f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.542392] ==================================================================
[   32.482354] ==================================================================
[   32.482401] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.482449] Write of size 1 at addr fff00000c893f4da by task kunit_try_catch/189
[   32.482498] 
[   32.482544] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.482681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.482709] Hardware name: linux,dummy-virt (DT)
[   32.482833] Call trace:
[   32.482861]  show_stack+0x20/0x38 (C)
[   32.482929]  dump_stack_lvl+0x8c/0xd0
[   32.482986]  print_report+0x118/0x608
[   32.483042]  kasan_report+0xdc/0x128
[   32.483099]  __asan_report_store1_noabort+0x20/0x30
[   32.483148]  krealloc_less_oob_helper+0xa80/0xc50
[   32.483211]  krealloc_less_oob+0x20/0x38
[   32.483267]  kunit_try_run_case+0x170/0x3f0
[   32.483315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.483367]  kthread+0x328/0x630
[   32.483408]  ret_from_fork+0x10/0x20
[   32.483483] 
[   32.483501] Allocated by task 189:
[   32.483529]  kasan_save_stack+0x3c/0x68
[   32.483685]  kasan_save_track+0x20/0x40
[   32.483750]  kasan_save_alloc_info+0x40/0x58
[   32.483818]  __kasan_krealloc+0x118/0x178
[   32.483885]  krealloc_noprof+0x128/0x360
[   32.483921]  krealloc_less_oob_helper+0x168/0xc50
[   32.483960]  krealloc_less_oob+0x20/0x38
[   32.483995]  kunit_try_run_case+0x170/0x3f0
[   32.484032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.484075]  kthread+0x328/0x630
[   32.484106]  ret_from_fork+0x10/0x20
[   32.484141] 
[   32.484171] The buggy address belongs to the object at fff00000c893f400
[   32.484171]  which belongs to the cache kmalloc-256 of size 256
[   32.484358] The buggy address is located 17 bytes to the right of
[   32.484358]  allocated 201-byte region [fff00000c893f400, fff00000c893f4c9)
[   32.484446] 
[   32.484495] The buggy address belongs to the physical page:
[   32.484579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e
[   32.484646] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.484712] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.484925] page_type: f5(slab)
[   32.484965] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.485042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.485119] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.485204] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.485280] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff
[   32.485338] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.485403] page dumped because: kasan: bad access detected
[   32.485451] 
[   32.485492] Memory state around the buggy address:
[   32.485521]  fff00000c893f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.485563]  fff00000c893f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.485603] >fff00000c893f480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.485639]                                                     ^
[   32.485675]  fff00000c893f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.485715]  fff00000c893f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.485839] ==================================================================
[   32.471222] ==================================================================
[   32.471276] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.471328] Write of size 1 at addr fff00000c893f4c9 by task kunit_try_catch/189
[   32.471377] 
[   32.471408] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.472367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.472433] Hardware name: linux,dummy-virt (DT)
[   32.472505] Call trace:
[   32.472644]  show_stack+0x20/0x38 (C)
[   32.472727]  dump_stack_lvl+0x8c/0xd0
[   32.472816]  print_report+0x118/0x608
[   32.472873]  kasan_report+0xdc/0x128
[   32.472919]  __asan_report_store1_noabort+0x20/0x30
[   32.472967]  krealloc_less_oob_helper+0xa48/0xc50
[   32.473027]  krealloc_less_oob+0x20/0x38
[   32.473074]  kunit_try_run_case+0x170/0x3f0
[   32.473124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.473198]  kthread+0x328/0x630
[   32.473241]  ret_from_fork+0x10/0x20
[   32.473299] 
[   32.473317] Allocated by task 189:
[   32.473346]  kasan_save_stack+0x3c/0x68
[   32.473386]  kasan_save_track+0x20/0x40
[   32.473423]  kasan_save_alloc_info+0x40/0x58
[   32.473469]  __kasan_krealloc+0x118/0x178
[   32.473512]  krealloc_noprof+0x128/0x360
[   32.473549]  krealloc_less_oob_helper+0x168/0xc50
[   32.473588]  krealloc_less_oob+0x20/0x38
[   32.473633]  kunit_try_run_case+0x170/0x3f0
[   32.473670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.473714]  kthread+0x328/0x630
[   32.473768]  ret_from_fork+0x10/0x20
[   32.473803] 
[   32.473822] The buggy address belongs to the object at fff00000c893f400
[   32.473822]  which belongs to the cache kmalloc-256 of size 256
[   32.473877] The buggy address is located 0 bytes to the right of
[   32.473877]  allocated 201-byte region [fff00000c893f400, fff00000c893f4c9)
[   32.473939] 
[   32.473976] The buggy address belongs to the physical page:
[   32.474016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e
[   32.474066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.474112] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.474589] page_type: f5(slab)
[   32.474647] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.475110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.475276] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.475503] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.475562] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff
[   32.475610] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.475650] page dumped because: kasan: bad access detected
[   32.475682] 
[   32.475700] Memory state around the buggy address:
[   32.475764]  fff00000c893f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.476145]  fff00000c893f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.476250] >fff00000c893f480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.476507]                                               ^
[   32.476578]  fff00000c893f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.476655]  fff00000c893f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.476695] ==================================================================
[   32.525712] ==================================================================
[   32.525802] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.525849] Write of size 1 at addr fff00000c99f20da by task kunit_try_catch/193
[   32.525898] 
[   32.525926] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.526010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.526036] Hardware name: linux,dummy-virt (DT)
[   32.526067] Call trace:
[   32.526101]  show_stack+0x20/0x38 (C)
[   32.526214]  dump_stack_lvl+0x8c/0xd0
[   32.526420]  print_report+0x118/0x608
[   32.526799]  kasan_report+0xdc/0x128
[   32.526851]  __asan_report_store1_noabort+0x20/0x30
[   32.527053]  krealloc_less_oob_helper+0xa80/0xc50
[   32.527363]  krealloc_large_less_oob+0x20/0x38
[   32.527419]  kunit_try_run_case+0x170/0x3f0
[   32.527526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.527579]  kthread+0x328/0x630
[   32.527621]  ret_from_fork+0x10/0x20
[   32.527668] 
[   32.527688] The buggy address belongs to the physical page:
[   32.527813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.527944] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.528115] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.528180] page_type: f8(unknown)
[   32.528219] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.528268] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.528316] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.528382] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.528704] head: 0bfffe0000000002 ffffc1ffc3267c01 00000000ffffffff 00000000ffffffff
[   32.528839] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.528965] page dumped because: kasan: bad access detected
[   32.529059] 
[   32.529078] Memory state around the buggy address:
[   32.529121]  fff00000c99f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.529233]  fff00000c99f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.529324] >fff00000c99f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.529362]                                                     ^
[   32.529397]  fff00000c99f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.529475]  fff00000c99f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.529517] ==================================================================

[   22.904522] ==================================================================
[   22.905972] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   22.906246] Write of size 1 at addr ffff88810613e0c9 by task kunit_try_catch/210
[   22.906485] 
[   22.906572] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.906620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.906633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.906653] Call Trace:
[   22.906668]  <TASK>
[   22.906685]  dump_stack_lvl+0x73/0xb0
[   22.906715]  print_report+0xd1/0x650
[   22.906738]  ? __virt_addr_valid+0x1db/0x2d0
[   22.906762]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.906784]  ? kasan_addr_to_slab+0x11/0xa0
[   22.906803]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.906826]  kasan_report+0x141/0x180
[   22.906846]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.906873]  __asan_report_store1_noabort+0x1b/0x30
[   22.906897]  krealloc_less_oob_helper+0xd70/0x11d0
[   22.906921]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.906943]  ? finish_task_switch.isra.0+0x153/0x700
[   22.906965]  ? __switch_to+0x47/0xf50
[   22.906992]  ? __schedule+0x10cc/0x2b60
[   22.907014]  ? __pfx_read_tsc+0x10/0x10
[   22.907038]  krealloc_large_less_oob+0x1c/0x30
[   22.907059]  kunit_try_run_case+0x1a5/0x480
[   22.907085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.907108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.907129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.907149]  ? __kthread_parkme+0x82/0x180
[   22.907169]  ? preempt_count_sub+0x50/0x80
[   22.907191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.907214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.907237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.907261]  kthread+0x337/0x6f0
[   22.907280]  ? trace_preempt_on+0x20/0xc0
[   22.907304]  ? __pfx_kthread+0x10/0x10
[   22.907334]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.907357]  ? calculate_sigpending+0x7b/0xa0
[   22.907380]  ? __pfx_kthread+0x10/0x10
[   22.907400]  ret_from_fork+0x116/0x1d0
[   22.907418]  ? __pfx_kthread+0x10/0x10
[   22.907438]  ret_from_fork_asm+0x1a/0x30
[   22.907468]  </TASK>
[   22.907479] 
[   22.917072] The buggy address belongs to the physical page:
[   22.917343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613c
[   22.917801] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.918138] flags: 0x200000000000040(head|node=0|zone=2)
