Hay
Date
July 18, 2025, 1:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.381440] ==================================================================
[   31.381557] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.381633] Write of size 1 at addr fff00000c8f61cda by task kunit_try_catch/189
[   31.381796] 
[   31.381827] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.381933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.382133] Hardware name: linux,dummy-virt (DT)
[   31.382190] Call trace:
[   31.382220]  show_stack+0x20/0x38 (C)
[   31.382384]  dump_stack_lvl+0x8c/0xd0
[   31.382439]  print_report+0x118/0x5e8
[   31.382531]  kasan_report+0xdc/0x128
[   31.382576]  __asan_report_store1_noabort+0x20/0x30
[   31.382624]  krealloc_less_oob_helper+0xa80/0xc50
[   31.382773]  krealloc_less_oob+0x20/0x38
[   31.382842]  kunit_try_run_case+0x170/0x3f0
[   31.382887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.383195]  kthread+0x328/0x630
[   31.383274]  ret_from_fork+0x10/0x20
[   31.383332] 
[   31.383403] Allocated by task 189:
[   31.383450]  kasan_save_stack+0x3c/0x68
[   31.383507]  kasan_save_track+0x20/0x40
[   31.383541]  kasan_save_alloc_info+0x40/0x58
[   31.383577]  __kasan_krealloc+0x118/0x178
[   31.383697]  krealloc_noprof+0x128/0x360
[   31.383737]  krealloc_less_oob_helper+0x168/0xc50
[   31.383778]  krealloc_less_oob+0x20/0x38
[   31.383814]  kunit_try_run_case+0x170/0x3f0
[   31.384127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.384210]  kthread+0x328/0x630
[   31.384332]  ret_from_fork+0x10/0x20
[   31.384421] 
[   31.384481] The buggy address belongs to the object at fff00000c8f61c00
[   31.384481]  which belongs to the cache kmalloc-256 of size 256
[   31.384860] The buggy address is located 17 bytes to the right of
[   31.384860]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.384955] 
[   31.385026] The buggy address belongs to the physical page:
[   31.385122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.385185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.385300] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.385387] page_type: f5(slab)
[   31.385498] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.385548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.385631] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.385917] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.386097] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.386241] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.386329] page dumped because: kasan: bad access detected
[   31.386457] 
[   31.386477] Memory state around the buggy address:
[   31.386524]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.386617]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.386944] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.387008]                                                     ^
[   31.387179]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.387253]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.387375] ==================================================================
[   31.433749] ==================================================================
[   31.433795] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.434120] Write of size 1 at addr fff00000c9b120d0 by task kunit_try_catch/193
[   31.434188] 
[   31.434218] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.434415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.434652] Hardware name: linux,dummy-virt (DT)
[   31.434697] Call trace:
[   31.434719]  show_stack+0x20/0x38 (C)
[   31.434780]  dump_stack_lvl+0x8c/0xd0
[   31.434987]  print_report+0x118/0x5e8
[   31.435045]  kasan_report+0xdc/0x128
[   31.435311]  __asan_report_store1_noabort+0x20/0x30
[   31.435384]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.435438]  krealloc_large_less_oob+0x20/0x38
[   31.435621]  kunit_try_run_case+0x170/0x3f0
[   31.435755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.435824]  kthread+0x328/0x630
[   31.436141]  ret_from_fork+0x10/0x20
[   31.436302] 
[   31.436343] The buggy address belongs to the physical page:
[   31.436464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.436518] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.436563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.436613] page_type: f8(unknown)
[   31.436852] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.437091] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.437200] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.437314] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.437362] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.437571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.437751] page dumped because: kasan: bad access detected
[   31.437841] 
[   31.437905] Memory state around the buggy address:
[   31.437957]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.438323]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.438418] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.438475]                                                  ^
[   31.438533]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.438660]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.438718] ==================================================================
[   31.363450] ==================================================================
[   31.363648] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.363839] Write of size 1 at addr fff00000c8f61cc9 by task kunit_try_catch/189
[   31.364069] 
[   31.364123] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.364456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.364495] Hardware name: linux,dummy-virt (DT)
[   31.364526] Call trace:
[   31.364548]  show_stack+0x20/0x38 (C)
[   31.364610]  dump_stack_lvl+0x8c/0xd0
[   31.364788]  print_report+0x118/0x5e8
[   31.364877]  kasan_report+0xdc/0x128
[   31.365002]  __asan_report_store1_noabort+0x20/0x30
[   31.365377]  krealloc_less_oob_helper+0xa48/0xc50
[   31.365466]  krealloc_less_oob+0x20/0x38
[   31.365597]  kunit_try_run_case+0x170/0x3f0
[   31.365672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.365974]  kthread+0x328/0x630
[   31.366062]  ret_from_fork+0x10/0x20
[   31.366208] 
[   31.366267] Allocated by task 189:
[   31.366548]  kasan_save_stack+0x3c/0x68
[   31.366650]  kasan_save_track+0x20/0x40
[   31.366703]  kasan_save_alloc_info+0x40/0x58
[   31.366804]  __kasan_krealloc+0x118/0x178
[   31.366873]  krealloc_noprof+0x128/0x360
[   31.366910]  krealloc_less_oob_helper+0x168/0xc50
[   31.367350]  krealloc_less_oob+0x20/0x38
[   31.367438]  kunit_try_run_case+0x170/0x3f0
[   31.367823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.367906]  kthread+0x328/0x630
[   31.368014]  ret_from_fork+0x10/0x20
[   31.368110] 
[   31.368145] The buggy address belongs to the object at fff00000c8f61c00
[   31.368145]  which belongs to the cache kmalloc-256 of size 256
[   31.368377] The buggy address is located 0 bytes to the right of
[   31.368377]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.368538] 
[   31.368624] The buggy address belongs to the physical page:
[   31.368671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.368771] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.369076] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.369173] page_type: f5(slab)
[   31.369255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.369374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.369699] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.369783] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.369911] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.369999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.370161] page dumped because: kasan: bad access detected
[   31.370250] 
[   31.370269] Memory state around the buggy address:
[   31.370300]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.370631]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.370689] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.370988]                                               ^
[   31.371061]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371115]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371261] ==================================================================
