Hay
Date
July 17, 2025, 10:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.458881] ==================================================================
[   29.458933] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.458983] Write of size 1 at addr fff00000c91920f0 by task kunit_try_catch/191
[   29.459200] 
[   29.459240] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.459338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.459364] Hardware name: linux,dummy-virt (DT)
[   29.459463] Call trace:
[   29.459489]  show_stack+0x20/0x38 (C)
[   29.459565]  dump_stack_lvl+0x8c/0xd0
[   29.459785]  print_report+0x118/0x5d0
[   29.459940]  kasan_report+0xdc/0x128
[   29.459988]  __asan_report_store1_noabort+0x20/0x30
[   29.460041]  krealloc_more_oob_helper+0x5c0/0x678
[   29.460104]  krealloc_large_more_oob+0x20/0x38
[   29.460191]  kunit_try_run_case+0x170/0x3f0
[   29.460257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.460308]  kthread+0x328/0x630
[   29.460410]  ret_from_fork+0x10/0x20
[   29.460527] 
[   29.460621] The buggy address belongs to the physical page:
[   29.460696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109190
[   29.460804] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.460850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.460901] page_type: f8(unknown)
[   29.460939] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.461123] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.461203] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.461328] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.461480] head: 0bfffe0000000002 ffffc1ffc3246401 00000000ffffffff 00000000ffffffff
[   29.461564] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.461640] page dumped because: kasan: bad access detected
[   29.461760] 
[   29.461819] Memory state around the buggy address:
[   29.461903]  fff00000c9191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.462017]  fff00000c9192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.462068] >fff00000c9192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.462386]                                                              ^
[   29.462473]  fff00000c9192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.462606]  fff00000c9192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.462696] ==================================================================
[   29.452369] ==================================================================
[   29.452564] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.452750] Write of size 1 at addr fff00000c91920eb by task kunit_try_catch/191
[   29.452806] 
[   29.452842] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.452987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.453047] Hardware name: linux,dummy-virt (DT)
[   29.453165] Call trace:
[   29.453225]  show_stack+0x20/0x38 (C)
[   29.453351]  dump_stack_lvl+0x8c/0xd0
[   29.453437]  print_report+0x118/0x5d0
[   29.453527]  kasan_report+0xdc/0x128
[   29.453649]  __asan_report_store1_noabort+0x20/0x30
[   29.453722]  krealloc_more_oob_helper+0x60c/0x678
[   29.454022]  krealloc_large_more_oob+0x20/0x38
[   29.454175]  kunit_try_run_case+0x170/0x3f0
[   29.454317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.454442]  kthread+0x328/0x630
[   29.454560]  ret_from_fork+0x10/0x20
[   29.454609] 
[   29.454657] The buggy address belongs to the physical page:
[   29.454897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109190
[   29.455143] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.455227] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.455353] page_type: f8(unknown)
[   29.455448] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.455584] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.455678] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.455894] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.455952] head: 0bfffe0000000002 ffffc1ffc3246401 00000000ffffffff 00000000ffffffff
[   29.456006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.456083] page dumped because: kasan: bad access detected
[   29.456173] 
[   29.456240] Memory state around the buggy address:
[   29.456317]  fff00000c9191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.456439]  fff00000c9192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.456502] >fff00000c9192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.456606]                                                           ^
[   29.456661]  fff00000c9192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.456718]  fff00000c9192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.456797] ==================================================================
[   29.397881] ==================================================================
[   29.398279] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.398356] Write of size 1 at addr fff00000c78094f0 by task kunit_try_catch/187
[   29.398566] 
[   29.398609] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.398859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.398887] Hardware name: linux,dummy-virt (DT)
[   29.398925] Call trace:
[   29.399093]  show_stack+0x20/0x38 (C)
[   29.399149]  dump_stack_lvl+0x8c/0xd0
[   29.399337]  print_report+0x118/0x5d0
[   29.399397]  kasan_report+0xdc/0x128
[   29.399729]  __asan_report_store1_noabort+0x20/0x30
[   29.399877]  krealloc_more_oob_helper+0x5c0/0x678
[   29.399950]  krealloc_more_oob+0x20/0x38
