Hay
Date
July 4, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.468282] ==================================================================
[   29.468335] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.468792] Write of size 1 at addr fff00000c9a560f0 by task kunit_try_catch/193
[   29.468862] 
[   29.468893] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   29.469486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.469526] Hardware name: linux,dummy-virt (DT)
[   29.469556] Call trace:
[   29.469578]  show_stack+0x20/0x38 (C)
[   29.469751]  dump_stack_lvl+0x8c/0xd0
[   29.469996]  print_report+0x118/0x608
[   29.470065]  kasan_report+0xdc/0x128
[   29.470110]  __asan_report_store1_noabort+0x20/0x30
[   29.470157]  krealloc_more_oob_helper+0x5c0/0x678
[   29.470205]  krealloc_large_more_oob+0x20/0x38
[   29.470252]  kunit_try_run_case+0x170/0x3f0
[   29.470685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.470860]  kthread+0x328/0x630
[   29.470917]  ret_from_fork+0x10/0x20
[   29.471073] 
[   29.471221] The buggy address belongs to the physical page:
[   29.471252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.471548] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.471593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.472017] page_type: f8(unknown)
[   29.472065] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.472493] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.472546] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.472942] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.473207] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.473260] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.473681] page dumped because: kasan: bad access detected
[   29.474090] 
[   29.474120] Memory state around the buggy address:
[   29.474175]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.474218]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.474420] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.474461]                                                              ^
[   29.474500]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.474562]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.474599] ==================================================================
[   29.389662] ==================================================================
[   29.389781] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.389936] Write of size 1 at addr fff00000c907eef0 by task kunit_try_catch/189
[   29.389997] 
[   29.390026] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   29.390127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.390153] Hardware name: linux,dummy-virt (DT)
[   29.390207] Call trace:
[   29.390230]  show_stack+0x20/0x38 (C)
[   29.390279]  dump_stack_lvl+0x8c/0xd0
[   29.390324]  print_report+0x118/0x608
[   29.390370]  kasan_report+0xdc/0x128
[   29.390555]  __asan_report_store1_noabort+0x20/0x30
[   29.390686]  krealloc_more_oob_helper+0x5c0/0x678
[   29.390736]  krealloc_more_oob+0x20/0x38
[   29.390781]  kunit_try_run_case+0x170/0x3f0
[   29.390828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.391090]  kthread+0x328/0x630
[   29.391190]  ret_from_fork+0x10/0x20
[   29.391289] 
[   29.391396] Allocated by task 189:
[   29.391458]  kasan_save_stack+0x3c/0x68
[   29.391539]  kasan_save_track+0x20/0x40
[   29.391576]  kasan_save_alloc_info+0x40/0x58
[   29.391614]  __kasan_krealloc+0x118/0x178
[   29.391670]  krealloc_noprof+0x128/0x360
[   29.391707]  krealloc_more_oob_helper+0x168/0x678
[   29.391747]  krealloc_more_oob+0x20/0x38
[   29.391782]  kunit_try_run_case+0x170/0x3f0
[   29.391819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.391862]  kthread+0x328/0x630
[   29.391967]  ret_from_fork+0x10/0x20
[   29.392052] 
[   29.392071] The buggy address belongs to the object at fff00000c907ee00
[   29.392071]  which belongs to the cache kmalloc-256 of size 256
[   29.392167] The buggy address is located 5 bytes to the right of
[   29.392167]  allocated 235-byte region [fff00000c907ee00, fff00000c907eeeb)
[   29.392320] 
[   29.392399] The buggy address belongs to the physical page:
[   29.392446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907ea00 pfn:0x10907e
[   29.392639] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.392844] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.392993] page_type: f5(slab)
[   29.393059] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.393178] raw: fff00000c907ea00 000000008010000f 00000000f5000000 0000000000000000