[   22.918391] page_type: f8(unknown)
[   22.918626] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.919151] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.919517] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.919921] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.920265] head: 0200000000000002 ffffea0004184f01 00000000ffffffff 00000000ffffffff
[   22.920635] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.921057] page dumped because: kasan: bad access detected
[   22.921285] 
[   22.921385] Memory state around the buggy address:
[   22.921629]  ffff88810613df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.921911]  ffff88810613e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.922180] >ffff88810613e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.922594]                                               ^
[   22.923014]  ffff88810613e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.923347]  ffff88810613e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.923641] ==================================================================
[   22.840482] ==================================================================
[   22.841143] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   22.841477] Write of size 1 at addr ffff888105fa06eb by task kunit_try_catch/206
[   22.841788] 
[   22.841865] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.841909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.841922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.841942] Call Trace:
[   22.841955]  <TASK>
[   22.841969]  dump_stack_lvl+0x73/0xb0
[   22.841995]  print_report+0xd1/0x650
[   22.842015]  ? __virt_addr_valid+0x1db/0x2d0
[   22.842037]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.842059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.842084]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.842106]  kasan_report+0x141/0x180
[   22.842128]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.842154]  __asan_report_store1_noabort+0x1b/0x30
[   22.842178]  krealloc_less_oob_helper+0xd47/0x11d0
[   22.842202]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.842225]  ? finish_task_switch.isra.0+0x153/0x700
[   22.842256]  ? __switch_to+0x47/0xf50
[   22.842281]  ? __schedule+0x10cc/0x2b60
[   22.842301]  ? __pfx_read_tsc+0x10/0x10
[   22.842342]  krealloc_less_oob+0x1c/0x30
[   22.842363]  kunit_try_run_case+0x1a5/0x480
[   22.842387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.842410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.842430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.842451]  ? __kthread_parkme+0x82/0x180
[   22.842471]  ? preempt_count_sub+0x50/0x80
[   22.842504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.842529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.842552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.842575]  kthread+0x337/0x6f0
[   22.842594]  ? trace_preempt_on+0x20/0xc0
[   22.842626]  ? __pfx_kthread+0x10/0x10
[   22.842646]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.842669]  ? calculate_sigpending+0x7b/0xa0
[   22.842702]  ? __pfx_kthread+0x10/0x10
[   22.842722]  ret_from_fork+0x116/0x1d0
[   22.842741]  ? __pfx_kthread+0x10/0x10
[   22.842761]  ret_from_fork_asm+0x1a/0x30
[   22.842799]  </TASK>
[   22.842809] 
[   22.850432] Allocated by task 206:
[   22.850653]  kasan_save_stack+0x45/0x70
[   22.850830]  kasan_save_track+0x18/0x40
[   22.851050]  kasan_save_alloc_info+0x3b/0x50
[   22.851268]  __kasan_krealloc+0x190/0x1f0
[   22.851481]  krealloc_noprof+0xf3/0x340
[   22.851687]  krealloc_less_oob_helper+0x1aa/0x11d0
[   22.851912]  krealloc_less_oob+0x1c/0x30
[   22.852125]  kunit_try_run_case+0x1a5/0x480
[   22.852337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.852614]  kthread+0x337/0x6f0
[   22.852750]  ret_from_fork+0x116/0x1d0
[   22.852968]  ret_from_fork_asm+0x1a/0x30
[   22.853189] 
[   22.853255] The buggy address belongs to the object at ffff888105fa0600
[   22.853255]  which belongs to the cache kmalloc-256 of size 256
[   22.853842] The buggy address is located 34 bytes to the right of
[   22.853842]  allocated 201-byte region [ffff888105fa0600, ffff888105fa06c9)
[   22.854436] 
[   22.854553] The buggy address belongs to the physical page:
[   22.854820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fa0
[   22.855159] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.855451] flags: 0x200000000000040(head|node=0|zone=2)
[   22.855614] page_type: f5(slab)
[   22.855724] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.855939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.856153] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.856529] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.856947] head: 0200000000000001 ffffea000417e801 00000000ffffffff 00000000ffffffff
[   22.857417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.858185] page dumped because: kasan: bad access detected
[   22.858465] 
[   22.858610] Memory state around the buggy address:
[   22.858847]  ffff888105fa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.859048]  ffff888105fa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.859266] >ffff888105fa0680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.859812]                                                           ^
[   22.860101]  ffff888105fa0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.860423]  ffff888105fa0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.860772] ==================================================================
[   22.774225] ==================================================================
[   22.774644] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   22.775117] Write of size 1 at addr ffff888105fa06d0 by task kunit_try_catch/206
[   22.775479] 
[   22.775590] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.775636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.775648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.775668] Call Trace:
[   22.775808]  <TASK>
[   22.775837]  dump_stack_lvl+0x73/0xb0
[   22.775866]  print_report+0xd1/0x650
[   22.775887]  ? __virt_addr_valid+0x1db/0x2d0
[   22.775921]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.775944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.775968]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.775991]  kasan_report+0x141/0x180
[   22.776012]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.776039]  __asan_report_store1_noabort+0x1b/0x30
[   22.776063]  krealloc_less_oob_helper+0xe23/0x11d0
[   22.776087]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.776118]  ? finish_task_switch.isra.0+0x153/0x700
[   22.776139]  ? __switch_to+0x47/0xf50
[   22.776163]  ? __schedule+0x10cc/0x2b60
[   22.776193]  ? __pfx_read_tsc+0x10/0x10
[   22.776217]  krealloc_less_oob+0x1c/0x30
[   22.776237]  kunit_try_run_case+0x1a5/0x480
[   22.776262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.776284]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.776315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.776335]  ? __kthread_parkme+0x82/0x180
[   22.776355]  ? preempt_count_sub+0x50/0x80
[   22.776376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.776400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.776423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.776455]  kthread+0x337/0x6f0
[   22.776474]  ? trace_preempt_on+0x20/0xc0
[   22.776507]  ? __pfx_kthread+0x10/0x10
[   22.776537]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.776560]  ? calculate_sigpending+0x7b/0xa0
[   22.776583]  ? __pfx_kthread+0x10/0x10
[   22.776604]  ret_from_fork+0x116/0x1d0
[   22.776622]  ? __pfx_kthread+0x10/0x10
[   22.776641]  ret_from_fork_asm+0x1a/0x30
[   22.776672]  </TASK>
[   22.776734] 
[   22.784722] Allocated by task 206:
[   22.784839]  kasan_save_stack+0x45/0x70
[   22.785203]  kasan_save_track+0x18/0x40
[   22.785442]  kasan_save_alloc_info+0x3b/0x50
[   22.785723]  __kasan_krealloc+0x190/0x1f0
[   22.785932]  krealloc_noprof+0xf3/0x340
[   22.786067]  krealloc_less_oob_helper+0x1aa/0x11d0
[   22.786230]  krealloc_less_oob+0x1c/0x30
[   22.786388]  kunit_try_run_case+0x1a5/0x480
[   22.786590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.786833]  kthread+0x337/0x6f0
[   22.787078]  ret_from_fork+0x116/0x1d0
[   22.787249]  ret_from_fork_asm+0x1a/0x30
[   22.787392] 
[   22.787459] The buggy address belongs to the object at ffff888105fa0600
[   22.787459]  which belongs to the cache kmalloc-256 of size 256
[   22.788286] The buggy address is located 7 bytes to the right of
[   22.788286]  allocated 201-byte region [ffff888105fa0600, ffff888105fa06c9)
[   22.789036] 
[   22.789158] The buggy address belongs to the physical page:
[   22.789391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fa0
[   22.789858] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.790209] flags: 0x200000000000040(head|node=0|zone=2)
[   22.790436] page_type: f5(slab)
[   22.790606] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.790994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.791353] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.791747] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.791977] head: 0200000000000001 ffffea000417e801 00000000ffffffff 00000000ffffffff
[   22.792343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.792997] page dumped because: kasan: bad access detected
[   22.793251] 
[   22.793438] Memory state around the buggy address:
[   22.793724]  ffff888105fa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.793965]  ffff888105fa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.794185] >ffff888105fa0680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.794517]                                                  ^
[   22.794958]  ffff888105fa0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.795344]  ffff888105fa0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.795692] ==================================================================
[   22.924025] ==================================================================
[   22.924434] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   22.924873] Write of size 1 at addr ffff88810613e0d0 by task kunit_try_catch/210
[   22.925222] 
[   22.925333] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.925378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.925390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.925409] Call Trace:
[   22.925422]  <TASK>
[   22.925435]  dump_stack_lvl+0x73/0xb0
[   22.925463]  print_report+0xd1/0x650
[   22.925524]  ? __virt_addr_valid+0x1db/0x2d0
[   22.925546]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.925568]  ? kasan_addr_to_slab+0x11/0xa0
[   22.925588]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.925611]  kasan_report+0x141/0x180
[   22.925632]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.925732]  __asan_report_store1_noabort+0x1b/0x30
[   22.925770]  krealloc_less_oob_helper+0xe23/0x11d0
[   22.925795]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.925818]  ? finish_task_switch.isra.0+0x153/0x700