[   29.400152]  kunit_try_run_case+0x170/0x3f0
[   29.400381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.400447]  kthread+0x328/0x630
[   29.400637]  ret_from_fork+0x10/0x20
[   29.400996] 
[   29.401017] Allocated by task 187:
[   29.401046]  kasan_save_stack+0x3c/0x68
[   29.401346]  kasan_save_track+0x20/0x40
[   29.401493]  kasan_save_alloc_info+0x40/0x58
[   29.401629]  __kasan_krealloc+0x118/0x178
[   29.401685]  krealloc_noprof+0x128/0x360
[   29.401743]  krealloc_more_oob_helper+0x168/0x678
[   29.401978]  krealloc_more_oob+0x20/0x38
[   29.402190]  kunit_try_run_case+0x170/0x3f0
[   29.402253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.402507]  kthread+0x328/0x630
[   29.402654]  ret_from_fork+0x10/0x20
[   29.402763] 
[   29.402798] The buggy address belongs to the object at fff00000c7809400
[   29.402798]  which belongs to the cache kmalloc-256 of size 256
[   29.402855] The buggy address is located 5 bytes to the right of
[   29.402855]  allocated 235-byte region [fff00000c7809400, fff00000c78094eb)
[   29.402972] 
[   29.403002] The buggy address belongs to the physical page:
[   29.403040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.403110] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.403167] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.403223] page_type: f5(slab)
[   29.403282] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.403340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.403389] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.403436] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.403484] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.403540] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.403578] page dumped because: kasan: bad access detected
[   29.403613] 
[   29.403631] Memory state around the buggy address:
[   29.403660]  fff00000c7809380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.403702]  fff00000c7809400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.403751] >fff00000c7809480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.403786]                                                              ^
[   29.403824]  fff00000c7809500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.403864]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.403908] ==================================================================
[   29.388157] ==================================================================
[   29.388441] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.388509] Write of size 1 at addr fff00000c78094eb by task kunit_try_catch/187
[   29.388997] 
[   29.389217] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.389315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.389498] Hardware name: linux,dummy-virt (DT)
[   29.389534] Call trace:
[   29.389575]  show_stack+0x20/0x38 (C)
[   29.389651]  dump_stack_lvl+0x8c/0xd0
[   29.389708]  print_report+0x118/0x5d0
[   29.389753]  kasan_report+0xdc/0x128
[   29.389800]  __asan_report_store1_noabort+0x20/0x30
[   29.389848]  krealloc_more_oob_helper+0x60c/0x678
[   29.389913]  krealloc_more_oob+0x20/0x38
[   29.389960]  kunit_try_run_case+0x170/0x3f0
[   29.390015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.390087]  kthread+0x328/0x630
[   29.390129]  ret_from_fork+0x10/0x20
[   29.390188] 
[   29.390212] Allocated by task 187:
[   29.390241]  kasan_save_stack+0x3c/0x68
[   29.390279]  kasan_save_track+0x20/0x40
[   29.390323]  kasan_save_alloc_info+0x40/0x58
[   29.390359]  __kasan_krealloc+0x118/0x178
[   29.390394]  krealloc_noprof+0x128/0x360
[   29.390432]  krealloc_more_oob_helper+0x168/0x678
[   29.390471]  krealloc_more_oob+0x20/0x38
[   29.390516]  kunit_try_run_case+0x170/0x3f0
[   29.390557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.390598]  kthread+0x328/0x630
[   29.390636]  ret_from_fork+0x10/0x20
[   29.390680] 
[   29.390699] The buggy address belongs to the object at fff00000c7809400
[   29.390699]  which belongs to the cache kmalloc-256 of size 256
[   29.390754] The buggy address is located 0 bytes to the right of
[   29.390754]  allocated 235-byte region [fff00000c7809400, fff00000c78094eb)
[   29.390826] 
[   29.390845] The buggy address belongs to the physical page:
[   29.390883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808
[   29.390943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.390997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.391047] page_type: f5(slab)
[   29.391788] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.391893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.392170] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   29.392232] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.392691] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff
[   29.392802] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.392979] page dumped because: kasan: bad access detected
[   29.393009] 
[   29.393359] Memory state around the buggy address:
[   29.393442]  fff00000c7809380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.393531]  fff00000c7809400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.393732] >fff00000c7809480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.393940]                                                           ^
[   29.394003]  fff00000c7809500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.394121]  fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.394203] ==================================================================