[   29.393280] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.393340] head: fff00000c907ea00 000000008010000f 00000000f5000000 0000000000000000
[   29.393485] head: 0bfffe0000000001 ffffc1ffc3241f81 00000000ffffffff 00000000ffffffff
[   29.393600] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.393732] page dumped because: kasan: bad access detected
[   29.393798] 
[   29.393815] Memory state around the buggy address:
[   29.394004]  fff00000c907ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.394069]  fff00000c907ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.394148] >fff00000c907ee80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.394278]                                                              ^
[   29.394332]  fff00000c907ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.394372]  fff00000c907ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.394419] ==================================================================
[   29.385205] ==================================================================
[   29.385308] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.385372] Write of size 1 at addr fff00000c907eeeb by task kunit_try_catch/189
[   29.385421] 
[   29.385565] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   29.385694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.385857] Hardware name: linux,dummy-virt (DT)
[   29.385932] Call trace:
[   29.386012]  show_stack+0x20/0x38 (C)
[   29.386144]  dump_stack_lvl+0x8c/0xd0
[   29.386201]  print_report+0x118/0x608
[   29.386344]  kasan_report+0xdc/0x128
[   29.386436]  __asan_report_store1_noabort+0x20/0x30
[   29.386484]  krealloc_more_oob_helper+0x60c/0x678
[   29.386549]  krealloc_more_oob+0x20/0x38
[   29.386594]  kunit_try_run_case+0x170/0x3f0
[   29.386642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.386694]  kthread+0x328/0x630
[   29.386851]  ret_from_fork+0x10/0x20
[   29.387131] 
[   29.387247] Allocated by task 189:
[   29.387325]  kasan_save_stack+0x3c/0x68
[   29.387431]  kasan_save_track+0x20/0x40
[   29.387498]  kasan_save_alloc_info+0x40/0x58
[   29.387533]  __kasan_krealloc+0x118/0x178
[   29.387570]  krealloc_noprof+0x128/0x360
[   29.387625]  krealloc_more_oob_helper+0x168/0x678
[   29.387665]  krealloc_more_oob+0x20/0x38
[   29.387720]  kunit_try_run_case+0x170/0x3f0
[   29.387885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.387994]  kthread+0x328/0x630
[   29.388109]  ret_from_fork+0x10/0x20
[   29.388152] 
[   29.388171] The buggy address belongs to the object at fff00000c907ee00
[   29.388171]  which belongs to the cache kmalloc-256 of size 256
[   29.388228] The buggy address is located 0 bytes to the right of
[   29.388228]  allocated 235-byte region [fff00000c907ee00, fff00000c907eeeb)
[   29.388289] 
[   29.388327] The buggy address belongs to the physical page:
[   29.388359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907ea00 pfn:0x10907e
[   29.388429] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.388482] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.388545] page_type: f5(slab)
[   29.388582] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.388631] raw: fff00000c907ea00 000000008010000f 00000000f5000000 0000000000000000
[   29.388679] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.388727] head: fff00000c907ea00 000000008010000f 00000000f5000000 0000000000000000
[   29.388774] head: 0bfffe0000000001 ffffc1ffc3241f81 00000000ffffffff 00000000ffffffff
[   29.388853] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.388891] page dumped because: kasan: bad access detected
[   29.388929] 
[   29.388947] Memory state around the buggy address:
[   29.388977]  fff00000c907ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.389040]  fff00000c907ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.389096] >fff00000c907ee80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.389146]                                                           ^
[   29.389182]  fff00000c907ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.389222]  fff00000c907ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.389258] ==================================================================
[   29.458451] ==================================================================
[   29.458519] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.458573] Write of size 1 at addr fff00000c9a560eb by task kunit_try_catch/193
[   29.458665] 
[   29.458697] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   29.458830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.460163] Hardware name: linux,dummy-virt (DT)
