Hay
Date
July 22, 2025, 5:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.185015] ==================================================================
[   30.185370] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.185889] Write of size 1 at addr fff00000c81a4eda by task kunit_try_catch/189
[   30.186266] 
[   30.186920] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.187291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.187344] Hardware name: linux,dummy-virt (DT)
[   30.187456] Call trace:
[   30.187515]  show_stack+0x20/0x38 (C)
[   30.187618]  dump_stack_lvl+0x8c/0xd0
[   30.187705]  print_report+0x118/0x5e8
[   30.188060]  kasan_report+0xdc/0x128
[   30.188495]  __asan_report_store1_noabort+0x20/0x30
[   30.188575]  krealloc_less_oob_helper+0xa80/0xc50
[   30.188748]  krealloc_less_oob+0x20/0x38
[   30.188878]  kunit_try_run_case+0x170/0x3f0
[   30.189230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.189611]  kthread+0x328/0x630
[   30.189850]  ret_from_fork+0x10/0x20
[   30.189907] 
[   30.189925] Allocated by task 189:
[   30.190197]  kasan_save_stack+0x3c/0x68
[   30.190559]  kasan_save_track+0x20/0x40
[   30.190792]  kasan_save_alloc_info+0x40/0x58
[   30.190874]  __kasan_krealloc+0x118/0x178
[   30.190943]  krealloc_noprof+0x128/0x360
[   30.190978]  krealloc_less_oob_helper+0x168/0xc50
[   30.191177]  krealloc_less_oob+0x20/0x38
[   30.191261]  kunit_try_run_case+0x170/0x3f0
[   30.191393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.191455]  kthread+0x328/0x630
[   30.191488]  ret_from_fork+0x10/0x20
[   30.191739] 
[   30.192160] The buggy address belongs to the object at fff00000c81a4e00
[   30.192160]  which belongs to the cache kmalloc-256 of size 256
[   30.192375] The buggy address is located 17 bytes to the right of
[   30.192375]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.192583] 
[   30.192640] The buggy address belongs to the physical page:
[   30.192682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.193035] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.193199] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.193279] page_type: f5(slab)
[   30.193316] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.193526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.193763] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.193877] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.194008] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.194282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.194449] page dumped because: kasan: bad access detected
[   30.194539] 
[   30.194558] Memory state around the buggy address:
[   30.194708]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.194848]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.195012] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.195053]                                                     ^
[   30.195132]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.195398]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.195634] ==================================================================
[   30.161397] ==================================================================
[   30.161793] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.162341] Write of size 1 at addr fff00000c81a4ec9 by task kunit_try_catch/189
[   30.162445] 
[   30.162492] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.162827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.162923] Hardware name: linux,dummy-virt (DT)
[   30.163250] Call trace:
[   30.163322]  show_stack+0x20/0x38 (C)
[   30.163447]  dump_stack_lvl+0x8c/0xd0
[   30.163694]  print_report+0x118/0x5e8
[   30.163872]  kasan_report+0xdc/0x128
[   30.163948]  __asan_report_store1_noabort+0x20/0x30
[   30.164103]  krealloc_less_oob_helper+0xa48/0xc50
[   30.164215]  krealloc_less_oob+0x20/0x38
[   30.164366]  kunit_try_run_case+0x170/0x3f0
[   30.164563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.165201]  kthread+0x328/0x630
[   30.165311]  ret_from_fork+0x10/0x20
[   30.165441] 
[   30.165508] Allocated by task 189:
[   30.165633]  kasan_save_stack+0x3c/0x68
[   30.165955]  kasan_save_track+0x20/0x40
[   30.166126]  kasan_save_alloc_info+0x40/0x58
[   30.166206]  __kasan_krealloc+0x118/0x178
[   30.166250]  krealloc_noprof+0x128/0x360
[   30.166578]  krealloc_less_oob_helper+0x168/0xc50
[   30.166763]  krealloc_less_oob+0x20/0x38
[   30.166859]  kunit_try_run_case+0x170/0x3f0
[   30.167068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.167222]  kthread+0x328/0x630
[   30.167362]  ret_from_fork+0x10/0x20
[   30.167531] 
[   30.167858] The buggy address belongs to the object at fff00000c81a4e00
[   30.167858]  which belongs to the cache kmalloc-256 of size 256
[   30.168110] The buggy address is located 0 bytes to the right of
[   30.168110]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.168410] 
[   30.168447] The buggy address belongs to the physical page:
[   30.168484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.168552] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.168596] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.168646] page_type: f5(slab)
[   30.168684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.168733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.168780] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.168846] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.169304] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.169568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.169714] page dumped because: kasan: bad access detected
[   30.169801] 
[   30.170132] Memory state around the buggy address:
[   30.170400]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.170522]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.170708] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.170754]                                               ^