[   31.372764] ==================================================================
[   31.372933] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.372986] Write of size 1 at addr fff00000c8f61cd0 by task kunit_try_catch/189
[   31.373092] 
[   31.373139] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.373221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.373246] Hardware name: linux,dummy-virt (DT)
[   31.373276] Call trace:
[   31.373595]  show_stack+0x20/0x38 (C)
[   31.373660]  dump_stack_lvl+0x8c/0xd0
[   31.373745]  print_report+0x118/0x5e8
[   31.373809]  kasan_report+0xdc/0x128
[   31.373879]  __asan_report_store1_noabort+0x20/0x30
[   31.373945]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.374051]  krealloc_less_oob+0x20/0x38
[   31.374106]  kunit_try_run_case+0x170/0x3f0
[   31.374194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.374248]  kthread+0x328/0x630
[   31.374574]  ret_from_fork+0x10/0x20
[   31.374734] 
[   31.374774] Allocated by task 189:
[   31.374821]  kasan_save_stack+0x3c/0x68
[   31.374878]  kasan_save_track+0x20/0x40
[   31.374981]  kasan_save_alloc_info+0x40/0x58
[   31.375038]  __kasan_krealloc+0x118/0x178
[   31.375088]  krealloc_noprof+0x128/0x360
[   31.375365]  krealloc_less_oob_helper+0x168/0xc50
[   31.375444]  krealloc_less_oob+0x20/0x38
[   31.375493]  kunit_try_run_case+0x170/0x3f0
[   31.375661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.375720]  kthread+0x328/0x630
[   31.375752]  ret_from_fork+0x10/0x20
[   31.375905] 
[   31.375925] The buggy address belongs to the object at fff00000c8f61c00
[   31.375925]  which belongs to the cache kmalloc-256 of size 256
[   31.375981] The buggy address is located 7 bytes to the right of
[   31.375981]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.376042] 
[   31.376061] The buggy address belongs to the physical page:
[   31.376494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.376612] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.376757] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.376851] page_type: f5(slab)
[   31.376937] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.377025] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.377157] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.377247] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.377341] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.377685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.377792] page dumped because: kasan: bad access detected
[   31.377873] 
[   31.377943] Memory state around the buggy address:
[   31.378053]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.378124]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.378166] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.378212]                                                  ^
[   31.378247]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.378302]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.378361] ==================================================================
[   31.439254] ==================================================================
[   31.439298] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.439345] Write of size 1 at addr fff00000c9b120da by task kunit_try_catch/193
[   31.439523] 
[   31.439679] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.439826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.440145] Hardware name: linux,dummy-virt (DT)
[   31.440212] Call trace:
[   31.440233]  show_stack+0x20/0x38 (C)
[   31.440339]  dump_stack_lvl+0x8c/0xd0
[   31.440697]  print_report+0x118/0x5e8
[   31.440989]  kasan_report+0xdc/0x128
[   31.441116]  __asan_report_store1_noabort+0x20/0x30
[   31.441241]  krealloc_less_oob_helper+0xa80/0xc50
[   31.441313]  krealloc_large_less_oob+0x20/0x38
[   31.441587]  kunit_try_run_case+0x170/0x3f0
[   31.441751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.441847]  kthread+0x328/0x630
[   31.442196]  ret_from_fork+0x10/0x20
[   31.442308] 
[   31.442336] The buggy address belongs to the physical page:
[   31.442383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.442434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.442481] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.442532] page_type: f8(unknown)
[   31.442602] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.442663] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.442722] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.442778] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.442826] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.442891] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.442930] page dumped because: kasan: bad access detected
[   31.442968] 
[   31.442986] Memory state around the buggy address:
[   31.443022]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.443063]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.443572] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.443678]                                                     ^
[   31.443766]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.443816]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.443852] ==================================================================
[   31.428614] ==================================================================
[   31.428667] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.429134] Write of size 1 at addr fff00000c9b120c9 by task kunit_try_catch/193
[   31.429203] 
[   31.429237] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.429543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.429597] Hardware name: linux,dummy-virt (DT)
[   31.429639] Call trace:
[   31.429664]  show_stack+0x20/0x38 (C)
[   31.429784]  dump_stack_lvl+0x8c/0xd0
[   31.429862]  print_report+0x118/0x5e8
[   31.429906]  kasan_report+0xdc/0x128
[   31.429977]  __asan_report_store1_noabort+0x20/0x30
[   31.430050]  krealloc_less_oob_helper+0xa48/0xc50
[   31.430149]  krealloc_large_less_oob+0x20/0x38
[   31.430199]  kunit_try_run_case+0x170/0x3f0
[   31.430243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.430309]  kthread+0x328/0x630
[   31.430580]  ret_from_fork+0x10/0x20
[   31.430794] 
[   31.430822] The buggy address belongs to the physical page:
[   31.430875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.430927] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.430972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.431095] page_type: f8(unknown)
[   31.431163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.431255] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.431323] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.431388] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.431492] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.431559] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.431606] page dumped because: kasan: bad access detected
[   31.431676] 
[   31.431704] Memory state around the buggy address:
[   31.431754]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.431824]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.431872] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.432197]                                               ^
[   31.432373]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.432448]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.432563] ==================================================================
[   31.445117] ==================================================================
[   31.445211] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.445287] Write of size 1 at addr fff00000c9b120ea by task kunit_try_catch/193
[   31.445346] 
[   31.445382] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.445759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.445802] Hardware name: linux,dummy-virt (DT)
[   31.445976] Call trace:
[   31.446010]  show_stack+0x20/0x38 (C)
[   31.446382]  dump_stack_lvl+0x8c/0xd0
[   31.446578]  print_report+0x118/0x5e8
[   31.446801]  kasan_report+0xdc/0x128
[   31.447052]  __asan_report_store1_noabort+0x20/0x30
[   31.447131]  krealloc_less_oob_helper+0xae4/0xc50
[   31.447227]  krealloc_large_less_oob+0x20/0x38
[   31.447313]  kunit_try_run_case+0x170/0x3f0
[   31.447544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.447619]  kthread+0x328/0x630