[   29.460451] Call trace:
[   29.460750]  show_stack+0x20/0x38 (C)
[   29.460844]  dump_stack_lvl+0x8c/0xd0
[   29.461312]  print_report+0x118/0x608
[   29.461436]  kasan_report+0xdc/0x128
[   29.461662]  __asan_report_store1_noabort+0x20/0x30
[   29.462062]  krealloc_more_oob_helper+0x60c/0x678
[   29.462123]  krealloc_large_more_oob+0x20/0x38
[   29.462171]  kunit_try_run_case+0x170/0x3f0
[   29.462482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.462544]  kthread+0x328/0x630
[   29.462587]  ret_from_fork+0x10/0x20
[   29.462643] 
[   29.462664] The buggy address belongs to the physical page:
[   29.463015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54
[   29.463295] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.463346] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.463398] page_type: f8(unknown)
[   29.463948] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.464044] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.464563] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.465014] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.465494] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff
[   29.465840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.466180] page dumped because: kasan: bad access detected
[   29.466214] 
[   29.466233] Memory state around the buggy address:
[   29.466356]  fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.466403]  fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.466445] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.466582]                                                           ^
[   29.466626]  fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.467054]  fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.467276] ==================================================================

[   24.455958] ==================================================================
[   24.456970] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   24.457748] Write of size 1 at addr ffff88810099e0eb by task kunit_try_catch/205
[   24.458510] 
[   24.458738] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   24.458798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.458813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.458840] Call Trace:
[   24.458855]  <TASK>
[   24.458900]  dump_stack_lvl+0x73/0xb0
[   24.458933]  print_report+0xd1/0x650
[   24.458960]  ? __virt_addr_valid+0x1db/0x2d0
[   24.458988]  ? krealloc_more_oob_helper+0x821/0x930
[   24.459013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.459042]  ? krealloc_more_oob_helper+0x821/0x930
[   24.459068]  kasan_report+0x141/0x180
[   24.459092]  ? krealloc_more_oob_helper+0x821/0x930
[   24.459122]  __asan_report_store1_noabort+0x1b/0x30
[   24.459157]  krealloc_more_oob_helper+0x821/0x930
[   24.459181]  ? __schedule+0x10cc/0x2b60
[   24.459209]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   24.459236]  ? finish_task_switch.isra.0+0x153/0x700
[   24.459260]  ? __switch_to+0x47/0xf50
[   24.459291]  ? __schedule+0x10cc/0x2b60
[   24.459316]  ? __pfx_read_tsc+0x10/0x10
[   24.459344]  krealloc_more_oob+0x1c/0x30
[   24.459368]  kunit_try_run_case+0x1a5/0x480
[   24.459407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.459433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.459459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.459486]  ? __kthread_parkme+0x82/0x180
[   24.459510]  ? preempt_count_sub+0x50/0x80
[   24.459535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.459563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.459590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.459616]  kthread+0x337/0x6f0
[   24.459638]  ? trace_preempt_on+0x20/0xc0
[   24.459666]  ? __pfx_kthread+0x10/0x10
[   24.459689]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.459714]  ? calculate_sigpending+0x7b/0xa0
[   24.459741]  ? __pfx_kthread+0x10/0x10
[   24.459765]  ret_from_fork+0x116/0x1d0
[   24.459786]  ? __pfx_kthread+0x10/0x10
[   24.459809]  ret_from_fork_asm+0x1a/0x30
[   24.459844]  </TASK>
[   24.459859] 
[   24.471451] Allocated by task 205:
[   24.471660]  kasan_save_stack+0x45/0x70
[   24.471848]  kasan_save_track+0x18/0x40
[   24.472042]  kasan_save_alloc_info+0x3b/0x50
[   24.472207]  __kasan_krealloc+0x190/0x1f0
[   24.472365]  krealloc_noprof+0xf3/0x340
[   24.472544]  krealloc_more_oob_helper+0x1a9/0x930
[   24.472794]  krealloc_more_oob+0x1c/0x30
[   24.473009]  kunit_try_run_case+0x1a5/0x480