[   25.301138] ==================================================================
[   25.302294] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   25.302663] Write of size 1 at addr ffff8881060c46eb by task kunit_try_catch/205
[   25.302875] 
[   25.302957] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   25.303009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.303021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.303042] Call Trace:
[   25.303056]  <TASK>
[   25.303074]  dump_stack_lvl+0x73/0xb0
[   25.303117]  print_report+0xd1/0x610
[   25.303139]  ? __virt_addr_valid+0x1db/0x2d0
[   25.303164]  ? krealloc_more_oob_helper+0x821/0x930
[   25.303187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.303211]  ? krealloc_more_oob_helper+0x821/0x930
[   25.303234]  kasan_report+0x141/0x180
[   25.303266]  ? krealloc_more_oob_helper+0x821/0x930
[   25.303293]  __asan_report_store1_noabort+0x1b/0x30
[   25.303329]  krealloc_more_oob_helper+0x821/0x930
[   25.303350]  ? __schedule+0x10c6/0x2b60
[   25.303373]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.303396]  ? finish_task_switch.isra.0+0x153/0x700
[   25.303417]  ? __switch_to+0x47/0xf80
[   25.303444]  ? __schedule+0x10c6/0x2b60
[   25.303465]  ? __pfx_read_tsc+0x10/0x10
[   25.303489]  krealloc_more_oob+0x1c/0x30
[   25.303510]  kunit_try_run_case+0x1a5/0x480
[   25.303534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.303555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.303577]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.303599]  ? __kthread_parkme+0x82/0x180
[   25.303623]  ? preempt_count_sub+0x50/0x80
[   25.303644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.303667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.303688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.303710]  kthread+0x337/0x6f0
[   25.303734]  ? trace_preempt_on+0x20/0xc0
[   25.303759]  ? __pfx_kthread+0x10/0x10
[   25.303778]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.303800]  ? calculate_sigpending+0x7b/0xa0
[   25.303824]  ? __pfx_kthread+0x10/0x10
[   25.303844]  ret_from_fork+0x116/0x1d0
[   25.303862]  ? __pfx_kthread+0x10/0x10
[   25.303881]  ret_from_fork_asm+0x1a/0x30
[   25.303913]  </TASK>
[   25.303923] 
[   25.316679] Allocated by task 205:
[   25.316805]  kasan_save_stack+0x45/0x70
[   25.317125]  kasan_save_track+0x18/0x40
[   25.317401]  kasan_save_alloc_info+0x3b/0x50
[   25.317991]  __kasan_krealloc+0x190/0x1f0
[   25.318185]  krealloc_noprof+0xf3/0x340
[   25.318317]  krealloc_more_oob_helper+0x1a9/0x930
[   25.318724]  krealloc_more_oob+0x1c/0x30
[   25.319338]  kunit_try_run_case+0x1a5/0x480
[   25.319554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.320067]  kthread+0x337/0x6f0
[   25.320526]  ret_from_fork+0x116/0x1d0
[   25.320893]  ret_from_fork_asm+0x1a/0x30
[   25.321313] 
[   25.321382] The buggy address belongs to the object at ffff8881060c4600
[   25.321382]  which belongs to the cache kmalloc-256 of size 256
[   25.321723] The buggy address is located 0 bytes to the right of
[   25.321723]  allocated 235-byte region [ffff8881060c4600, ffff8881060c46eb)
[   25.322073] 
[   25.322177] The buggy address belongs to the physical page:
[   25.322342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c4
[   25.323127] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.323349] flags: 0x200000000000040(head|node=0|zone=2)
[   25.323714] page_type: f5(slab)
[   25.323886] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.324294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.324837] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.325427] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.325854] head: 0200000000000001 ffffea0004183101 00000000ffffffff 00000000ffffffff
[   25.326190] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.326729] page dumped because: kasan: bad access detected
[   25.327091] 
[   25.327237] Memory state around the buggy address:
[   25.327692]  ffff8881060c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.327982]  ffff8881060c4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.328577] >ffff8881060c4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   25.328987]                                                           ^
[   25.329625]  ffff8881060c4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.329967]  ffff8881060c4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.330271] ==================================================================
[   25.492265] ==================================================================
[   25.493032] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   25.493586] Write of size 1 at addr ffff88810602e0eb by task kunit_try_catch/209
[   25.493884] 
[   25.493976] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   25.494025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.494036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.494057] Call Trace:
[   25.494069]  <TASK>
[   25.494097]  dump_stack_lvl+0x73/0xb0
[   25.494129]  print_report+0xd1/0x610
[   25.494150]  ? __virt_addr_valid+0x1db/0x2d0
[   25.494174]  ? krealloc_more_oob_helper+0x821/0x930
[   25.494196]  ? kasan_addr_to_slab+0x11/0xa0
[   25.494215]  ? krealloc_more_oob_helper+0x821/0x930
[   25.494237]  kasan_report+0x141/0x180
[   25.494271]  ? krealloc_more_oob_helper+0x821/0x930