[   31.447726]  ret_from_fork+0x10/0x20
[   31.447933] 
[   31.448008] The buggy address belongs to the physical page:
[   31.448103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.448158] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.448204] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.448655] page_type: f8(unknown)
[   31.448769] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.448855] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.448988] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.449241] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.449305] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.449644] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.449717] page dumped because: kasan: bad access detected
[   31.449814] 
[   31.449874] Memory state around the buggy address:
[   31.449907]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.449962]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.450290] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.450342]                                                           ^
[   31.450503]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.450566]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.450603] ==================================================================
[   31.451340] ==================================================================
[   31.451441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.451524] Write of size 1 at addr fff00000c9b120eb by task kunit_try_catch/193
[   31.451576] 
[   31.451621] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.451879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.451931] Hardware name: linux,dummy-virt (DT)
[   31.452073] Call trace:
[   31.452131]  show_stack+0x20/0x38 (C)
[   31.452310]  dump_stack_lvl+0x8c/0xd0
[   31.452528]  print_report+0x118/0x5e8
[   31.452757]  kasan_report+0xdc/0x128
[   31.452828]  __asan_report_store1_noabort+0x20/0x30
[   31.452987]  krealloc_less_oob_helper+0xa58/0xc50
[   31.453043]  krealloc_large_less_oob+0x20/0x38
[   31.453267]  kunit_try_run_case+0x170/0x3f0
[   31.453490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.453585]  kthread+0x328/0x630
[   31.453726]  ret_from_fork+0x10/0x20
[   31.453836] 
[   31.453995] The buggy address belongs to the physical page:
[   31.454063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10
[   31.454454] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.454630] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.454747] page_type: f8(unknown)
[   31.454826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.454938] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.455041] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.455099] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.455459] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff
[   31.455539] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.455581] page dumped because: kasan: bad access detected
[   31.455612] 
[   31.455631] Memory state around the buggy address:
[   31.455672]  fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.455714]  fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.456119] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.456288]                                                           ^
[   31.456373]  fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.456580]  fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.456661] ==================================================================
[   31.389248] ==================================================================
[   31.389295] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.389583] Write of size 1 at addr fff00000c8f61cea by task kunit_try_catch/189
[   31.390123] 
[   31.390166] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.390249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.390275] Hardware name: linux,dummy-virt (DT)
[   31.390559] Call trace:
[   31.390618]  show_stack+0x20/0x38 (C)
[   31.390670]  dump_stack_lvl+0x8c/0xd0
[   31.390716]  print_report+0x118/0x5e8
[   31.390759]  kasan_report+0xdc/0x128
[   31.391095]  __asan_report_store1_noabort+0x20/0x30
[   31.391185]  krealloc_less_oob_helper+0xae4/0xc50
[   31.391464]  krealloc_less_oob+0x20/0x38
[   31.391702]  kunit_try_run_case+0x170/0x3f0
[   31.391963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.392048]  kthread+0x328/0x630
[   31.392225]  ret_from_fork+0x10/0x20
[   31.392381] 
[   31.392451] Allocated by task 189:
[   31.392609]  kasan_save_stack+0x3c/0x68
[   31.392676]  kasan_save_track+0x20/0x40
[   31.392786]  kasan_save_alloc_info+0x40/0x58
[   31.392872]  __kasan_krealloc+0x118/0x178
[   31.393005]  krealloc_noprof+0x128/0x360
[   31.393206]  krealloc_less_oob_helper+0x168/0xc50
[   31.393262]  krealloc_less_oob+0x20/0x38
[   31.393429]  kunit_try_run_case+0x170/0x3f0
[   31.393511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.393633]  kthread+0x328/0x630
[   31.393747]  ret_from_fork+0x10/0x20
[   31.393823] 
[   31.393842] The buggy address belongs to the object at fff00000c8f61c00
[   31.393842]  which belongs to the cache kmalloc-256 of size 256
[   31.394113] The buggy address is located 33 bytes to the right of
[   31.394113]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.394355] 
[   31.394423] The buggy address belongs to the physical page:
[   31.394725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.394813] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.394876] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.395226] page_type: f5(slab)
[   31.395338] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.395401] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.395450] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.395496] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.395558] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.395613] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.395652] page dumped because: kasan: bad access detected
[   31.395681] 
[   31.395698] Memory state around the buggy address:
[   31.395963]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.396161]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.396250] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.396318]                                                           ^
[   31.396371]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.396415]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.396636] ==================================================================
[   31.397571] ==================================================================
[   31.397756] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.397810] Write of size 1 at addr fff00000c8f61ceb by task kunit_try_catch/189
[   31.397983] 
[   31.398032] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.398159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.398186] Hardware name: linux,dummy-virt (DT)
[   31.398232] Call trace:
[   31.398254]  show_stack+0x20/0x38 (C)
[   31.398551]  dump_stack_lvl+0x8c/0xd0
[   31.398654]  print_report+0x118/0x5e8
[   31.398745]  kasan_report+0xdc/0x128
[   31.398828]  __asan_report_store1_noabort+0x20/0x30
[   31.398886]  krealloc_less_oob_helper+0xa58/0xc50
[   31.399072]  krealloc_less_oob+0x20/0x38
[   31.399224]  kunit_try_run_case+0x170/0x3f0
[   31.399279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.399329]  kthread+0x328/0x630
[   31.399369]  ret_from_fork+0x10/0x20
[   31.399453] 
[   31.399473] Allocated by task 189:
[   31.399500]  kasan_save_stack+0x3c/0x68
[   31.399538]  kasan_save_track+0x20/0x40
[   31.399572]  kasan_save_alloc_info+0x40/0x58
[   31.399607]  __kasan_krealloc+0x118/0x178
[   31.399641]  krealloc_noprof+0x128/0x360
[   31.399678]  krealloc_less_oob_helper+0x168/0xc50
[   31.400128]  krealloc_less_oob+0x20/0x38
[   31.400196]  kunit_try_run_case+0x170/0x3f0
[   31.400238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.400538]  kthread+0x328/0x630
[   31.400864]  ret_from_fork+0x10/0x20
[   31.400940] 
[   31.400977] The buggy address belongs to the object at fff00000c8f61c00
[   31.400977]  which belongs to the cache kmalloc-256 of size 256
[   31.401033] The buggy address is located 34 bytes to the right of