[   24.473251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.473480]  kthread+0x337/0x6f0
[   24.473612]  ret_from_fork+0x116/0x1d0
[   24.473755]  ret_from_fork_asm+0x1a/0x30
[   24.473974] 
[   24.474207] The buggy address belongs to the object at ffff88810099e000
[   24.474207]  which belongs to the cache kmalloc-256 of size 256
[   24.474847] The buggy address is located 0 bytes to the right of
[   24.474847]  allocated 235-byte region [ffff88810099e000, ffff88810099e0eb)
[   24.476073] 
[   24.476180] The buggy address belongs to the physical page:
[   24.476383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099e
[   24.477363] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.477657] ksm flags: 0x200000000000040(head|node=0|zone=2)
[   24.478056] page_type: f5(slab)
[   24.478293] raw: 0200000000000040 ffff888100041b40 ffffea0004026700 dead000000000003
[   24.478641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.479204] head: 0200000000000040 ffff888100041b40 ffffea0004026700 dead000000000003
[   24.479660] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.480168] head: 0200000000000001 ffffea0004026781 00000000ffffffff 00000000ffffffff
[   24.480675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.481210] page dumped because: kasan: bad access detected
[   24.481557] 
[   24.481632] Memory state around the buggy address:
[   24.482333]  ffff88810099df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.483094]  ffff88810099e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.483410] >ffff88810099e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   24.484273]                                                           ^
[   24.484974]  ffff88810099e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.485814]  ffff88810099e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.486557] ==================================================================
[   24.669956] ==================================================================
[   24.670724] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   24.671175] Write of size 1 at addr ffff8881062c20f0 by task kunit_try_catch/209
[   24.671483] 
[   24.671600] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   24.671649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.671663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.671685] Call Trace:
[   24.671699]  <TASK>
[   24.671716]  dump_stack_lvl+0x73/0xb0
[   24.671744]  print_report+0xd1/0x650
[   24.671769]  ? __virt_addr_valid+0x1db/0x2d0
[   24.671795]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.671821]  ? kasan_addr_to_slab+0x11/0xa0
[   24.671848]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.671874]  kasan_report+0x141/0x180
[   24.671898]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.671929]  __asan_report_store1_noabort+0x1b/0x30
[   24.671956]  krealloc_more_oob_helper+0x7eb/0x930
[   24.671980]  ? __schedule+0x10cc/0x2b60
[   24.672007]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   24.672033]  ? finish_task_switch.isra.0+0x153/0x700
[   24.672057]  ? __switch_to+0x47/0xf50
[   24.672085]  ? __schedule+0x10cc/0x2b60
[   24.672110]  ? __pfx_read_tsc+0x10/0x10
[   24.672138]  krealloc_large_more_oob+0x1c/0x30
[   24.672163]  kunit_try_run_case+0x1a5/0x480
[   24.672191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.672217]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.672250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.672279]  ? __kthread_parkme+0x82/0x180
[   24.672302]  ? preempt_count_sub+0x50/0x80
[   24.672327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.672355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.672382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.672420]  kthread+0x337/0x6f0
[   24.672442]  ? trace_preempt_on+0x20/0xc0
[   24.672468]  ? __pfx_kthread+0x10/0x10
[   24.672491]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.672516]  ? calculate_sigpending+0x7b/0xa0
[   24.672543]  ? __pfx_kthread+0x10/0x10
[   24.672568]  ret_from_fork+0x116/0x1d0
[   24.672588]  ? __pfx_kthread+0x10/0x10
[   24.672611]  ret_from_fork_asm+0x1a/0x30
[   24.672646]  </TASK>
[   24.672659] 
[   24.680782] The buggy address belongs to the physical page:
[   24.680973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c0
[   24.681234] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.682896] flags: 0x200000000000040(head|node=0|zone=2)
[   24.683559] page_type: f8(unknown)