[   22.925839]  ? __switch_to+0x47/0xf50
[   22.925865]  ? __schedule+0x10cc/0x2b60
[   22.925886]  ? __pfx_read_tsc+0x10/0x10
[   22.925910]  krealloc_large_less_oob+0x1c/0x30
[   22.925952]  kunit_try_run_case+0x1a5/0x480
[   22.925977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.926000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.926021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.926042]  ? __kthread_parkme+0x82/0x180
[   22.926062]  ? preempt_count_sub+0x50/0x80
[   22.926085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.926110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.926133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.926175]  kthread+0x337/0x6f0
[   22.926195]  ? trace_preempt_on+0x20/0xc0
[   22.926218]  ? __pfx_kthread+0x10/0x10
[   22.926251]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.926288]  ? calculate_sigpending+0x7b/0xa0
[   22.926322]  ? __pfx_kthread+0x10/0x10
[   22.926344]  ret_from_fork+0x116/0x1d0
[   22.926377]  ? __pfx_kthread+0x10/0x10
[   22.926397]  ret_from_fork_asm+0x1a/0x30
[   22.926427]  </TASK>
[   22.926439] 
[   22.934226] The buggy address belongs to the physical page:
[   22.934635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613c
[   22.935100] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.935525] flags: 0x200000000000040(head|node=0|zone=2)
[   22.935946] page_type: f8(unknown)
[   22.936102] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.936332] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.936585] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.937073] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.937472] head: 0200000000000002 ffffea0004184f01 00000000ffffffff 00000000ffffffff
[   22.937934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.938273] page dumped because: kasan: bad access detected
[   22.938545] 
[   22.938618] Memory state around the buggy address:
[   22.938917]  ffff88810613df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.939210]  ffff88810613e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.939425] >ffff88810613e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.939658]                                                  ^
[   22.940124]  ffff88810613e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.940499]  ffff88810613e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.940935] ==================================================================
[   22.977615] ==================================================================
[   22.978118] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   22.978424] Write of size 1 at addr ffff88810613e0eb by task kunit_try_catch/210
[   22.978742] 
[   22.978924] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.978970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.978983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.979002] Call Trace:
[   22.979015]  <TASK>
[   22.979028]  dump_stack_lvl+0x73/0xb0
[   22.979054]  print_report+0xd1/0x650
[   22.979075]  ? __virt_addr_valid+0x1db/0x2d0
[   22.979096]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.979118]  ? kasan_addr_to_slab+0x11/0xa0
[   22.979138]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.979160]  kasan_report+0x141/0x180
[   22.979181]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.979208]  __asan_report_store1_noabort+0x1b/0x30
[   22.979232]  krealloc_less_oob_helper+0xd47/0x11d0
[   22.979257]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.979280]  ? finish_task_switch.isra.0+0x153/0x700
[   22.979301]  ? __switch_to+0x47/0xf50
[   22.979339]  ? __schedule+0x10cc/0x2b60
[   22.979360]  ? __pfx_read_tsc+0x10/0x10
[   22.979384]  krealloc_large_less_oob+0x1c/0x30
[   22.979406]  kunit_try_run_case+0x1a5/0x480
[   22.979430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.979454]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.979495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.979517]  ? __kthread_parkme+0x82/0x180
[   22.979537]  ? preempt_count_sub+0x50/0x80
[   22.979559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.979583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.979607]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.979630]  kthread+0x337/0x6f0
[   22.979649]  ? trace_preempt_on+0x20/0xc0
[   22.979827]  ? __pfx_kthread+0x10/0x10
[   22.979850]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.979874]  ? calculate_sigpending+0x7b/0xa0
[   22.979897]  ? __pfx_kthread+0x10/0x10
[   22.979918]  ret_from_fork+0x116/0x1d0
[   22.979938]  ? __pfx_kthread+0x10/0x10
[   22.979958]  ret_from_fork_asm+0x1a/0x30
[   22.979988]  </TASK>
[   22.979999] 
[   22.987390] The buggy address belongs to the physical page:
[   22.987810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613c
[   22.988179] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.988481] flags: 0x200000000000040(head|node=0|zone=2)
[   22.988813] page_type: f8(unknown)
[   22.988948] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.989283] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.989548] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.989904] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.990250] head: 0200000000000002 ffffea0004184f01 00000000ffffffff 00000000ffffffff
[   22.990623] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.990917] page dumped because: kasan: bad access detected
[   22.991087] 
[   22.991176] Memory state around the buggy address:
[   22.991404]  ffff88810613df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.991893]  ffff88810613e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.992213] >ffff88810613e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.992513]                                                           ^
[   22.992877]  ffff88810613e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.993170]  ffff88810613e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.993435] ==================================================================
[   22.958812] ==================================================================
[   22.959132] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   22.959503] Write of size 1 at addr ffff88810613e0ea by task kunit_try_catch/210
[   22.960021] 
[   22.960135] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.960183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.960196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.960216] Call Trace:
[   22.960231]  <TASK>
[   22.960247]  dump_stack_lvl+0x73/0xb0
[   22.960274]  print_report+0xd1/0x650
[   22.960296]  ? __virt_addr_valid+0x1db/0x2d0
[   22.960331]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.960374]  ? kasan_addr_to_slab+0x11/0xa0
[   22.960394]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.960417]  kasan_report+0x141/0x180
[   22.960455]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.960483]  __asan_report_store1_noabort+0x1b/0x30
[   22.960506]  krealloc_less_oob_helper+0xe90/0x11d0
[   22.960531]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.960554]  ? finish_task_switch.isra.0+0x153/0x700
[   22.960575]  ? __switch_to+0x47/0xf50
[   22.960618]  ? __schedule+0x10cc/0x2b60
[   22.960639]  ? __pfx_read_tsc+0x10/0x10
[   22.960669]  krealloc_large_less_oob+0x1c/0x30
[   22.960757]  kunit_try_run_case+0x1a5/0x480
[   22.960838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.960861]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.960937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.960959]  ? __kthread_parkme+0x82/0x180
[   22.960978]  ? preempt_count_sub+0x50/0x80
[   22.961000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.961025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.961048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.961072]  kthread+0x337/0x6f0
[   22.961091]  ? trace_preempt_on+0x20/0xc0
[   22.961113]  ? __pfx_kthread+0x10/0x10
[   22.961133]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.961156]  ? calculate_sigpending+0x7b/0xa0
[   22.961180]  ? __pfx_kthread+0x10/0x10
[   22.961201]  ret_from_fork+0x116/0x1d0
[   22.961219]  ? __pfx_kthread+0x10/0x10
[   22.961239]  ret_from_fork_asm+0x1a/0x30
[   22.961269]  </TASK>
[   22.961280] 
[   22.969539] The buggy address belongs to the physical page:
[   22.969854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613c
[   22.970191] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.970523] flags: 0x200000000000040(head|node=0|zone=2)
[   22.970759] page_type: f8(unknown)
[   22.971024] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.971371] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.971843] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.972190] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.972564] head: 0200000000000002 ffffea0004184f01 00000000ffffffff 00000000ffffffff
[   22.972900] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.973337] page dumped because: kasan: bad access detected
[   22.973608] 
[   22.973805] Memory state around the buggy address:
[   22.974057]  ffff88810613df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.974381]  ffff88810613e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.974695] >ffff88810613e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.974904]                                                           ^
[   22.975095]  ffff88810613e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.975528]  ffff88810613e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.976035] ==================================================================
[   22.796600] ==================================================================
[   22.797043] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   22.797399] Write of size 1 at addr ffff888105fa06da by task kunit_try_catch/206
[   22.797813] 
[   22.797941] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.797987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.797999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.798019] Call Trace:
[   22.798031]  <TASK>
[   22.798046]  dump_stack_lvl+0x73/0xb0
[   22.798072]  print_report+0xd1/0x650
[   22.798094]  ? __virt_addr_valid+0x1db/0x2d0
[   22.798116]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   22.798138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.798163]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   22.798187]  kasan_report+0x141/0x180
[   22.798208]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   22.798246]  __asan_report_store1_noabort+0x1b/0x30
[   22.798270]  krealloc_less_oob_helper+0xec6/0x11d0
[   22.798314]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.798337]  ? finish_task_switch.isra.0+0x153/0x700
[   22.798358]  ? __switch_to+0x47/0xf50
[   22.798383]  ? __schedule+0x10cc/0x2b60
[   22.798403]  ? __pfx_read_tsc+0x10/0x10
[   22.798426]  krealloc_less_oob+0x1c/0x30
[   22.798447]  kunit_try_run_case+0x1a5/0x480
[   22.798471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.798494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.798514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.798547]  ? __kthread_parkme+0x82/0x180