[   31.401033]  allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9)
[   31.401399] 
[   31.401516] The buggy address belongs to the physical page:
[   31.401585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60
[   31.402108] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.402209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.402492] page_type: f5(slab)
[   31.402694] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.402792] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.402879] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.403106] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.403254] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff
[   31.403385] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.403430] page dumped because: kasan: bad access detected
[   31.403628] 
[   31.403780] Memory state around the buggy address:
[   31.403897]  fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.403971]  fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.404103] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.404142]                                                           ^
[   31.404194]  fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.404237]  fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.404275] ==================================================================


[   24.446139] ==================================================================
[   24.446457] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   24.446799] Write of size 1 at addr ffff88810500d6d0 by task kunit_try_catch/206
[   24.447099] 
[   24.448069] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.448126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.448139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.448160] Call Trace:
[   24.448173]  <TASK>
[   24.448207]  dump_stack_lvl+0x73/0xb0
[   24.448241]  print_report+0xd1/0x640
[   24.448265]  ? __virt_addr_valid+0x1db/0x2d0
[   24.448289]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.448311]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.448336]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.448359]  kasan_report+0x141/0x180
[   24.448380]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.448406]  __asan_report_store1_noabort+0x1b/0x30
[   24.448429]  krealloc_less_oob_helper+0xe23/0x11d0
[   24.448453]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.448475]  ? finish_task_switch.isra.0+0x153/0x700
[   24.448496]  ? __switch_to+0x47/0xf80
[   24.448521]  ? __schedule+0x10da/0x2b60
[   24.448544]  ? __pfx_read_tsc+0x10/0x10
[   24.448568]  krealloc_less_oob+0x1c/0x30
[   24.448588]  kunit_try_run_case+0x1a5/0x480
[   24.448611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.448632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.448664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.448696]  ? __kthread_parkme+0x82/0x180
[   24.448715]  ? preempt_count_sub+0x50/0x80
[   24.448736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.448758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.448857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.448883]  kthread+0x337/0x6f0
[   24.448902]  ? trace_preempt_on+0x20/0xc0
[   24.448925]  ? __pfx_kthread+0x10/0x10
[   24.448944]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.448974]  ? calculate_sigpending+0x7b/0xa0
[   24.448997]  ? __pfx_kthread+0x10/0x10
[   24.449017]  ret_from_fork+0x116/0x1d0
[   24.449035]  ? __pfx_kthread+0x10/0x10
[   24.449055]  ret_from_fork_asm+0x1a/0x30
[   24.449085]  </TASK>
[   24.449095] 
[   24.461134] Allocated by task 206:
[   24.461429]  kasan_save_stack+0x45/0x70
[   24.461631]  kasan_save_track+0x18/0x40
[   24.461821]  kasan_save_alloc_info+0x3b/0x50
[   24.462014]  __kasan_krealloc+0x190/0x1f0
[   24.462208]  krealloc_noprof+0xf3/0x340
[   24.462385]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.462596]  krealloc_less_oob+0x1c/0x30
[   24.462776]  kunit_try_run_case+0x1a5/0x480
[   24.462968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.463781]  kthread+0x337/0x6f0
[   24.464244]  ret_from_fork+0x116/0x1d0
[   24.464407]  ret_from_fork_asm+0x1a/0x30
[   24.464605] 
[   24.464678] The buggy address belongs to the object at ffff88810500d600
[   24.464678]  which belongs to the cache kmalloc-256 of size 256
[   24.465513] The buggy address is located 7 bytes to the right of
[   24.465513]  allocated 201-byte region [ffff88810500d600, ffff88810500d6c9)
[   24.466457] 
[   24.466569] The buggy address belongs to the physical page:
[   24.467109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10500c
[   24.467588] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.467924] flags: 0x200000000000040(head|node=0|zone=2)
[   24.468162] page_type: f5(slab)
[   24.468311] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.468642] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.468951] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.469941] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.470385] head: 0200000000000001 ffffea0004140301 00000000ffffffff 00000000ffffffff
[   24.470930] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.471330] page dumped because: kasan: bad access detected
[   24.471688] 
[   24.471760] Memory state around the buggy address:
[   24.472283]  ffff88810500d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.472680]  ffff88810500d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.473324] >ffff88810500d680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.473768]                                                  ^
[   24.474224]  ffff88810500d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.474658]  ffff88810500d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.475206] ==================================================================
[   24.606549] ==================================================================
[   24.606997] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   24.607264] Write of size 1 at addr ffff888102b3e0c9 by task kunit_try_catch/210
[   24.608058] 
[   24.608266] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.608537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.608555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.608578] Call Trace:
[   24.608593]  <TASK>
[   24.608611]  dump_stack_lvl+0x73/0xb0
[   24.608647]  print_report+0xd1/0x640
[   24.608671]  ? __virt_addr_valid+0x1db/0x2d0
[   24.608695]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.608717]  ? kasan_addr_to_slab+0x11/0xa0
[   24.608737]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.608759]  kasan_report+0x141/0x180
[   24.608783]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.608835]  __asan_report_store1_noabort+0x1b/0x30
[   24.608872]  krealloc_less_oob_helper+0xd70/0x11d0
[   24.608897]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.608920]  ? finish_task_switch.isra.0+0x153/0x700
[   24.608941]  ? __switch_to+0x47/0xf80
[   24.608967]  ? __schedule+0x10da/0x2b60
[   24.608990]  ? __pfx_read_tsc+0x10/0x10
[   24.609014]  krealloc_large_less_oob+0x1c/0x30
[   24.609037]  kunit_try_run_case+0x1a5/0x480
[   24.609061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.609082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.609114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.609146]  ? __kthread_parkme+0x82/0x180
[   24.609167]  ? preempt_count_sub+0x50/0x80
[   24.609203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.609225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.609247]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.609269]  kthread+0x337/0x6f0
[   24.609288]  ? trace_preempt_on+0x20/0xc0
[   24.609311]  ? __pfx_kthread+0x10/0x10
[   24.609330]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.609359]  ? calculate_sigpending+0x7b/0xa0
[   24.609382]  ? __pfx_kthread+0x10/0x10
[   24.609402]  ret_from_fork+0x116/0x1d0
[   24.609420]  ? __pfx_kthread+0x10/0x10
[   24.609439]  ret_from_fork_asm+0x1a/0x30
[   24.609469]  </TASK>
[   24.609482] 
[   24.627143] The buggy address belongs to the physical page:
[   24.627859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b3c
[   24.628764] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.629349] flags: 0x200000000000040(head|node=0|zone=2)
[   24.629541] page_type: f8(unknown)