[   24.684071] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.685136] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.685627] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.686836] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.687741] head: 0200000000000002 ffffea000418b001 00000000ffffffff 00000000ffffffff
[   24.688683] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.689253] page dumped because: kasan: bad access detected
[   24.689898] 
[   24.690343] Memory state around the buggy address:
[   24.691216]  ffff8881062c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.691745]  ffff8881062c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.692767] >ffff8881062c2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.693645]                                                              ^
[   24.694380]  ffff8881062c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.694641]  ffff8881062c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.695161] ==================================================================
[   24.487511] ==================================================================
[   24.487847] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   24.488376] Write of size 1 at addr ffff88810099e0f0 by task kunit_try_catch/205
[   24.488637] 
[   24.488755] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   24.488810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.488825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.488849] Call Trace:
[   24.488868]  <TASK>
[   24.488888]  dump_stack_lvl+0x73/0xb0
[   24.488917]  print_report+0xd1/0x650
[   24.488941]  ? __virt_addr_valid+0x1db/0x2d0
[   24.488967]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.488992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.489021]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.489046]  kasan_report+0x141/0x180
[   24.489070]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.489100]  __asan_report_store1_noabort+0x1b/0x30
[   24.489126]  krealloc_more_oob_helper+0x7eb/0x930
[   24.489149]  ? __schedule+0x10cc/0x2b60
[   24.489175]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   24.489588]  ? finish_task_switch.isra.0+0x153/0x700
[   24.489625]  ? __switch_to+0x47/0xf50
[   24.489655]  ? __schedule+0x10cc/0x2b60
[   24.489681]  ? __pfx_read_tsc+0x10/0x10
[   24.489708]  krealloc_more_oob+0x1c/0x30
[   24.489732]  kunit_try_run_case+0x1a5/0x480
[   24.489760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.489785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.489811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.489837]  ? __kthread_parkme+0x82/0x180
[   24.489859]  ? preempt_count_sub+0x50/0x80
[   24.489883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.489910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.489937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.489963]  kthread+0x337/0x6f0
[   24.489984]  ? trace_preempt_on+0x20/0xc0
[   24.490011]  ? __pfx_kthread+0x10/0x10
[   24.490033]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.490058]  ? calculate_sigpending+0x7b/0xa0
[   24.490084]  ? __pfx_kthread+0x10/0x10
[   24.490107]  ret_from_fork+0x116/0x1d0
[   24.490128]  ? __pfx_kthread+0x10/0x10
[   24.490150]  ret_from_fork_asm+0x1a/0x30
[   24.490184]  </TASK>
[   24.490197] 
[   24.498481] Allocated by task 205:
[   24.498672]  kasan_save_stack+0x45/0x70
[   24.498822]  kasan_save_track+0x18/0x40
[   24.499077]  kasan_save_alloc_info+0x3b/0x50
[   24.499227]  __kasan_krealloc+0x190/0x1f0
[   24.499367]  krealloc_noprof+0xf3/0x340
[   24.499775]  krealloc_more_oob_helper+0x1a9/0x930
[   24.500230]  krealloc_more_oob+0x1c/0x30
[   24.500405]  kunit_try_run_case+0x1a5/0x480
[   24.500558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.500740]  kthread+0x337/0x6f0
[   24.500969]  ret_from_fork+0x116/0x1d0
[   24.501192]  ret_from_fork_asm+0x1a/0x30
[   24.501638] 
[   24.501740] The buggy address belongs to the object at ffff88810099e000
[   24.501740]  which belongs to the cache kmalloc-256 of size 256
[   24.502469] The buggy address is located 5 bytes to the right of
[   24.502469]  allocated 235-byte region [ffff88810099e000, ffff88810099e0eb)
[   24.503083] 
[   24.503159] The buggy address belongs to the physical page:
[   24.504429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099e
[   24.504853] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.505669] ksm flags: 0x200000000000040(head|node=0|zone=2)
[   24.505883] page_type: f5(slab)
[   24.506016] raw: 0200000000000040 ffff888100041b40 ffffea0004026700 dead000000000003