[   25.494308]  __asan_report_store1_noabort+0x1b/0x30
[   25.494331]  krealloc_more_oob_helper+0x821/0x930
[   25.494352]  ? __schedule+0x10c6/0x2b60
[   25.494374]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.494397]  ? finish_task_switch.isra.0+0x153/0x700
[   25.494418]  ? __switch_to+0x47/0xf80
[   25.494442]  ? __schedule+0x10c6/0x2b60
[   25.494463]  ? __pfx_read_tsc+0x10/0x10
[   25.494487]  krealloc_large_more_oob+0x1c/0x30
[   25.494508]  kunit_try_run_case+0x1a5/0x480
[   25.494532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.494552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.494574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.494596]  ? __kthread_parkme+0x82/0x180
[   25.494619]  ? preempt_count_sub+0x50/0x80
[   25.494640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.494663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.494684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.494707]  kthread+0x337/0x6f0
[   25.494725]  ? trace_preempt_on+0x20/0xc0
[   25.494748]  ? __pfx_kthread+0x10/0x10
[   25.494767]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.494788]  ? calculate_sigpending+0x7b/0xa0
[   25.494811]  ? __pfx_kthread+0x10/0x10
[   25.494831]  ret_from_fork+0x116/0x1d0
[   25.494849]  ? __pfx_kthread+0x10/0x10
[   25.494868]  ret_from_fork_asm+0x1a/0x30
[   25.494899]  </TASK>
[   25.494909] 
[   25.502970] The buggy address belongs to the physical page:
[   25.503268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10602c
[   25.503663] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.504003] flags: 0x200000000000040(head|node=0|zone=2)
[   25.504189] page_type: f8(unknown)
[   25.504514] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.504913] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.505245] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.505624] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.506005] head: 0200000000000002 ffffea0004180b01 00000000ffffffff 00000000ffffffff
[   25.506387] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.506702] page dumped because: kasan: bad access detected
[   25.506890] 
[   25.506950] Memory state around the buggy address:
[   25.507105]  ffff88810602df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.509951]  ffff88810602e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.510517] >ffff88810602e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   25.511253]                                                           ^
[   25.511494]  ffff88810602e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.511706]  ffff88810602e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.512313] ==================================================================
[   25.513576] ==================================================================
[   25.513800] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   25.514034] Write of size 1 at addr ffff88810602e0f0 by task kunit_try_catch/209
[   25.514256] 
[   25.514331] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   25.514377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.514389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.514409] Call Trace:
[   25.514422]  <TASK>
[   25.514435]  dump_stack_lvl+0x73/0xb0
[   25.514462]  print_report+0xd1/0x610
[   25.514483]  ? __virt_addr_valid+0x1db/0x2d0
[   25.514505]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.514526]  ? kasan_addr_to_slab+0x11/0xa0
[   25.514545]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.514567]  kasan_report+0x141/0x180
[   25.514587]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.514614]  __asan_report_store1_noabort+0x1b/0x30
[   25.514637]  krealloc_more_oob_helper+0x7eb/0x930
[   25.514657]  ? __schedule+0x10c6/0x2b60
[   25.514678]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.514701]  ? finish_task_switch.isra.0+0x153/0x700
[   25.514721]  ? __switch_to+0x47/0xf80
[   25.514745]  ? __schedule+0x10c6/0x2b60
[   25.514766]  ? __pfx_read_tsc+0x10/0x10
[   25.514790]  krealloc_large_more_oob+0x1c/0x30
[   25.514812]  kunit_try_run_case+0x1a5/0x480
[   25.514833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.514854]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.514875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.514897]  ? __kthread_parkme+0x82/0x180
[   25.514920]  ? preempt_count_sub+0x50/0x80
[   25.514941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.514962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.514984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.515005]  kthread+0x337/0x6f0
[   25.515023]  ? trace_preempt_on+0x20/0xc0
[   25.515046]  ? __pfx_kthread+0x10/0x10
[   25.515065]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.516267]  ? calculate_sigpending+0x7b/0xa0
[   25.516336]  ? __pfx_kthread+0x10/0x10
[   25.516384]  ret_from_fork+0x116/0x1d0
[   25.516416]  ? __pfx_kthread+0x10/0x10
[   25.516436]  ret_from_fork_asm+0x1a/0x30
[   25.516467]  </TASK>
[   25.516478] 
[   25.529690] The buggy address belongs to the physical page:
[   25.530392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10602c
[   25.530953] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.531187] flags: 0x200000000000040(head|node=0|zone=2)
[   25.531817] page_type: f8(unknown)