[   24.629669] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.630532] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.631696] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.632730] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.633545] head: 0200000000000002 ffffea00040acf01 00000000ffffffff 00000000ffffffff
[   24.634079] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.634943] page dumped because: kasan: bad access detected
[   24.635571] 
[   24.635673] Memory state around the buggy address:
[   24.636357]  ffff888102b3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.636990]  ffff888102b3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.637228] >ffff888102b3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.637437]                                               ^
[   24.637608]  ffff888102b3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.637967]  ffff888102b3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.638567] ==================================================================
[   24.689017] ==================================================================
[   24.689451] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   24.689701] Write of size 1 at addr ffff888102b3e0ea by task kunit_try_catch/210
[   24.689920] 
[   24.689998] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.690041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.690053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.690085] Call Trace:
[   24.690118]  <TASK>
[   24.690132]  dump_stack_lvl+0x73/0xb0
[   24.690161]  print_report+0xd1/0x640
[   24.690183]  ? __virt_addr_valid+0x1db/0x2d0
[   24.690217]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.690239]  ? kasan_addr_to_slab+0x11/0xa0
[   24.690259]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.690281]  kasan_report+0x141/0x180
[   24.690303]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.690331]  __asan_report_store1_noabort+0x1b/0x30
[   24.690355]  krealloc_less_oob_helper+0xe90/0x11d0
[   24.690379]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.690402]  ? finish_task_switch.isra.0+0x153/0x700
[   24.690423]  ? __switch_to+0x47/0xf80
[   24.690447]  ? __schedule+0x10da/0x2b60
[   24.690470]  ? __pfx_read_tsc+0x10/0x10
[   24.690493]  krealloc_large_less_oob+0x1c/0x30
[   24.690514]  kunit_try_run_case+0x1a5/0x480
[   24.690539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.690560]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.690593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.690631]  ? __kthread_parkme+0x82/0x180
[   24.690650]  ? preempt_count_sub+0x50/0x80
[   24.690671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.690694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.690716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.690738]  kthread+0x337/0x6f0
[   24.690757]  ? trace_preempt_on+0x20/0xc0
[   24.690779]  ? __pfx_kthread+0x10/0x10
[   24.690821]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.690864]  ? calculate_sigpending+0x7b/0xa0
[   24.690888]  ? __pfx_kthread+0x10/0x10
[   24.690909]  ret_from_fork+0x116/0x1d0
[   24.690927]  ? __pfx_kthread+0x10/0x10
[   24.690946]  ret_from_fork_asm+0x1a/0x30
[   24.690976]  </TASK>
[   24.690986] 
[   24.705232] The buggy address belongs to the physical page:
[   24.705745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b3c
[   24.706381] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.707075] flags: 0x200000000000040(head|node=0|zone=2)
[   24.707583] page_type: f8(unknown)
[   24.707902] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.708561] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.709325] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.709560] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.709787] head: 0200000000000002 ffffea00040acf01 00000000ffffffff 00000000ffffffff
[   24.710519] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.711345] page dumped because: kasan: bad access detected
[   24.711868] 
[   24.712021] Memory state around the buggy address:
[   24.712446]  ffff888102b3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.713108]  ffff888102b3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.713811] >ffff888102b3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.714027]                                                           ^
[   24.714233]  ffff888102b3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.714736]  ffff888102b3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.715117] ==================================================================
[   24.640347] ==================================================================
[   24.640952] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   24.641514] Write of size 1 at addr ffff888102b3e0d0 by task kunit_try_catch/210
[   24.641747] 
[   24.641837] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.641884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.641896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.641918] Call Trace:
[   24.641931]  <TASK>
[   24.641947]  dump_stack_lvl+0x73/0xb0
[   24.641980]  print_report+0xd1/0x640
[   24.642003]  ? __virt_addr_valid+0x1db/0x2d0
[   24.642027]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.642051]  ? kasan_addr_to_slab+0x11/0xa0
[   24.642071]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.642094]  kasan_report+0x141/0x180
[   24.642115]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.642141]  __asan_report_store1_noabort+0x1b/0x30
[   24.642218]  krealloc_less_oob_helper+0xe23/0x11d0
[   24.642243]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.642295]  ? finish_task_switch.isra.0+0x153/0x700
[   24.642316]  ? __switch_to+0x47/0xf80
[   24.642352]  ? __schedule+0x10da/0x2b60
[   24.642375]  ? __pfx_read_tsc+0x10/0x10
[   24.642400]  krealloc_large_less_oob+0x1c/0x30
[   24.642422]  kunit_try_run_case+0x1a5/0x480
[   24.642446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.642467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.642514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.642546]  ? __kthread_parkme+0x82/0x180
[   24.642566]  ? preempt_count_sub+0x50/0x80
[   24.642587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.642610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.642640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.642664]  kthread+0x337/0x6f0
[   24.642683]  ? trace_preempt_on+0x20/0xc0
[   24.642705]  ? __pfx_kthread+0x10/0x10
[   24.642725]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.642754]  ? calculate_sigpending+0x7b/0xa0
[   24.642777]  ? __pfx_kthread+0x10/0x10
[   24.642821]  ret_from_fork+0x116/0x1d0
[   24.642840]  ? __pfx_kthread+0x10/0x10
[   24.642860]  ret_from_fork_asm+0x1a/0x30
[   24.642901]  </TASK>
[   24.642912] 
[   24.651409] The buggy address belongs to the physical page:
[   24.651879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b3c
[   24.652813] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.653628] flags: 0x200000000000040(head|node=0|zone=2)
[   24.654231] page_type: f8(unknown)
[   24.654594] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.655434] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.656301] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.657216] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.658100] head: 0200000000000002 ffffea00040acf01 00000000ffffffff 00000000ffffffff
[   24.658897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.659540] page dumped because: kasan: bad access detected
[   24.659926] 
[   24.659991] Memory state around the buggy address:
[   24.660138]  ffff888102b3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.660354]  ffff888102b3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.660559] >ffff888102b3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.660762]                                                  ^
[   24.660933]  ffff888102b3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.661137]  ffff888102b3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.661849] ==================================================================
[   24.662728] ==================================================================