[   30.170986]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.171195]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.171399] ==================================================================
[   30.178292] ==================================================================
[   30.178656] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.178739] Write of size 1 at addr fff00000c81a4ed0 by task kunit_try_catch/189
[   30.178796] 
[   30.178979] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.179088] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.179312] Hardware name: linux,dummy-virt (DT)
[   30.179356] Call trace:
[   30.179705]  show_stack+0x20/0x38 (C)
[   30.179848]  dump_stack_lvl+0x8c/0xd0
[   30.179903]  print_report+0x118/0x5e8
[   30.179947]  kasan_report+0xdc/0x128
[   30.180034]  __asan_report_store1_noabort+0x20/0x30
[   30.180085]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.180160]  krealloc_less_oob+0x20/0x38
[   30.180522]  kunit_try_run_case+0x170/0x3f0
[   30.180662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.180793]  kthread+0x328/0x630
[   30.180880]  ret_from_fork+0x10/0x20
[   30.181153] 
[   30.181270] Allocated by task 189:
[   30.181458]  kasan_save_stack+0x3c/0x68
[   30.181520]  kasan_save_track+0x20/0x40
[   30.181577]  kasan_save_alloc_info+0x40/0x58
[   30.181613]  __kasan_krealloc+0x118/0x178
[   30.181840]  krealloc_noprof+0x128/0x360
[   30.181933]  krealloc_less_oob_helper+0x168/0xc50
[   30.182169]  krealloc_less_oob+0x20/0x38
[   30.182281]  kunit_try_run_case+0x170/0x3f0
[   30.182378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.182541]  kthread+0x328/0x630
[   30.182579]  ret_from_fork+0x10/0x20
[   30.182792] 
[   30.182984] The buggy address belongs to the object at fff00000c81a4e00
[   30.182984]  which belongs to the cache kmalloc-256 of size 256
[   30.183194] The buggy address is located 7 bytes to the right of
[   30.183194]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.183265] 
[   30.183284] The buggy address belongs to the physical page:
[   30.183318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.183381] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.183434] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.183491] page_type: f5(slab)
[   30.183529] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.183576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.183623] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.183669] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.183716] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.183762] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.183800] page dumped because: kasan: bad access detected
[   30.183841] 
[   30.183867] Memory state around the buggy address:
[   30.183907]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.183949]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.183990] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.184025]                                                  ^
[   30.184070]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.184121]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.184156] ==================================================================
[   30.240306] ==================================================================
[   30.240369] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.240423] Write of size 1 at addr fff00000c9aea0c9 by task kunit_try_catch/193
[   30.240471] 
[   30.240502] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.240586] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.240616] Hardware name: linux,dummy-virt (DT)
[   30.240645] Call trace:
[   30.240667]  show_stack+0x20/0x38 (C)
[   30.240714]  dump_stack_lvl+0x8c/0xd0
[   30.240758]  print_report+0x118/0x5e8
[   30.240801]  kasan_report+0xdc/0x128
[   30.241662]  __asan_report_store1_noabort+0x20/0x30
[   30.241786]  krealloc_less_oob_helper+0xa48/0xc50
[   30.241949]  krealloc_large_less_oob+0x20/0x38
[   30.242050]  kunit_try_run_case+0x170/0x3f0
[   30.242147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.242299]  kthread+0x328/0x630
[   30.242342]  ret_from_fork+0x10/0x20
[   30.242725] 
[   30.242831] The buggy address belongs to the physical page:
[   30.242983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.243141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.243237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.243625] page_type: f8(unknown)
[   30.243732] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.243834] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.243976] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.244048] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.244351] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.244789] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.244936] page dumped because: kasan: bad access detected
[   30.244988] 
[   30.245007] Memory state around the buggy address:
[   30.245045]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.245099]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.245446] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.245615]                                               ^
[   30.245694]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.245900]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.246306] ==================================================================
[   30.247608] ==================================================================
[   30.247692] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.247747] Write of size 1 at addr fff00000c9aea0d0 by task kunit_try_catch/193
[   30.247897] 
[   30.247928] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.248157] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.248313] Hardware name: linux,dummy-virt (DT)
[   30.248348] Call trace:
[   30.248369]  show_stack+0x20/0x38 (C)
[   30.248648]  dump_stack_lvl+0x8c/0xd0
[   30.248792]  print_report+0x118/0x5e8
[   30.248944]  kasan_report+0xdc/0x128
[   30.249065]  __asan_report_store1_noabort+0x20/0x30