[   25.532235] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.532941] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.533770] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.534047] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.534293] head: 0200000000000002 ffffea0004180b01 00000000ffffffff 00000000ffffffff
[   25.534518] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.534735] page dumped because: kasan: bad access detected
[   25.534897] 
[   25.534958] Memory state around the buggy address:
[   25.535178]  ffff88810602df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.535785]  ffff88810602e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.536586] >ffff88810602e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   25.537213]                                                              ^
[   25.537821]  ffff88810602e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.538534]  ffff88810602e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.539133] ==================================================================
[   25.331272] ==================================================================
[   25.331823] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   25.332143] Write of size 1 at addr ffff8881060c46f0 by task kunit_try_catch/205
[   25.332627] 
[   25.332751] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   25.332818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.332829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.332849] Call Trace:
[   25.332879]  <TASK>
[   25.332895]  dump_stack_lvl+0x73/0xb0
[   25.332925]  print_report+0xd1/0x610
[   25.332946]  ? __virt_addr_valid+0x1db/0x2d0
[   25.332968]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.332990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.333015]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.333038]  kasan_report+0x141/0x180
[   25.333059]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.333097]  __asan_report_store1_noabort+0x1b/0x30
[   25.333120]  krealloc_more_oob_helper+0x7eb/0x930
[   25.333141]  ? __schedule+0x10c6/0x2b60
[   25.333163]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.333186]  ? finish_task_switch.isra.0+0x153/0x700
[   25.333206]  ? __switch_to+0x47/0xf80
[   25.333231]  ? __schedule+0x10c6/0x2b60
[   25.333252]  ? __pfx_read_tsc+0x10/0x10
[   25.333275]  krealloc_more_oob+0x1c/0x30
[   25.333295]  kunit_try_run_case+0x1a5/0x480
[   25.333319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.333340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.333362]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.333385]  ? __kthread_parkme+0x82/0x180
[   25.333408]  ? preempt_count_sub+0x50/0x80
[   25.333430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.333452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.333711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.333740]  kthread+0x337/0x6f0
[   25.333759]  ? trace_preempt_on+0x20/0xc0
[   25.333783]  ? __pfx_kthread+0x10/0x10
[   25.333802]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.333823]  ? calculate_sigpending+0x7b/0xa0
[   25.333846]  ? __pfx_kthread+0x10/0x10
[   25.333866]  ret_from_fork+0x116/0x1d0
[   25.333884]  ? __pfx_kthread+0x10/0x10
[   25.333903]  ret_from_fork_asm+0x1a/0x30
[   25.333939]  </TASK>
[   25.333949] 
[   25.344883] Allocated by task 205:
[   25.345229]  kasan_save_stack+0x45/0x70
[   25.345494]  kasan_save_track+0x18/0x40
[   25.345877]  kasan_save_alloc_info+0x3b/0x50
[   25.346112]  __kasan_krealloc+0x190/0x1f0
[   25.346462]  krealloc_noprof+0xf3/0x340
[   25.346811]  krealloc_more_oob_helper+0x1a9/0x930
[   25.347050]  krealloc_more_oob+0x1c/0x30
[   25.347529]  kunit_try_run_case+0x1a5/0x480
[   25.347821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.348005]  kthread+0x337/0x6f0
[   25.348184]  ret_from_fork+0x116/0x1d0
[   25.348640]  ret_from_fork_asm+0x1a/0x30
[   25.349073] 
[   25.349158] The buggy address belongs to the object at ffff8881060c4600
[   25.349158]  which belongs to the cache kmalloc-256 of size 256
[   25.350053] The buggy address is located 5 bytes to the right of
[   25.350053]  allocated 235-byte region [ffff8881060c4600, ffff8881060c46eb)
[   25.350790] 
[   25.351036] The buggy address belongs to the physical page:
[   25.351324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c4
[   25.351957] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.352547] flags: 0x200000000000040(head|node=0|zone=2)
[   25.352833] page_type: f5(slab)
[   25.353055] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.353635] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.354164] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.354649] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.355109] head: 0200000000000001 ffffea0004183101 00000000ffffffff 00000000ffffffff
[   25.355664] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.356051] page dumped because: kasan: bad access detected
[   25.356364] 
[   25.356796] Memory state around the buggy address:
[   25.357007]  ffff8881060c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.357598]  ffff8881060c4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.357916] >ffff8881060c4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   25.358234]                                                              ^
[   25.358782]  ffff8881060c4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.359207]  ffff8881060c4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.359711] ==================================================================