[   24.663406] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   24.664226] Write of size 1 at addr ffff888102b3e0da by task kunit_try_catch/210
[   24.665015] 
[   24.665198] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.665245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.665257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.665279] Call Trace:
[   24.665295]  <TASK>
[   24.665308]  dump_stack_lvl+0x73/0xb0
[   24.665340]  print_report+0xd1/0x640
[   24.665363]  ? __virt_addr_valid+0x1db/0x2d0
[   24.665386]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.665408]  ? kasan_addr_to_slab+0x11/0xa0
[   24.665428]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.665451]  kasan_report+0x141/0x180
[   24.665474]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.665501]  __asan_report_store1_noabort+0x1b/0x30
[   24.665526]  krealloc_less_oob_helper+0xec6/0x11d0
[   24.665556]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.665582]  ? finish_task_switch.isra.0+0x153/0x700
[   24.665603]  ? __switch_to+0x47/0xf80
[   24.665628]  ? __schedule+0x10da/0x2b60
[   24.665651]  ? __pfx_read_tsc+0x10/0x10
[   24.665676]  krealloc_large_less_oob+0x1c/0x30
[   24.665698]  kunit_try_run_case+0x1a5/0x480
[   24.665722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.665743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.665781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.665814]  ? __kthread_parkme+0x82/0x180
[   24.665835]  ? preempt_count_sub+0x50/0x80
[   24.665858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.665880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.665904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.665925]  kthread+0x337/0x6f0
[   24.665944]  ? trace_preempt_on+0x20/0xc0
[   24.665966]  ? __pfx_kthread+0x10/0x10
[   24.665986]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.666015]  ? calculate_sigpending+0x7b/0xa0
[   24.666038]  ? __pfx_kthread+0x10/0x10
[   24.666058]  ret_from_fork+0x116/0x1d0
[   24.666092]  ? __pfx_kthread+0x10/0x10
[   24.666111]  ret_from_fork_asm+0x1a/0x30
[   24.666141]  </TASK>
[   24.666151] 
[   24.679688] The buggy address belongs to the physical page:
[   24.680250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b3c
[   24.680935] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.681478] flags: 0x200000000000040(head|node=0|zone=2)
[   24.681761] page_type: f8(unknown)
[   24.681885] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.682393] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.683092] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.683626] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.684046] head: 0200000000000002 ffffea00040acf01 00000000ffffffff 00000000ffffffff
[   24.684316] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.684539] page dumped because: kasan: bad access detected
[   24.684702] 
[   24.684764] Memory state around the buggy address:
[   24.685230]  ffff888102b3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.685674]  ffff888102b3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.686058] >ffff888102b3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.686312]                                                     ^
[   24.686555]  ffff888102b3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.687285]  ffff888102b3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.688108] ==================================================================
[   24.476469] ==================================================================
[   24.477107] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   24.477439] Write of size 1 at addr ffff88810500d6da by task kunit_try_catch/206
[   24.478110] 
[   24.478246] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.478296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.478307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.478329] Call Trace:
[   24.478347]  <TASK>
[   24.478363]  dump_stack_lvl+0x73/0xb0
[   24.478397]  print_report+0xd1/0x640
[   24.478420]  ? __virt_addr_valid+0x1db/0x2d0
[   24.478443]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.478466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.478490]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.478513]  kasan_report+0x141/0x180
[   24.478534]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.478560]  __asan_report_store1_noabort+0x1b/0x30
[   24.478583]  krealloc_less_oob_helper+0xec6/0x11d0
[   24.478607]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.478635]  ? finish_task_switch.isra.0+0x153/0x700
[   24.478656]  ? __switch_to+0x47/0xf80
[   24.478681]  ? __schedule+0x10da/0x2b60
[   24.478703]  ? __pfx_read_tsc+0x10/0x10
[   24.478727]  krealloc_less_oob+0x1c/0x30
[   24.478747]  kunit_try_run_case+0x1a5/0x480
[   24.478771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.479054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.479091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.479124]  ? __kthread_parkme+0x82/0x180
[   24.479143]  ? preempt_count_sub+0x50/0x80
[   24.479165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.479199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.479222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.479244]  kthread+0x337/0x6f0
[   24.479263]  ? trace_preempt_on+0x20/0xc0
[   24.479285]  ? __pfx_kthread+0x10/0x10
[   24.479305]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.479334]  ? calculate_sigpending+0x7b/0xa0
[   24.479358]  ? __pfx_kthread+0x10/0x10
[   24.479378]  ret_from_fork+0x116/0x1d0
[   24.479397]  ? __pfx_kthread+0x10/0x10
[   24.479416]  ret_from_fork_asm+0x1a/0x30
[   24.479446]  </TASK>
[   24.479457] 
[   24.491564] Allocated by task 206:
[   24.491714]  kasan_save_stack+0x45/0x70
[   24.491927]  kasan_save_track+0x18/0x40
[   24.492123]  kasan_save_alloc_info+0x3b/0x50
[   24.492320]  __kasan_krealloc+0x190/0x1f0
[   24.492505]  krealloc_noprof+0xf3/0x340
[   24.492676]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.492888]  krealloc_less_oob+0x1c/0x30
[   24.493067]  kunit_try_run_case+0x1a5/0x480
[   24.494082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.494307]  kthread+0x337/0x6f0
[   24.494671]  ret_from_fork+0x116/0x1d0
[   24.495081]  ret_from_fork_asm+0x1a/0x30
[   24.495291] 
[   24.495361] The buggy address belongs to the object at ffff88810500d600
[   24.495361]  which belongs to the cache kmalloc-256 of size 256
[   24.496242] The buggy address is located 17 bytes to the right of
[   24.496242]  allocated 201-byte region [ffff88810500d600, ffff88810500d6c9)
[   24.497014] 
[   24.497118] The buggy address belongs to the physical page:
[   24.497483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10500c
[   24.498239] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.498741] flags: 0x200000000000040(head|node=0|zone=2)
[   24.499196] page_type: f5(slab)
[   24.499337] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.499962] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.500410] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.500940] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.501285] head: 0200000000000001 ffffea0004140301 00000000ffffffff 00000000ffffffff
[   24.501610] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.502346] page dumped because: kasan: bad access detected
[   24.502679] 
[   24.503042] Memory state around the buggy address:
[   24.503271]  ffff88810500d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.503645]  ffff88810500d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.504191] >ffff88810500d680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.504631]                                                     ^
[   24.505139]  ffff88810500d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.505520]  ffff88810500d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.506158] ==================================================================
[   24.716187] ==================================================================
[   24.716878] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   24.717408] Write of size 1 at addr ffff888102b3e0eb by task kunit_try_catch/210
[   24.717837] 
[   24.718008] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.718052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.718063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.718095] Call Trace:
[   24.718112]  <TASK>
[   24.718126]  dump_stack_lvl+0x73/0xb0
[   24.718161]  print_report+0xd1/0x640
[   24.718183]  ? __virt_addr_valid+0x1db/0x2d0
[   24.718216]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.718239]  ? kasan_addr_to_slab+0x11/0xa0
[   24.718259]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.718281]  kasan_report+0x141/0x180
[   24.718302]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.718330]  __asan_report_store1_noabort+0x1b/0x30
[   24.718353]  krealloc_less_oob_helper+0xd47/0x11d0
[   24.718377]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.718400]  ? finish_task_switch.isra.0+0x153/0x700
[   24.718421]  ? __switch_to+0x47/0xf80
[   24.718446]  ? __schedule+0x10da/0x2b60
[   24.718468]  ? __pfx_read_tsc+0x10/0x10
[   24.718491]  krealloc_large_less_oob+0x1c/0x30
[   24.718513]  kunit_try_run_case+0x1a5/0x480
[   24.718537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.718558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.718591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.718629]  ? __kthread_parkme+0x82/0x180
[   24.718649]  ? preempt_count_sub+0x50/0x80
[   24.718670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.718692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.718714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.718736]  kthread+0x337/0x6f0
[   24.718755]  ? trace_preempt_on+0x20/0xc0
[   24.718777]  ? __pfx_kthread+0x10/0x10
[   24.718815]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.718844]  ? calculate_sigpending+0x7b/0xa0
[   24.718874]  ? __pfx_kthread+0x10/0x10
[   24.718895]  ret_from_fork+0x116/0x1d0
[   24.718913]  ? __pfx_kthread+0x10/0x10
[   24.718932]  ret_from_fork_asm+0x1a/0x30
[   24.718963]  </TASK>
[   24.718972] 
[   24.731349] The buggy address belongs to the physical page:
[   24.731761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b3c
[   24.732076] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.732308] flags: 0x200000000000040(head|node=0|zone=2)
[   24.732496] page_type: f8(unknown)
[   24.732783] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.733534] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.734391] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.734622] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.735036] head: 0200000000000002 ffffea00040acf01 00000000ffffffff 00000000ffffffff
[   24.735300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.735522] page dumped because: kasan: bad access detected
[   24.735684] 
[   24.735745] Memory state around the buggy address:
[   24.735891]  ffff888102b3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.736382]  ffff888102b3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.736859] >ffff888102b3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.737597]                                                           ^
[   24.738259]  ffff888102b3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.738942]  ffff888102b3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.739384] ==================================================================
[   24.534310] ==================================================================
[   24.534904] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   24.535337] Write of size 1 at addr ffff88810500d6eb by task kunit_try_catch/206
[   24.535636] 
[   24.535730] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.535777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.535789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.535810] Call Trace:
[   24.535829]  <TASK>
[   24.535846]  dump_stack_lvl+0x73/0xb0
[   24.536418]  print_report+0xd1/0x640
[   24.536443]  ? __virt_addr_valid+0x1db/0x2d0
[   24.536466]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.536488]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.536513]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.536536]  kasan_report+0x141/0x180
[   24.536557]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.536584]  __asan_report_store1_noabort+0x1b/0x30
[   24.536607]  krealloc_less_oob_helper+0xd47/0x11d0
[   24.536631]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.536654]  ? finish_task_switch.isra.0+0x153/0x700
[   24.536675]  ? __switch_to+0x47/0xf80
[   24.536700]  ? __schedule+0x10da/0x2b60
[   24.536723]  ? __pfx_read_tsc+0x10/0x10
[   24.536747]  krealloc_less_oob+0x1c/0x30
[   24.536767]  kunit_try_run_case+0x1a5/0x480
[   24.536810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.536832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.536865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.536897]  ? __kthread_parkme+0x82/0x180
[   24.536917]  ? preempt_count_sub+0x50/0x80
[   24.536939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.536962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.536984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.537005]  kthread+0x337/0x6f0
[   24.537024]  ? trace_preempt_on+0x20/0xc0
[   24.537046]  ? __pfx_kthread+0x10/0x10
[   24.537065]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.537094]  ? calculate_sigpending+0x7b/0xa0
[   24.537118]  ? __pfx_kthread+0x10/0x10
[   24.537138]  ret_from_fork+0x116/0x1d0
[   24.537156]  ? __pfx_kthread+0x10/0x10
[   24.537176]  ret_from_fork_asm+0x1a/0x30
[   24.537217]  </TASK>
[   24.537227] 
[   24.547561] Allocated by task 206:
[   24.547884]  kasan_save_stack+0x45/0x70
[   24.548071]  kasan_save_track+0x18/0x40
[   24.548258]  kasan_save_alloc_info+0x3b/0x50
[   24.548443]  __kasan_krealloc+0x190/0x1f0
[   24.548620]  krealloc_noprof+0xf3/0x340
[   24.548773]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.549004]  krealloc_less_oob+0x1c/0x30
[   24.549682]  kunit_try_run_case+0x1a5/0x480
[   24.549829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.550177]  kthread+0x337/0x6f0
[   24.550332]  ret_from_fork+0x116/0x1d0
[   24.550498]  ret_from_fork_asm+0x1a/0x30
[   24.550699] 
[   24.550767] The buggy address belongs to the object at ffff88810500d600
[   24.550767]  which belongs to the cache kmalloc-256 of size 256
[   24.551368] The buggy address is located 34 bytes to the right of
[   24.551368]  allocated 201-byte region [ffff88810500d600, ffff88810500d6c9)
[   24.552350] 
[   24.552577] The buggy address belongs to the physical page:
[   24.553030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10500c
[   24.553455] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.553986] flags: 0x200000000000040(head|node=0|zone=2)
[   24.554347] page_type: f5(slab)
[   24.554567] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.555061] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.555373] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.555814] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.556301] head: 0200000000000001 ffffea0004140301 00000000ffffffff 00000000ffffffff
[   24.556690] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.557153] page dumped because: kasan: bad access detected
[   24.557353] 
[   24.557442] Memory state around the buggy address:
[   24.557653]  ffff88810500d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.557913]  ffff88810500d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.558224] >ffff88810500d680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.558502]                                                           ^
[   24.558764]  ffff88810500d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.559045]  ffff88810500d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.559865] ==================================================================
[   24.507396] ==================================================================
[   24.507719] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   24.508058] Write of size 1 at addr ffff88810500d6ea by task kunit_try_catch/206
[   24.508382] 
[   24.508475] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.508520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.508532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.508553] Call Trace:
[   24.508571]  <TASK>
[   24.508588]  dump_stack_lvl+0x73/0xb0
[   24.508618]  print_report+0xd1/0x640
[   24.508639]  ? __virt_addr_valid+0x1db/0x2d0