[   24.506269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.506656] head: 0200000000000040 ffff888100041b40 ffffea0004026700 dead000000000003
[   24.507956] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.508210] head: 0200000000000001 ffffea0004026781 00000000ffffffff 00000000ffffffff
[   24.508483] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.508721] page dumped because: kasan: bad access detected
[   24.508897] 
[   24.509033] Memory state around the buggy address:
[   24.509254]  ffff88810099df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.509568]  ffff88810099e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.509951] >ffff88810099e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   24.510430]                                                              ^
[   24.513214]  ffff88810099e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.513493]  ffff88810099e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.513760] ==================================================================
[   24.653126] ==================================================================
[   24.653743] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   24.654068] Write of size 1 at addr ffff8881062c20eb by task kunit_try_catch/209
[   24.654423] 
[   24.654528] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   24.654583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.654596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.654620] Call Trace:
[   24.654635]  <TASK>
[   24.654655]  dump_stack_lvl+0x73/0xb0
[   24.654684]  print_report+0xd1/0x650
[   24.654709]  ? __virt_addr_valid+0x1db/0x2d0
[   24.654736]  ? krealloc_more_oob_helper+0x821/0x930
[   24.654760]  ? kasan_addr_to_slab+0x11/0xa0
[   24.654786]  ? krealloc_more_oob_helper+0x821/0x930
[   24.654811]  kasan_report+0x141/0x180
[   24.654834]  ? krealloc_more_oob_helper+0x821/0x930
[   24.654863]  __asan_report_store1_noabort+0x1b/0x30
[   24.654889]  krealloc_more_oob_helper+0x821/0x930
[   24.654913]  ? __schedule+0x10cc/0x2b60
[   24.654939]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   24.654964]  ? finish_task_switch.isra.0+0x153/0x700
[   24.654988]  ? __switch_to+0x47/0xf50
[   24.655016]  ? __schedule+0x10cc/0x2b60
[   24.655040]  ? __pfx_read_tsc+0x10/0x10
[   24.655067]  krealloc_large_more_oob+0x1c/0x30
[   24.655106]  kunit_try_run_case+0x1a5/0x480
[   24.655137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.655161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.655187]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.655213]  ? __kthread_parkme+0x82/0x180
[   24.655236]  ? preempt_count_sub+0x50/0x80
[   24.655261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.655287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.655313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.655339]  kthread+0x337/0x6f0
[   24.655361]  ? trace_preempt_on+0x20/0xc0
[   24.655387]  ? __pfx_kthread+0x10/0x10
[   24.655421]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.655444]  ? calculate_sigpending+0x7b/0xa0
[   24.655470]  ? __pfx_kthread+0x10/0x10
[   24.655492]  ret_from_fork+0x116/0x1d0
[   24.655513]  ? __pfx_kthread+0x10/0x10
[   24.655536]  ret_from_fork_asm+0x1a/0x30
[   24.655569]  </TASK>
[   24.655583] 
[   24.663372] The buggy address belongs to the physical page:
[   24.663629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c0
[   24.663968] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.664324] flags: 0x200000000000040(head|node=0|zone=2)
[   24.664562] page_type: f8(unknown)
[   24.664743] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.665142] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.665486] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.665796] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.666127] head: 0200000000000002 ffffea000418b001 00000000ffffffff 00000000ffffffff
[   24.666465] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.666741] page dumped because: kasan: bad access detected
[   24.666990] 
[   24.667099] Memory state around the buggy address:
[   24.667316]  ffff8881062c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.667587]  ffff8881062c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.667987] >ffff8881062c2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.668301]                                                           ^
[   24.668597]  ffff8881062c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.668896]  ffff8881062c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.669212] ==================================================================