[   22.798567]  ? preempt_count_sub+0x50/0x80
[   22.798589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.798613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.798636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.798659]  kthread+0x337/0x6f0
[   22.798678]  ? trace_preempt_on+0x20/0xc0
[   22.798708]  ? __pfx_kthread+0x10/0x10
[   22.798791]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.798824]  ? calculate_sigpending+0x7b/0xa0
[   22.798847]  ? __pfx_kthread+0x10/0x10
[   22.798868]  ret_from_fork+0x116/0x1d0
[   22.798897]  ? __pfx_kthread+0x10/0x10
[   22.798917]  ret_from_fork_asm+0x1a/0x30
[   22.798947]  </TASK>
[   22.798958] 
[   22.806801] Allocated by task 206:
[   22.806925]  kasan_save_stack+0x45/0x70
[   22.807060]  kasan_save_track+0x18/0x40
[   22.807188]  kasan_save_alloc_info+0x3b/0x50
[   22.807497]  __kasan_krealloc+0x190/0x1f0
[   22.807695]  krealloc_noprof+0xf3/0x340
[   22.808059]  krealloc_less_oob_helper+0x1aa/0x11d0
[   22.808296]  krealloc_less_oob+0x1c/0x30
[   22.808560]  kunit_try_run_case+0x1a5/0x480
[   22.808984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.809196]  kthread+0x337/0x6f0
[   22.809323]  ret_from_fork+0x116/0x1d0
[   22.809449]  ret_from_fork_asm+0x1a/0x30
[   22.809581] 
[   22.809666] The buggy address belongs to the object at ffff888105fa0600
[   22.809666]  which belongs to the cache kmalloc-256 of size 256
[   22.810523] The buggy address is located 17 bytes to the right of
[   22.810523]  allocated 201-byte region [ffff888105fa0600, ffff888105fa06c9)
[   22.810891] 
[   22.810958] The buggy address belongs to the physical page:
[   22.811399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fa0
[   22.812144] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.812880] flags: 0x200000000000040(head|node=0|zone=2)
[   22.813126] page_type: f5(slab)
[   22.813243] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.813733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.814080] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.814418] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.814832] head: 0200000000000001 ffffea000417e801 00000000ffffffff 00000000ffffffff
[   22.815064] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.815430] page dumped because: kasan: bad access detected
[   22.815674] 
[   22.815761] Memory state around the buggy address:
[   22.816009]  ffff888105fa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.816499]  ffff888105fa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.817022] >ffff888105fa0680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.817338]                                                     ^
[   22.817589]  ffff888105fa0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.817989]  ffff888105fa0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.818289] ==================================================================
[   22.818959] ==================================================================
[   22.819348] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   22.819899] Write of size 1 at addr ffff888105fa06ea by task kunit_try_catch/206
[   22.820217] 
[   22.820347] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.820392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.820416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.820436] Call Trace:
[   22.820448]  <TASK>
[   22.820462]  dump_stack_lvl+0x73/0xb0
[   22.820497]  print_report+0xd1/0x650
[   22.820518]  ? __virt_addr_valid+0x1db/0x2d0
[   22.820540]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.820562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.820587]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.820620]  kasan_report+0x141/0x180
[   22.820642]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.820669]  __asan_report_store1_noabort+0x1b/0x30
[   22.820704]  krealloc_less_oob_helper+0xe90/0x11d0
[   22.820729]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.820752]  ? finish_task_switch.isra.0+0x153/0x700
[   22.820783]  ? __switch_to+0x47/0xf50
[   22.820808]  ? __schedule+0x10cc/0x2b60
[   22.820829]  ? __pfx_read_tsc+0x10/0x10
[   22.820853]  krealloc_less_oob+0x1c/0x30
[   22.820874]  kunit_try_run_case+0x1a5/0x480
[   22.820898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.820920]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.820941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.820963]  ? __kthread_parkme+0x82/0x180
[   22.820983]  ? preempt_count_sub+0x50/0x80
[   22.821005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.821029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.821052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.821076]  kthread+0x337/0x6f0
[   22.821095]  ? trace_preempt_on+0x20/0xc0
[   22.821117]  ? __pfx_kthread+0x10/0x10
[   22.821137]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.821160]  ? calculate_sigpending+0x7b/0xa0
[   22.821183]  ? __pfx_kthread+0x10/0x10
[   22.821204]  ret_from_fork+0x116/0x1d0
[   22.821222]  ? __pfx_kthread+0x10/0x10
[   22.821242]  ret_from_fork_asm+0x1a/0x30
[   22.821272]  </TASK>
[   22.821282] 
[   22.830609] Allocated by task 206:
[   22.830782]  kasan_save_stack+0x45/0x70
[   22.830990]  kasan_save_track+0x18/0x40
[   22.831158]  kasan_save_alloc_info+0x3b/0x50
[   22.831366]  __kasan_krealloc+0x190/0x1f0
[   22.831501]  krealloc_noprof+0xf3/0x340
[   22.831659]  krealloc_less_oob_helper+0x1aa/0x11d0
[   22.831914]  krealloc_less_oob+0x1c/0x30
[   22.832107]  kunit_try_run_case+0x1a5/0x480
[   22.832293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.832471]  kthread+0x337/0x6f0
[   22.832594]  ret_from_fork+0x116/0x1d0
[   22.832805]  ret_from_fork_asm+0x1a/0x30
[   22.833023] 
[   22.833114] The buggy address belongs to the object at ffff888105fa0600
[   22.833114]  which belongs to the cache kmalloc-256 of size 256
[   22.833587] The buggy address is located 33 bytes to the right of
[   22.833587]  allocated 201-byte region [ffff888105fa0600, ffff888105fa06c9)
[   22.834019] 
[   22.834085] The buggy address belongs to the physical page:
[   22.834329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fa0
[   22.834811] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.835081] flags: 0x200000000000040(head|node=0|zone=2)
[   22.835337] page_type: f5(slab)
[   22.835507] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.835886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.836193] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.836522] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.836862] head: 0200000000000001 ffffea000417e801 00000000ffffffff 00000000ffffffff
[   22.837149] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.837422] page dumped because: kasan: bad access detected
[   22.837674] 
[   22.837763] Memory state around the buggy address:
[   22.838091]  ffff888105fa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.838406]  ffff888105fa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.838684] >ffff888105fa0680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.839073]                                                           ^
[   22.839325]  ffff888105fa0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.839533]  ffff888105fa0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.839878] ==================================================================
[   22.941336] ==================================================================
[   22.941651] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   22.942113] Write of size 1 at addr ffff88810613e0da by task kunit_try_catch/210
[   22.942446] 
[   22.942574] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.942619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.942631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.942650] Call Trace:
[   22.942725]  <TASK>
[   22.942742]  dump_stack_lvl+0x73/0xb0
[   22.942770]  print_report+0xd1/0x650
[   22.942791]  ? __virt_addr_valid+0x1db/0x2d0
[   22.942812]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   22.942835]  ? kasan_addr_to_slab+0x11/0xa0
[   22.942855]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   22.942878]  kasan_report+0x141/0x180
[   22.942899]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   22.942926]  __asan_report_store1_noabort+0x1b/0x30
[   22.942950]  krealloc_less_oob_helper+0xec6/0x11d0
[   22.942974]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.942998]  ? finish_task_switch.isra.0+0x153/0x700
[   22.943018]  ? __switch_to+0x47/0xf50
[   22.943043]  ? __schedule+0x10cc/0x2b60
[   22.943063]  ? __pfx_read_tsc+0x10/0x10
[   22.943087]  krealloc_large_less_oob+0x1c/0x30
[   22.943109]  kunit_try_run_case+0x1a5/0x480
[   22.943133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.943156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.943201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.943223]  ? __kthread_parkme+0x82/0x180
[   22.943258]  ? preempt_count_sub+0x50/0x80
[   22.943280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.943305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.943338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.943361]  kthread+0x337/0x6f0
[   22.943380]  ? trace_preempt_on+0x20/0xc0
[   22.943402]  ? __pfx_kthread+0x10/0x10
[   22.943422]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.943446]  ? calculate_sigpending+0x7b/0xa0
[   22.943469]  ? __pfx_kthread+0x10/0x10
[   22.943527]  ret_from_fork+0x116/0x1d0
[   22.943546]  ? __pfx_kthread+0x10/0x10
[   22.943582]  ret_from_fork_asm+0x1a/0x30
[   22.943613]  </TASK>
[   22.943623] 
[   22.951622] The buggy address belongs to the physical page:
[   22.952019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613c
[   22.952580] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.953053] flags: 0x200000000000040(head|node=0|zone=2)
[   22.953302] page_type: f8(unknown)
[   22.953480] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.953816] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.954044] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.954525] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.954848] head: 0200000000000002 ffffea0004184f01 00000000ffffffff 00000000ffffffff
[   22.955216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.955591] page dumped because: kasan: bad access detected
[   22.955958] 
[   22.956056] Memory state around the buggy address:
[   22.956278]  ffff88810613df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.956621]  ffff88810613e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.957048] >ffff88810613e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.957387]                                                     ^
[   22.957628]  ffff88810613e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.957974]  ffff88810613e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.958330] ==================================================================
[   22.751534] ==================================================================