[   30.249251]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.249314]  krealloc_large_less_oob+0x20/0x38
[   30.249656]  kunit_try_run_case+0x170/0x3f0
[   30.249765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.250005]  kthread+0x328/0x630
[   30.250093]  ret_from_fork+0x10/0x20
[   30.250268] 
[   30.250363] The buggy address belongs to the physical page:
[   30.250407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.250835] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.250931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.251031] page_type: f8(unknown)
[   30.251237] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.251331] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.251647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.251723] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.251867] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.252312] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.252654] page dumped because: kasan: bad access detected
[   30.252715] 
[   30.252763] Memory state around the buggy address:
[   30.252889]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.252951]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.252992] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.253038]                                                  ^
[   30.253074]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.253479]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.253877] ==================================================================
[   30.262647] ==================================================================
[   30.262736] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.263052] Write of size 1 at addr fff00000c9aea0ea by task kunit_try_catch/193
[   30.263120] 
[   30.263151] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.263236] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.263264] Hardware name: linux,dummy-virt (DT)
[   30.263348] Call trace:
[   30.263374]  show_stack+0x20/0x38 (C)
[   30.263425]  dump_stack_lvl+0x8c/0xd0
[   30.263471]  print_report+0x118/0x5e8
[   30.263515]  kasan_report+0xdc/0x128
[   30.263558]  __asan_report_store1_noabort+0x20/0x30
[   30.263611]  krealloc_less_oob_helper+0xae4/0xc50
[   30.263679]  krealloc_large_less_oob+0x20/0x38
[   30.263736]  kunit_try_run_case+0x170/0x3f0
[   30.263789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.263852]  kthread+0x328/0x630
[   30.263893]  ret_from_fork+0x10/0x20
[   30.263938] 
[   30.263967] The buggy address belongs to the physical page:
[   30.263998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.264048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.264105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.264152] page_type: f8(unknown)
[   30.264196] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.264244] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.264290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.264344] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.264391] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.264436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.264472] page dumped because: kasan: bad access detected
[   30.264501] 
[   30.264526] Memory state around the buggy address:
[   30.264555]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.264596]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.264645] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.264687]                                                           ^
[   30.264723]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.264771]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.265215] ==================================================================
[   30.266094] ==================================================================
[   30.266138] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.266210] Write of size 1 at addr fff00000c9aea0eb by task kunit_try_catch/193
[   30.266267] 
[   30.266597] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.266832] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.266870] Hardware name: linux,dummy-virt (DT)
[   30.266938] Call trace:
[   30.267000]  show_stack+0x20/0x38 (C)
[   30.267054]  dump_stack_lvl+0x8c/0xd0
[   30.267100]  print_report+0x118/0x5e8
[   30.267423]  kasan_report+0xdc/0x128
[   30.267535]  __asan_report_store1_noabort+0x20/0x30
[   30.267588]  krealloc_less_oob_helper+0xa58/0xc50
[   30.267653]  krealloc_large_less_oob+0x20/0x38
[   30.267729]  kunit_try_run_case+0x170/0x3f0
[   30.267783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.268005]  kthread+0x328/0x630
[   30.268048]  ret_from_fork+0x10/0x20
[   30.268435] 
[   30.268478] The buggy address belongs to the physical page:
[   30.268512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.268915] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.269034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.269211] page_type: f8(unknown)
[   30.269287] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.269382] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.269479] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.269548] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.269753] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.270030] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.270141] page dumped because: kasan: bad access detected
[   30.270218] 
[   30.270330] Memory state around the buggy address:
[   30.270408]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.270539]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.270595] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.270692]                                                           ^
[   30.270731]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.271064]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.271146] ==================================================================
[   30.255904] ==================================================================