[   24.508662]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.508684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.508709]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.508731]  kasan_report+0x141/0x180
[   24.508751]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.508777]  __asan_report_store1_noabort+0x1b/0x30
[   24.508800]  krealloc_less_oob_helper+0xe90/0x11d0
[   24.508824]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.508846]  ? finish_task_switch.isra.0+0x153/0x700
[   24.508866]  ? __switch_to+0x47/0xf80
[   24.508891]  ? __schedule+0x10da/0x2b60
[   24.508913]  ? __pfx_read_tsc+0x10/0x10
[   24.508937]  krealloc_less_oob+0x1c/0x30
[   24.508957]  kunit_try_run_case+0x1a5/0x480
[   24.508980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.509001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.509033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.509064]  ? __kthread_parkme+0x82/0x180
[   24.509083]  ? preempt_count_sub+0x50/0x80
[   24.509104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.509126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.509147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.509169]  kthread+0x337/0x6f0
[   24.509687]  ? trace_preempt_on+0x20/0xc0
[   24.509723]  ? __pfx_kthread+0x10/0x10
[   24.509744]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.509775]  ? calculate_sigpending+0x7b/0xa0
[   24.509945]  ? __pfx_kthread+0x10/0x10
[   24.509970]  ret_from_fork+0x116/0x1d0
[   24.509989]  ? __pfx_kthread+0x10/0x10
[   24.510008]  ret_from_fork_asm+0x1a/0x30
[   24.510038]  </TASK>
[   24.510049] 
[   24.521145] Allocated by task 206:
[   24.521327]  kasan_save_stack+0x45/0x70
[   24.521523]  kasan_save_track+0x18/0x40
[   24.521700]  kasan_save_alloc_info+0x3b/0x50
[   24.522259]  __kasan_krealloc+0x190/0x1f0
[   24.522429]  krealloc_noprof+0xf3/0x340
[   24.522660]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.522911]  krealloc_less_oob+0x1c/0x30
[   24.523114]  kunit_try_run_case+0x1a5/0x480
[   24.523323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.523493]  kthread+0x337/0x6f0
[   24.523997]  ret_from_fork+0x116/0x1d0
[   24.524208]  ret_from_fork_asm+0x1a/0x30
[   24.524541] 
[   24.524625] The buggy address belongs to the object at ffff88810500d600
[   24.524625]  which belongs to the cache kmalloc-256 of size 256
[   24.525258] The buggy address is located 33 bytes to the right of
[   24.525258]  allocated 201-byte region [ffff88810500d600, ffff88810500d6c9)
[   24.525760] 
[   24.525862] The buggy address belongs to the physical page:
[   24.526127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10500c
[   24.526457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.526765] flags: 0x200000000000040(head|node=0|zone=2)
[   24.526996] page_type: f5(slab)
[   24.527149] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.528302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.528705] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.529215] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.529636] head: 0200000000000001 ffffea0004140301 00000000ffffffff 00000000ffffffff
[   24.530053] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.530362] page dumped because: kasan: bad access detected
[   24.530770] 
[   24.530905] Memory state around the buggy address:
[   24.531385]  ffff88810500d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.531642]  ffff88810500d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.531942] >ffff88810500d680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.532580]                                                           ^
[   24.532943]  ffff88810500d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.533197]  ffff88810500d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.533515] ==================================================================
[   24.412479] ==================================================================
[   24.413160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   24.414163] Write of size 1 at addr ffff88810500d6c9 by task kunit_try_catch/206
[   24.414966] 
[   24.415077] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.415327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.415340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.415363] Call Trace:
[   24.415377]  <TASK>
[   24.415394]  dump_stack_lvl+0x73/0xb0
[   24.415429]  print_report+0xd1/0x640
[   24.415451]  ? __virt_addr_valid+0x1db/0x2d0
[   24.415477]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.415500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.415526]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.415548]  kasan_report+0x141/0x180
[   24.415569]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.415595]  __asan_report_store1_noabort+0x1b/0x30
[   24.415618]  krealloc_less_oob_helper+0xd70/0x11d0
[   24.415643]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.415665]  ? finish_task_switch.isra.0+0x153/0x700
[   24.415687]  ? __switch_to+0x47/0xf80
[   24.415713]  ? __schedule+0x10da/0x2b60
[   24.415736]  ? __pfx_read_tsc+0x10/0x10
[   24.415760]  krealloc_less_oob+0x1c/0x30
[   24.415804]  kunit_try_run_case+0x1a5/0x480
[   24.415846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.415868]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.415902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.415933]  ? __kthread_parkme+0x82/0x180
[   24.415953]  ? preempt_count_sub+0x50/0x80
[   24.415974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.415996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.416018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.416040]  kthread+0x337/0x6f0
[   24.416058]  ? trace_preempt_on+0x20/0xc0
[   24.416082]  ? __pfx_kthread+0x10/0x10
[   24.416102]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.416131]  ? calculate_sigpending+0x7b/0xa0
[   24.416154]  ? __pfx_kthread+0x10/0x10
[   24.416176]  ret_from_fork+0x116/0x1d0
[   24.416204]  ? __pfx_kthread+0x10/0x10
[   24.416224]  ret_from_fork_asm+0x1a/0x30
[   24.416254]  </TASK>
[   24.416265] 
[   24.430658] Allocated by task 206:
[   24.431198]  kasan_save_stack+0x45/0x70
[   24.431730]  kasan_save_track+0x18/0x40
[   24.432332]  kasan_save_alloc_info+0x3b/0x50
[   24.432694]  __kasan_krealloc+0x190/0x1f0
[   24.432840]  krealloc_noprof+0xf3/0x340
[   24.432972]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.433123]  krealloc_less_oob+0x1c/0x30
[   24.433268]  kunit_try_run_case+0x1a5/0x480
[   24.433414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.433664]  kthread+0x337/0x6f0
[   24.433831]  ret_from_fork+0x116/0x1d0
[   24.433983]  ret_from_fork_asm+0x1a/0x30
[   24.434151] 
[   24.434768] The buggy address belongs to the object at ffff88810500d600
[   24.434768]  which belongs to the cache kmalloc-256 of size 256
[   24.435777] The buggy address is located 0 bytes to the right of
[   24.435777]  allocated 201-byte region [ffff88810500d600, ffff88810500d6c9)
[   24.436394] 
[   24.436714] The buggy address belongs to the physical page:
[   24.437166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10500c
[   24.437654] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.438195] flags: 0x200000000000040(head|node=0|zone=2)
[   24.438450] page_type: f5(slab)
[   24.438602] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.439384] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.439678] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.440283] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.440759] head: 0200000000000001 ffffea0004140301 00000000ffffffff 00000000ffffffff
[   24.441296] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.441744] page dumped because: kasan: bad access detected
[   24.442213] 
[   24.442296] Memory state around the buggy address:
[   24.442715]  ffff88810500d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.443375]  ffff88810500d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.443907] >ffff88810500d680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.444162]                                               ^
[   24.444666]  ffff88810500d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.445106]  ffff88810500d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.445442] ==================================================================