[   22.752224] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   22.752864] Write of size 1 at addr ffff888105fa06c9 by task kunit_try_catch/206
[   22.753436] 
[   22.753615] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.753666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.753678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.753698] Call Trace:
[   22.753710]  <TASK>
[   22.753726]  dump_stack_lvl+0x73/0xb0
[   22.753824]  print_report+0xd1/0x650
[   22.753847]  ? __virt_addr_valid+0x1db/0x2d0
[   22.753921]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.753947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.753973]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.753997]  kasan_report+0x141/0x180
[   22.754018]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.754045]  __asan_report_store1_noabort+0x1b/0x30
[   22.754069]  krealloc_less_oob_helper+0xd70/0x11d0
[   22.754093]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.754116]  ? finish_task_switch.isra.0+0x153/0x700
[   22.754139]  ? __switch_to+0x47/0xf50
[   22.754164]  ? __schedule+0x10cc/0x2b60
[   22.754185]  ? __pfx_read_tsc+0x10/0x10
[   22.754209]  krealloc_less_oob+0x1c/0x30
[   22.754230]  kunit_try_run_case+0x1a5/0x480
[   22.754254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.754277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.754298]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.754331]  ? __kthread_parkme+0x82/0x180
[   22.754361]  ? preempt_count_sub+0x50/0x80
[   22.754383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.754407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.754442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.754466]  kthread+0x337/0x6f0
[   22.754486]  ? trace_preempt_on+0x20/0xc0
[   22.754520]  ? __pfx_kthread+0x10/0x10
[   22.754540]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.754563]  ? calculate_sigpending+0x7b/0xa0
[   22.754596]  ? __pfx_kthread+0x10/0x10
[   22.754617]  ret_from_fork+0x116/0x1d0
[   22.754636]  ? __pfx_kthread+0x10/0x10
[   22.754656]  ret_from_fork_asm+0x1a/0x30
[   22.754732]  </TASK>
[   22.754746] 
[   22.762589] Allocated by task 206:
[   22.762765]  kasan_save_stack+0x45/0x70
[   22.762958]  kasan_save_track+0x18/0x40
[   22.763186]  kasan_save_alloc_info+0x3b/0x50
[   22.763345]  __kasan_krealloc+0x190/0x1f0
[   22.763600]  krealloc_noprof+0xf3/0x340
[   22.763849]  krealloc_less_oob_helper+0x1aa/0x11d0
[   22.764160]  krealloc_less_oob+0x1c/0x30
[   22.764493]  kunit_try_run_case+0x1a5/0x480
[   22.764813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.765081]  kthread+0x337/0x6f0
[   22.765232]  ret_from_fork+0x116/0x1d0
[   22.765370]  ret_from_fork_asm+0x1a/0x30
[   22.765505] 
[   22.765570] The buggy address belongs to the object at ffff888105fa0600
[   22.765570]  which belongs to the cache kmalloc-256 of size 256
[   22.766068] The buggy address is located 0 bytes to the right of
[   22.766068]  allocated 201-byte region [ffff888105fa0600, ffff888105fa06c9)
[   22.766585] 
[   22.766652] The buggy address belongs to the physical page:
[   22.766818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fa0
[   22.767582] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.768162] flags: 0x200000000000040(head|node=0|zone=2)
[   22.768356] page_type: f5(slab)
[   22.768474] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.768882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.769345] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.769907] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.770211] head: 0200000000000001 ffffea000417e801 00000000ffffffff 00000000ffffffff
[   22.770522] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.770857] page dumped because: kasan: bad access detected
[   22.771022] 
[   22.771170] Memory state around the buggy address:
[   22.771398]  ffff888105fa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.771639]  ffff888105fa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.772044] >ffff888105fa0680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.772372]                                               ^
[   22.772609]  ffff888105fa0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.773054]  ffff888105fa0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.773379] ==================================================================

[   23.210872] ==================================================================
[   23.211220] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   23.211567] Write of size 1 at addr ffff8881060b20ea by task kunit_try_catch/211
[   23.211814] 
[   23.211940] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.212096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.212111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.212133] Call Trace:
[   23.212155]  <TASK>
[   23.212176]  dump_stack_lvl+0x73/0xb0
[   23.212206]  print_report+0xd1/0x650
[   23.212229]  ? __virt_addr_valid+0x1db/0x2d0
[   23.212253]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   23.212276]  ? kasan_addr_to_slab+0x11/0xa0
[   23.212295]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   23.212318]  kasan_report+0x141/0x180
[   23.212340]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   23.212367]  __asan_report_store1_noabort+0x1b/0x30
[   23.212391]  krealloc_less_oob_helper+0xe90/0x11d0
[   23.212415]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.212438]  ? finish_task_switch.isra.0+0x153/0x700
[   23.212735]  ? __switch_to+0x47/0xf50
[   23.212786]  ? __schedule+0x10cc/0x2b60
[   23.212810]  ? __pfx_read_tsc+0x10/0x10
[   23.212836]  krealloc_large_less_oob+0x1c/0x30
[   23.212859]  kunit_try_run_case+0x1a5/0x480
[   23.212884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.212908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.213239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.213276]  ? __kthread_parkme+0x82/0x180
[   23.213298]  ? preempt_count_sub+0x50/0x80
[   23.213320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.213344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.213370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.213395]  kthread+0x337/0x6f0
[   23.213415]  ? trace_preempt_on+0x20/0xc0
[   23.213440]  ? __pfx_kthread+0x10/0x10
[   23.213460]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.213483]  ? calculate_sigpending+0x7b/0xa0
[   23.213507]  ? __pfx_kthread+0x10/0x10
[   23.213528]  ret_from_fork+0x116/0x1d0
[   23.213547]  ? __pfx_kthread+0x10/0x10
[   23.213567]  ret_from_fork_asm+0x1a/0x30
[   23.213598]  </TASK>
[   23.213610] 
[   23.223600] The buggy address belongs to the physical page:
[   23.224288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b0
[   23.224655] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.225116] flags: 0x200000000000040(head|node=0|zone=2)
[   23.225484] page_type: f8(unknown)
[   23.225702] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.226049] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.226374] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.226804] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.227110] head: 0200000000000002 ffffea0004182c01 00000000ffffffff 00000000ffffffff
[   23.227490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.227813] page dumped because: kasan: bad access detected
[   23.228195] 
[   23.228547] Memory state around the buggy address:
[   23.228758]  ffff8881060b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.229152]  ffff8881060b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.229631] >ffff8881060b2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.229971]                                                           ^
[   23.230428]  ffff8881060b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.230738]  ffff8881060b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.231145] ==================================================================
[   23.035640] ==================================================================
[   23.035935] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   23.036484] Write of size 1 at addr ffff8881055728ea by task kunit_try_catch/207
[   23.036878] 
[   23.037003] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.037080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.037093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.037129] Call Trace:
[   23.037151]  <TASK>
[   23.037172]  dump_stack_lvl+0x73/0xb0
[   23.037203]  print_report+0xd1/0x650
[   23.037226]  ? __virt_addr_valid+0x1db/0x2d0
[   23.037249]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   23.037272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.037298]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   23.037322]  kasan_report+0x141/0x180
[   23.037344]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   23.037372]  __asan_report_store1_noabort+0x1b/0x30
[   23.037396]  krealloc_less_oob_helper+0xe90/0x11d0
[   23.037476]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.037505]  ? finish_task_switch.isra.0+0x4c5/0x700
[   23.037550]  ? __switch_to+0x47/0xf50
[   23.037576]  ? __schedule+0x10cc/0x2b60
[   23.037598]  ? __pfx_read_tsc+0x10/0x10
[   23.037640]  krealloc_less_oob+0x1c/0x30
[   23.037661]  kunit_try_run_case+0x1a5/0x480
[   23.037687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.037710]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.037732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.037753]  ? __kthread_parkme+0x82/0x180
[   23.037773]  ? preempt_count_sub+0x50/0x80
[   23.037796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.037825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.037849]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.037890]  kthread+0x337/0x6f0
[   23.037909]  ? trace_preempt_on+0x20/0xc0
[   23.037940]  ? __pfx_kthread+0x10/0x10
[   23.037961]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.037984]  ? calculate_sigpending+0x7b/0xa0
[   23.038009]  ? __pfx_kthread+0x10/0x10
[   23.038030]  ret_from_fork+0x116/0x1d0
[   23.038049]  ? __pfx_kthread+0x10/0x10
[   23.038097]  ret_from_fork_asm+0x1a/0x30
[   23.038129]  </TASK>
[   23.038141] 
[   23.046557] Allocated by task 207:
[   23.046766]  kasan_save_stack+0x45/0x70
[   23.046986]  kasan_save_track+0x18/0x40
[   23.047230]  kasan_save_alloc_info+0x3b/0x50
[   23.047444]  __kasan_krealloc+0x190/0x1f0
[   23.047783]  krealloc_noprof+0xf3/0x340
[   23.048166]  krealloc_less_oob_helper+0x1aa/0x11d0
[   23.048349]  krealloc_less_oob+0x1c/0x30
[   23.048634]  kunit_try_run_case+0x1a5/0x480
[   23.048864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.049098]  kthread+0x337/0x6f0
[   23.049248]  ret_from_fork+0x116/0x1d0
[   23.049493]  ret_from_fork_asm+0x1a/0x30
[   23.049643] 
[   23.049750] The buggy address belongs to the object at ffff888105572800
[   23.049750]  which belongs to the cache kmalloc-256 of size 256
[   23.050316] The buggy address is located 33 bytes to the right of
[   23.050316]  allocated 201-byte region [ffff888105572800, ffff8881055728c9)
[   23.050904] 
[   23.050970] The buggy address belongs to the physical page:
[   23.051401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572
[   23.051801] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.052148] flags: 0x200000000000040(head|node=0|zone=2)
[   23.052399] page_type: f5(slab)
[   23.052521] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.052757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.053090] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.053408] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.054126] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff
[   23.054517] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.054865] page dumped because: kasan: bad access detected
[   23.055107] 
[   23.055171] Memory state around the buggy address:
[   23.055313]  ffff888105572780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.055511]  ffff888105572800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.055946] >ffff888105572880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.056329]                                                           ^
[   23.056612]  ffff888105572900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.057031]  ffff888105572980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.057456] ==================================================================
[   22.983037] ==================================================================
[   22.983494] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   22.983950] Write of size 1 at addr ffff8881055728d0 by task kunit_try_catch/207
[   22.984208] 
[   22.984568] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.984621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.984634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.984747] Call Trace:
[   22.984762]  <TASK>
[   22.984783]  dump_stack_lvl+0x73/0xb0
[   22.984817]  print_report+0xd1/0x650
[   22.984840]  ? __virt_addr_valid+0x1db/0x2d0
[   22.984863]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.984886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.984912]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.984935]  kasan_report+0x141/0x180
[   22.984958]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   22.984987]  __asan_report_store1_noabort+0x1b/0x30
[   22.985013]  krealloc_less_oob_helper+0xe23/0x11d0
[   22.985039]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.985074]  ? finish_task_switch.isra.0+0x4c5/0x700
[   22.985096]  ? __switch_to+0x47/0xf50
[   22.985122]  ? __schedule+0x10cc/0x2b60
[   22.985143]  ? __pfx_read_tsc+0x10/0x10
[   22.985167]  krealloc_less_oob+0x1c/0x30
[   22.985212]  kunit_try_run_case+0x1a5/0x480
[   22.985239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.985262]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.985283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.985304]  ? __kthread_parkme+0x82/0x180
[   22.985324]  ? preempt_count_sub+0x50/0x80
[   22.985346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.985371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.985394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.985418]  kthread+0x337/0x6f0
[   22.985437]  ? trace_preempt_on+0x20/0xc0
[   22.985460]  ? __pfx_kthread+0x10/0x10
[   22.985480]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.985504]  ? calculate_sigpending+0x7b/0xa0
[   22.985527]  ? __pfx_kthread+0x10/0x10
[   22.985548]  ret_from_fork+0x116/0x1d0
[   22.985567]  ? __pfx_kthread+0x10/0x10
[   22.985587]  ret_from_fork_asm+0x1a/0x30
[   22.985618]  </TASK>
[   22.985630] 
[   22.997123] Allocated by task 207:
[   22.997429]  kasan_save_stack+0x45/0x70
[   22.997734]  kasan_save_track+0x18/0x40
[   22.997931]  kasan_save_alloc_info+0x3b/0x50
[   22.998549]  __kasan_krealloc+0x190/0x1f0
[   22.998713]  krealloc_noprof+0xf3/0x340
[   22.999139]  krealloc_less_oob_helper+0x1aa/0x11d0
[   22.999501]  krealloc_less_oob+0x1c/0x30
[   22.999704]  kunit_try_run_case+0x1a5/0x480
[   22.999921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.000606]  kthread+0x337/0x6f0
[   23.000774]  ret_from_fork+0x116/0x1d0
[   23.000918]  ret_from_fork_asm+0x1a/0x30
[   23.001521] 
[   23.001613] The buggy address belongs to the object at ffff888105572800
[   23.001613]  which belongs to the cache kmalloc-256 of size 256
[   23.002479] The buggy address is located 7 bytes to the right of
[   23.002479]  allocated 201-byte region [ffff888105572800, ffff8881055728c9)
[   23.003391] 
[   23.003507] The buggy address belongs to the physical page:
[   23.003753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572
[   23.004449] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.005327] flags: 0x200000000000040(head|node=0|zone=2)
[   23.005586] page_type: f5(slab)
[   23.005746] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.006409] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.006851] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.007559] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.007895] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff
[   23.008528] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.008912] page dumped because: kasan: bad access detected
[   23.009234] 
[   23.009343] Memory state around the buggy address:
[   23.009542]  ffff888105572780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.009868]  ffff888105572800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.010632] >ffff888105572880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.010953]                                                  ^
[   23.011160]  ffff888105572900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.011476]  ffff888105572980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.011752] ==================================================================
[   23.160877] ==================================================================
[   23.161134] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   23.161715] Write of size 1 at addr ffff8881060b20d0 by task kunit_try_catch/211
[   23.162470] 
[   23.162749] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.162805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.162818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.162840] Call Trace:
[   23.162862]  <TASK>
[   23.162883]  dump_stack_lvl+0x73/0xb0
[   23.162927]  print_report+0xd1/0x650
[   23.162950]  ? __virt_addr_valid+0x1db/0x2d0
[   23.162986]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   23.163010]  ? kasan_addr_to_slab+0x11/0xa0
[   23.163030]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   23.163073]  kasan_report+0x141/0x180
[   23.163094]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   23.163121]  __asan_report_store1_noabort+0x1b/0x30
[   23.163145]  krealloc_less_oob_helper+0xe23/0x11d0
[   23.163169]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.163192]  ? finish_task_switch.isra.0+0x153/0x700
[   23.163222]  ? __switch_to+0x47/0xf50
[   23.163248]  ? __schedule+0x10cc/0x2b60
[   23.163269]  ? __pfx_read_tsc+0x10/0x10
[   23.163294]  krealloc_large_less_oob+0x1c/0x30
[   23.163316]  kunit_try_run_case+0x1a5/0x480
[   23.163342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.163364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.163385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.163406]  ? __kthread_parkme+0x82/0x180
[   23.163426]  ? preempt_count_sub+0x50/0x80
[   23.163448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.163471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.163495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.163518]  kthread+0x337/0x6f0
[   23.163538]  ? trace_preempt_on+0x20/0xc0
[   23.163561]  ? __pfx_kthread+0x10/0x10
[   23.163581]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.163604]  ? calculate_sigpending+0x7b/0xa0
[   23.163628]  ? __pfx_kthread+0x10/0x10
[   23.163648]  ret_from_fork+0x116/0x1d0
[   23.163667]  ? __pfx_kthread+0x10/0x10
[   23.163687]  ret_from_fork_asm+0x1a/0x30
[   23.163719]  </TASK>
[   23.163731] 
[   23.178175] The buggy address belongs to the physical page:
[   23.178419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b0
[   23.179114] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.179887] flags: 0x200000000000040(head|node=0|zone=2)
[   23.180440] page_type: f8(unknown)
[   23.180837] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.181514] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.182121] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.182889] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.183529] head: 0200000000000002 ffffea0004182c01 00000000ffffffff 00000000ffffffff
[   23.184244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.184713] page dumped because: kasan: bad access detected
[   23.185240] 
[   23.185396] Memory state around the buggy address:
[   23.185818]  ffff8881060b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.186100]  ffff8881060b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.186831] >ffff8881060b2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.187424]                                                  ^
[   23.188015]  ffff8881060b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.188605]  ffff8881060b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.188962] ==================================================================
[   23.130264] ==================================================================
[   23.131325] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   23.131759] Write of size 1 at addr ffff8881060b20c9 by task kunit_try_catch/211
[   23.132227] 
[   23.132431] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.132486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.132499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.132521] Call Trace:
[   23.132535]  <TASK>
[   23.132555]  dump_stack_lvl+0x73/0xb0
[   23.132585]  print_report+0xd1/0x650
[   23.132608]  ? __virt_addr_valid+0x1db/0x2d0
[   23.132631]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   23.132653]  ? kasan_addr_to_slab+0x11/0xa0
[   23.132673]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   23.132695]  kasan_report+0x141/0x180
[   23.132752]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   23.132780]  __asan_report_store1_noabort+0x1b/0x30
[   23.132816]  krealloc_less_oob_helper+0xd70/0x11d0
[   23.132841]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.132864]  ? finish_task_switch.isra.0+0x153/0x700
[   23.132885]  ? __switch_to+0x47/0xf50
[   23.132912]  ? __schedule+0x10cc/0x2b60
[   23.132950]  ? __pfx_read_tsc+0x10/0x10
[   23.132974]  krealloc_large_less_oob+0x1c/0x30
[   23.132996]  kunit_try_run_case+0x1a5/0x480
[   23.133023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.133045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.133077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.133098]  ? __kthread_parkme+0x82/0x180
[   23.133118]  ? preempt_count_sub+0x50/0x80
[   23.133140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.133164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.133234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.133258]  kthread+0x337/0x6f0