[   30.256075] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.256137] Write of size 1 at addr fff00000c9aea0da by task kunit_try_catch/193
[   30.256203] 
[   30.256317] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.256433] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.256464] Hardware name: linux,dummy-virt (DT)
[   30.256504] Call trace:
[   30.256533]  show_stack+0x20/0x38 (C)
[   30.256585]  dump_stack_lvl+0x8c/0xd0
[   30.256635]  print_report+0x118/0x5e8
[   30.256688]  kasan_report+0xdc/0x128
[   30.256732]  __asan_report_store1_noabort+0x20/0x30
[   30.256779]  krealloc_less_oob_helper+0xa80/0xc50
[   30.257288]  krealloc_large_less_oob+0x20/0x38
[   30.257539]  kunit_try_run_case+0x170/0x3f0
[   30.257710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.257904]  kthread+0x328/0x630
[   30.257962]  ret_from_fork+0x10/0x20
[   30.258346] 
[   30.258486] The buggy address belongs to the physical page:
[   30.258531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8
[   30.258907] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.259049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.259401] page_type: f8(unknown)
[   30.259483] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.259584] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.260027] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.260111] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.260280] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff
[   30.260445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.260559] page dumped because: kasan: bad access detected
[   30.260690] 
[   30.260754] Memory state around the buggy address:
[   30.260786]  fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.260847]  fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.261191] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.261343]                                                     ^
[   30.261382]  fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.261423]  fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.261466] ==================================================================
[   30.196794] ==================================================================
[   30.197180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.197371] Write of size 1 at addr fff00000c81a4eea by task kunit_try_catch/189
[   30.197552] 
[   30.197636] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.197950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.197986] Hardware name: linux,dummy-virt (DT)
[   30.198056] Call trace:
[   30.198581]  show_stack+0x20/0x38 (C)
[   30.198644]  dump_stack_lvl+0x8c/0xd0
[   30.198691]  print_report+0x118/0x5e8
[   30.198744]  kasan_report+0xdc/0x128
[   30.198786]  __asan_report_store1_noabort+0x20/0x30
[   30.198846]  krealloc_less_oob_helper+0xae4/0xc50
[   30.198919]  krealloc_less_oob+0x20/0x38
[   30.198965]  kunit_try_run_case+0x170/0x3f0
[   30.199011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.199062]  kthread+0x328/0x630
[   30.199121]  ret_from_fork+0x10/0x20
[   30.199199] 
[   30.199217] Allocated by task 189:
[   30.199258]  kasan_save_stack+0x3c/0x68
[   30.199308]  kasan_save_track+0x20/0x40
[   30.199348]  kasan_save_alloc_info+0x40/0x58
[   30.199384]  __kasan_krealloc+0x118/0x178
[   30.199433]  krealloc_noprof+0x128/0x360
[   30.199476]  krealloc_less_oob_helper+0x168/0xc50
[   30.199524]  krealloc_less_oob+0x20/0x38
[   30.199561]  kunit_try_run_case+0x170/0x3f0
[   30.199596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.199636]  kthread+0x328/0x630
[   30.199673]  ret_from_fork+0x10/0x20
[   30.199713] 
[   30.199746] The buggy address belongs to the object at fff00000c81a4e00
[   30.199746]  which belongs to the cache kmalloc-256 of size 256
[   30.199800] The buggy address is located 33 bytes to the right of
[   30.199800]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.199871] 
[   30.199898] The buggy address belongs to the physical page:
[   30.199930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.199988] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.200041] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.200088] page_type: f5(slab)
[   30.200124] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.200186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.200234] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.200291] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.200338] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.200384] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.200421] page dumped because: kasan: bad access detected
[   30.200450] 
[   30.200475] Memory state around the buggy address:
[   30.200505]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.200545]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.200595] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.200630]                                                           ^
[   30.200666]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.200721]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.200766] ==================================================================
[   30.202449] ==================================================================
[   30.202941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.203026] Write of size 1 at addr fff00000c81a4eeb by task kunit_try_catch/189
[   30.203103] 
[   30.203145] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.203231] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.203516] Hardware name: linux,dummy-virt (DT)
[   30.203563] Call trace:
[   30.203760]  show_stack+0x20/0x38 (C)
[   30.203856]  dump_stack_lvl+0x8c/0xd0
[   30.203911]  print_report+0x118/0x5e8
[   30.203954]  kasan_report+0xdc/0x128
[   30.203998]  __asan_report_store1_noabort+0x20/0x30
[   30.204233]  krealloc_less_oob_helper+0xa58/0xc50
[   30.204339]  krealloc_less_oob+0x20/0x38
[   30.204541]  kunit_try_run_case+0x170/0x3f0