[   23.133277]  ? trace_preempt_on+0x20/0xc0
[   23.133301]  ? __pfx_kthread+0x10/0x10
[   23.133321]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.133344]  ? calculate_sigpending+0x7b/0xa0
[   23.133367]  ? __pfx_kthread+0x10/0x10
[   23.133388]  ret_from_fork+0x116/0x1d0
[   23.133407]  ? __pfx_kthread+0x10/0x10
[   23.133427]  ret_from_fork_asm+0x1a/0x30
[   23.133457]  </TASK>
[   23.133469] 
[   23.145098] The buggy address belongs to the physical page:
[   23.145610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b0
[   23.146069] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.147100] flags: 0x200000000000040(head|node=0|zone=2)
[   23.147885] page_type: f8(unknown)
[   23.148461] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.149296] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.150194] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.150991] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.151772] head: 0200000000000002 ffffea0004182c01 00000000ffffffff 00000000ffffffff
[   23.152874] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.153805] page dumped because: kasan: bad access detected
[   23.154431] 
[   23.154594] Memory state around the buggy address:
[   23.155087]  ffff8881060b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.155875]  ffff8881060b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.156814] >ffff8881060b2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.157520]                                               ^
[   23.158103]  ffff8881060b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.158919]  ffff8881060b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.159732] ==================================================================
[   23.189406] ==================================================================
[   23.190055] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   23.190538] Write of size 1 at addr ffff8881060b20da by task kunit_try_catch/211
[   23.191178] 
[   23.191422] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.191473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.191485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.191508] Call Trace:
[   23.191529]  <TASK>
[   23.191550]  dump_stack_lvl+0x73/0xb0
[   23.191579]  print_report+0xd1/0x650
[   23.191601]  ? __virt_addr_valid+0x1db/0x2d0
[   23.191626]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.191648]  ? kasan_addr_to_slab+0x11/0xa0
[   23.191669]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.191692]  kasan_report+0x141/0x180
[   23.191713]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.191740]  __asan_report_store1_noabort+0x1b/0x30
[   23.191764]  krealloc_less_oob_helper+0xec6/0x11d0
[   23.191789]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.191813]  ? finish_task_switch.isra.0+0x153/0x700
[   23.191834]  ? __switch_to+0x47/0xf50
[   23.191860]  ? __schedule+0x10cc/0x2b60
[   23.191881]  ? __pfx_read_tsc+0x10/0x10
[   23.191907]  krealloc_large_less_oob+0x1c/0x30
[   23.191929]  kunit_try_run_case+0x1a5/0x480
[   23.191966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.191989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.192010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.192032]  ? __kthread_parkme+0x82/0x180
[   23.192052]  ? preempt_count_sub+0x50/0x80
[   23.192084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.192108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.192132]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.192156]  kthread+0x337/0x6f0
[   23.192175]  ? trace_preempt_on+0x20/0xc0
[   23.192215]  ? __pfx_kthread+0x10/0x10
[   23.192236]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.192259]  ? calculate_sigpending+0x7b/0xa0
[   23.192283]  ? __pfx_kthread+0x10/0x10
[   23.192304]  ret_from_fork+0x116/0x1d0
[   23.192323]  ? __pfx_kthread+0x10/0x10
[   23.192344]  ret_from_fork_asm+0x1a/0x30
[   23.192375]  </TASK>
[   23.192388] 
[   23.203451] The buggy address belongs to the physical page:
[   23.203874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b0
[   23.204411] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.204864] flags: 0x200000000000040(head|node=0|zone=2)
[   23.205088] page_type: f8(unknown)
[   23.205314] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.205656] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.206036] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.206407] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.206736] head: 0200000000000002 ffffea0004182c01 00000000ffffffff 00000000ffffffff
[   23.207190] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.207721] page dumped because: kasan: bad access detected
[   23.208105] 
[   23.208176] Memory state around the buggy address:
[   23.208423]  ffff8881060b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.208740]  ffff8881060b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.209157] >ffff8881060b2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.209566]                                                     ^
[   23.209884]  ffff8881060b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.210166]  ffff8881060b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.210484] ==================================================================
[   22.958002] ==================================================================
[   22.958580] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   22.958888] Write of size 1 at addr ffff8881055728c9 by task kunit_try_catch/207
[   22.959236] 
[   22.959333] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.959385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.959398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.959421] Call Trace:
[   22.959436]  <TASK>
[   22.959455]  dump_stack_lvl+0x73/0xb0
[   22.959485]  print_report+0xd1/0x650
[   22.959508]  ? __virt_addr_valid+0x1db/0x2d0
[   22.959532]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.959554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.959580]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.959603]  kasan_report+0x141/0x180
[   22.959625]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.959652]  __asan_report_store1_noabort+0x1b/0x30
[   22.959676]  krealloc_less_oob_helper+0xd70/0x11d0
[   22.959701]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.959724]  ? finish_task_switch.isra.0+0x4c5/0x700
[   22.959746]  ? __switch_to+0x47/0xf50
[   22.959772]  ? __schedule+0x10cc/0x2b60
[   22.959793]  ? __pfx_read_tsc+0x10/0x10
[   22.959818]  krealloc_less_oob+0x1c/0x30
[   22.959839]  kunit_try_run_case+0x1a5/0x480
[   22.959865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.959888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.959911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.959944]  ? __kthread_parkme+0x82/0x180
[   22.959965]  ? preempt_count_sub+0x50/0x80
[   22.959987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.960012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.960036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.960070]  kthread+0x337/0x6f0
[   22.960089]  ? trace_preempt_on+0x20/0xc0
[   22.960112]  ? __pfx_kthread+0x10/0x10
[   22.960132]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.960156]  ? calculate_sigpending+0x7b/0xa0
[   22.960181]  ? __pfx_kthread+0x10/0x10
[   22.960202]  ret_from_fork+0x116/0x1d0
[   22.960221]  ? __pfx_kthread+0x10/0x10
[   22.960242]  ret_from_fork_asm+0x1a/0x30
[   22.960272]  </TASK>
[   22.960285] 
[   22.967951] Allocated by task 207:
[   22.968140]  kasan_save_stack+0x45/0x70
[   22.968462]  kasan_save_track+0x18/0x40
[   22.968636]  kasan_save_alloc_info+0x3b/0x50
[   22.968777]  __kasan_krealloc+0x190/0x1f0
[   22.968909]  krealloc_noprof+0xf3/0x340
[   22.969041]  krealloc_less_oob_helper+0x1aa/0x11d0
[   22.969275]  krealloc_less_oob+0x1c/0x30
[   22.969465]  kunit_try_run_case+0x1a5/0x480
[   22.969670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.970057]  kthread+0x337/0x6f0
[   22.970818]  ret_from_fork+0x116/0x1d0
[   22.971022]  ret_from_fork_asm+0x1a/0x30
[   22.971245] 
[   22.971535] The buggy address belongs to the object at ffff888105572800
[   22.971535]  which belongs to the cache kmalloc-256 of size 256
[   22.972876] The buggy address is located 0 bytes to the right of
[   22.972876]  allocated 201-byte region [ffff888105572800, ffff8881055728c9)
[   22.974404] 
[   22.974493] The buggy address belongs to the physical page:
[   22.974702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572
[   22.975215] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.975644] flags: 0x200000000000040(head|node=0|zone=2)
[   22.975853] page_type: f5(slab)
[   22.976020] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.976443] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.977217] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.977611] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.977980] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff
[   22.978276] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.978820] page dumped because: kasan: bad access detected
[   22.979105] 
[   22.979198] Memory state around the buggy address:
[   22.979391]  ffff888105572780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.979886]  ffff888105572800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.980345] >ffff888105572880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.980553]                                               ^
[   22.980802]  ffff888105572900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.981152]  ffff888105572980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.981706] ==================================================================
[   23.057979] ==================================================================
[   23.058381] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   23.058894] Write of size 1 at addr ffff8881055728eb by task kunit_try_catch/207
[   23.059316] 
[   23.059420] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.059469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.059482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.059503] Call Trace:
[   23.059524]  <TASK>
[   23.059563]  dump_stack_lvl+0x73/0xb0
[   23.059593]  print_report+0xd1/0x650
[   23.059615]  ? __virt_addr_valid+0x1db/0x2d0
[   23.059639]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   23.059662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.059687]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   23.059728]  kasan_report+0x141/0x180
[   23.059749]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   23.059776]  __asan_report_store1_noabort+0x1b/0x30
[   23.059800]  krealloc_less_oob_helper+0xd47/0x11d0
[   23.059825]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.059848]  ? finish_task_switch.isra.0+0x4c5/0x700
[   23.059886]  ? __switch_to+0x47/0xf50
[   23.059911]  ? __schedule+0x10cc/0x2b60
[   23.059942]  ? __pfx_read_tsc+0x10/0x10
[   23.059967]  krealloc_less_oob+0x1c/0x30
[   23.060004]  kunit_try_run_case+0x1a5/0x480
[   23.060030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.060092]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.060115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.060149]  ? __kthread_parkme+0x82/0x180
[   23.060169]  ? preempt_count_sub+0x50/0x80
[   23.060206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.060231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.060255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.060279]  kthread+0x337/0x6f0
[   23.060298]  ? trace_preempt_on+0x20/0xc0
[   23.060321]  ? __pfx_kthread+0x10/0x10
[   23.060341]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.060364]  ? calculate_sigpending+0x7b/0xa0
[   23.060388]  ? __pfx_kthread+0x10/0x10
[   23.060409]  ret_from_fork+0x116/0x1d0
[   23.060428]  ? __pfx_kthread+0x10/0x10
[   23.060448]  ret_from_fork_asm+0x1a/0x30
[   23.060478]  </TASK>
[   23.060490] 
[   23.068489] Allocated by task 207:
[   23.068772]  kasan_save_stack+0x45/0x70
[   23.069005]  kasan_save_track+0x18/0x40
[   23.069533]  kasan_save_alloc_info+0x3b/0x50
[   23.069738]  __kasan_krealloc+0x190/0x1f0
[   23.069956]  krealloc_noprof+0xf3/0x340
[   23.070294]  krealloc_less_oob_helper+0x1aa/0x11d0
[   23.070710]  krealloc_less_oob+0x1c/0x30
[   23.070899]  kunit_try_run_case+0x1a5/0x480
[   23.071125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.071434]  kthread+0x337/0x6f0
[   23.071605]  ret_from_fork+0x116/0x1d0
[   23.071783]  ret_from_fork_asm+0x1a/0x30
[   23.072037] 
[   23.072124] The buggy address belongs to the object at ffff888105572800
[   23.072124]  which belongs to the cache kmalloc-256 of size 256
[   23.072660] The buggy address is located 34 bytes to the right of
[   23.072660]  allocated 201-byte region [ffff888105572800, ffff8881055728c9)
[   23.073136] 
[   23.073205] The buggy address belongs to the physical page:
[   23.073457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572
[   23.073812] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.074248] flags: 0x200000000000040(head|node=0|zone=2)
[   23.074438] page_type: f5(slab)
[   23.074554] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.074768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.075107] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.075776] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.076154] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff
[   23.076853] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.077386] page dumped because: kasan: bad access detected
[   23.077869] 
[   23.077963] Memory state around the buggy address:
[   23.078269]  ffff888105572780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.078602]  ffff888105572800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.078865] >ffff888105572880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.079172]                                                           ^
[   23.079549]  ffff888105572900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.079836]  ffff888105572980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.080315] ==================================================================
[   23.231647] ==================================================================
[   23.231966] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   23.232514] Write of size 1 at addr ffff8881060b20eb by task kunit_try_catch/211
[   23.232799] 
[   23.232914] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.232965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.232977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.233000] Call Trace:
[   23.233033]  <TASK>
[   23.233054]  dump_stack_lvl+0x73/0xb0
[   23.233106]  print_report+0xd1/0x650
[   23.233130]  ? __virt_addr_valid+0x1db/0x2d0
[   23.233153]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   23.233176]  ? kasan_addr_to_slab+0x11/0xa0
[   23.233196]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   23.233219]  kasan_report+0x141/0x180
[   23.233240]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   23.233267]  __asan_report_store1_noabort+0x1b/0x30
[   23.233292]  krealloc_less_oob_helper+0xd47/0x11d0
[   23.233316]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.233340]  ? finish_task_switch.isra.0+0x153/0x700
[   23.233362]  ? __switch_to+0x47/0xf50
[   23.233388]  ? __schedule+0x10cc/0x2b60
[   23.233409]  ? __pfx_read_tsc+0x10/0x10
[   23.233434]  krealloc_large_less_oob+0x1c/0x30
[   23.233542]  kunit_try_run_case+0x1a5/0x480
[   23.233581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.233604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.233625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.233659]  ? __kthread_parkme+0x82/0x180
[   23.233680]  ? preempt_count_sub+0x50/0x80
[   23.233712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.233736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.233770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.233794]  kthread+0x337/0x6f0
[   23.233813]  ? trace_preempt_on+0x20/0xc0
[   23.233844]  ? __pfx_kthread+0x10/0x10
[   23.233864]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.233888]  ? calculate_sigpending+0x7b/0xa0
[   23.233912]  ? __pfx_kthread+0x10/0x10
[   23.233943]  ret_from_fork+0x116/0x1d0
[   23.233962]  ? __pfx_kthread+0x10/0x10
[   23.233982]  ret_from_fork_asm+0x1a/0x30
[   23.234013]  </TASK>
[   23.234025] 
[   23.242630] The buggy address belongs to the physical page:
[   23.242931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b0
[   23.243307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.243649] flags: 0x200000000000040(head|node=0|zone=2)
[   23.243898] page_type: f8(unknown)
[   23.244135] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.244355] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.244690] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.245152] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.245618] head: 0200000000000002 ffffea0004182c01 00000000ffffffff 00000000ffffffff
[   23.245970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.246518] page dumped because: kasan: bad access detected
[   23.246744] 
[   23.246835] Memory state around the buggy address:
[   23.247072]  ffff8881060b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.247497]  ffff8881060b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.247798] >ffff8881060b2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.248122]                                                           ^
[   23.248514]  ffff8881060b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.248827]  ffff8881060b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.249190] ==================================================================
[   23.012428] ==================================================================
[   23.012763] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   23.013136] Write of size 1 at addr ffff8881055728da by task kunit_try_catch/207
[   23.013358] 
[   23.013452] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.013505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.013517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.013541] Call Trace:
[   23.013564]  <TASK>
[   23.013586]  dump_stack_lvl+0x73/0xb0
[   23.013685]  print_report+0xd1/0x650
[   23.013709]  ? __virt_addr_valid+0x1db/0x2d0
[   23.013734]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.013757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.013783]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.013806]  kasan_report+0x141/0x180
[   23.013834]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.013861]  __asan_report_store1_noabort+0x1b/0x30
[   23.013885]  krealloc_less_oob_helper+0xec6/0x11d0
[   23.013911]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.013948]  ? finish_task_switch.isra.0+0x4c5/0x700
[   23.013971]  ? __switch_to+0x47/0xf50
[   23.013996]  ? __schedule+0x10cc/0x2b60
[   23.014018]  ? __pfx_read_tsc+0x10/0x10
[   23.014042]  krealloc_less_oob+0x1c/0x30
[   23.014076]  kunit_try_run_case+0x1a5/0x480
[   23.014103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.014126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.014147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.014170]  ? __kthread_parkme+0x82/0x180
[   23.014225]  ? preempt_count_sub+0x50/0x80
[   23.014249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.014274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.014297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.014321]  kthread+0x337/0x6f0
[   23.014341]  ? trace_preempt_on+0x20/0xc0
[   23.014364]  ? __pfx_kthread+0x10/0x10
[   23.014385]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.014409]  ? calculate_sigpending+0x7b/0xa0
[   23.014432]  ? __pfx_kthread+0x10/0x10
[   23.014453]  ret_from_fork+0x116/0x1d0
[   23.014472]  ? __pfx_kthread+0x10/0x10
[   23.014492]  ret_from_fork_asm+0x1a/0x30
[   23.014523]  </TASK>
[   23.014536] 
[   23.023193] Allocated by task 207:
[   23.023336]  kasan_save_stack+0x45/0x70
[   23.023485]  kasan_save_track+0x18/0x40
[   23.023670]  kasan_save_alloc_info+0x3b/0x50
[   23.023876]  __kasan_krealloc+0x190/0x1f0
[   23.024261]  krealloc_noprof+0xf3/0x340
[   23.024455]  krealloc_less_oob_helper+0x1aa/0x11d0
[   23.024603]  krealloc_less_oob+0x1c/0x30
[   23.024759]  kunit_try_run_case+0x1a5/0x480
[   23.024992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.025249]  kthread+0x337/0x6f0
[   23.025512]  ret_from_fork+0x116/0x1d0
[   23.025943]  ret_from_fork_asm+0x1a/0x30
[   23.026300] 
[   23.026376] The buggy address belongs to the object at ffff888105572800
[   23.026376]  which belongs to the cache kmalloc-256 of size 256
[   23.026919] The buggy address is located 17 bytes to the right of
[   23.026919]  allocated 201-byte region [ffff888105572800, ffff8881055728c9)
[   23.027502] 
[   23.027628] The buggy address belongs to the physical page:
[   23.027901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572
[   23.028249] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.028638] flags: 0x200000000000040(head|node=0|zone=2)
[   23.028893] page_type: f5(slab)
[   23.029052] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.029402] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.029644] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.030058] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.030565] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff
[   23.030848] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.031495] page dumped because: kasan: bad access detected
[   23.031952] 
[   23.032265] Memory state around the buggy address:
[   23.032498]  ffff888105572780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.032765]  ffff888105572800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.033128] >ffff888105572880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.033725]                                                     ^
[   23.033996]  ffff888105572900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.034499]  ffff888105572980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.034697] ==================================================================