[   30.204605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.204659]  kthread+0x328/0x630
[   30.204880]  ret_from_fork+0x10/0x20
[   30.204942] 
[   30.205369] Allocated by task 189:
[   30.205537]  kasan_save_stack+0x3c/0x68
[   30.205628]  kasan_save_track+0x20/0x40
[   30.205748]  kasan_save_alloc_info+0x40/0x58
[   30.205846]  __kasan_krealloc+0x118/0x178
[   30.205964]  krealloc_noprof+0x128/0x360
[   30.206004]  krealloc_less_oob_helper+0x168/0xc50
[   30.206092]  krealloc_less_oob+0x20/0x38
[   30.206440]  kunit_try_run_case+0x170/0x3f0
[   30.206639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.206759]  kthread+0x328/0x630
[   30.206889]  ret_from_fork+0x10/0x20
[   30.207087] 
[   30.207337] The buggy address belongs to the object at fff00000c81a4e00
[   30.207337]  which belongs to the cache kmalloc-256 of size 256
[   30.207591] The buggy address is located 34 bytes to the right of
[   30.207591]  allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9)
[   30.207719] 
[   30.207919] The buggy address belongs to the physical page:
[   30.207987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4
[   30.208061] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.208197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.208304] page_type: f5(slab)
[   30.208490] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.208624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.208861] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.208989] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.209142] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff
[   30.209238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.209331] page dumped because: kasan: bad access detected
[   30.209363] 
[   30.209396] Memory state around the buggy address:
[   30.209606]  fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.209703]  fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.209759] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.210019]                                                           ^
[   30.210086]  fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210182]  fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210263] ==================================================================

[   24.796932] ==================================================================
[   24.797212] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   24.797543] Write of size 1 at addr ffff888104a83cd0 by task kunit_try_catch/206
[   24.798053] 
[   24.798211] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.798272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.798298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.798318] Call Trace:
[   24.798330]  <TASK>
[   24.798343]  dump_stack_lvl+0x73/0xb0
[   24.798385]  print_report+0xd1/0x640
[   24.798420]  ? __virt_addr_valid+0x1db/0x2d0
[   24.798502]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.798531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.798557]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.798580]  kasan_report+0x141/0x180
[   24.798603]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.798630]  __asan_report_store1_noabort+0x1b/0x30
[   24.798654]  krealloc_less_oob_helper+0xe23/0x11d0
[   24.798680]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.798703]  ? irqentry_exit+0x2a/0x60
[   24.798723]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.798753]  ? __pfx_krealloc_less_oob+0x10/0x10
[   24.798779]  krealloc_less_oob+0x1c/0x30
[   24.798800]  kunit_try_run_case+0x1a5/0x480
[   24.798824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.798858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.798882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.798907]  ? __kthread_parkme+0x82/0x180
[   24.798926]  ? preempt_count_sub+0x50/0x80
[   24.798949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.798972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.798995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.799019]  kthread+0x337/0x6f0
[   24.799038]  ? trace_preempt_on+0x20/0xc0
[   24.799060]  ? __pfx_kthread+0x10/0x10
[   24.799081]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.799104]  ? calculate_sigpending+0x7b/0xa0
[   24.799127]  ? __pfx_kthread+0x10/0x10
[   24.799167]  ret_from_fork+0x116/0x1d0
[   24.799188]  ? __pfx_kthread+0x10/0x10
[   24.799208]  ret_from_fork_asm+0x1a/0x30
[   24.799239]  </TASK>
[   24.799250] 
[   24.807236] Allocated by task 206:
[   24.807433]  kasan_save_stack+0x45/0x70
[   24.807840]  kasan_save_track+0x18/0x40
[   24.808029]  kasan_save_alloc_info+0x3b/0x50
[   24.808213]  __kasan_krealloc+0x190/0x1f0
[   24.808429]  krealloc_noprof+0xf3/0x340
[   24.808619]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.808839]  krealloc_less_oob+0x1c/0x30
[   24.809143]  kunit_try_run_case+0x1a5/0x480
[   24.809377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.809668]  kthread+0x337/0x6f0
[   24.809879]  ret_from_fork+0x116/0x1d0
[   24.810069]  ret_from_fork_asm+0x1a/0x30
[   24.810287] 
[   24.810354] The buggy address belongs to the object at ffff888104a83c00
[   24.810354]  which belongs to the cache kmalloc-256 of size 256
[   24.810954] The buggy address is located 7 bytes to the right of
[   24.810954]  allocated 201-byte region [ffff888104a83c00, ffff888104a83cc9)
[   24.811552] 
[   24.811665] The buggy address belongs to the physical page:
[   24.811904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a82
[   24.812274] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.812870] ksm flags: 0x200000000000040(head|node=0|zone=2)
[   24.813179] page_type: f5(slab)
[   24.813376] raw: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.813747] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.814097] head: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.814443] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.814750] head: 0200000000000001 ffffea000412a081 00000000ffffffff 00000000ffffffff
[   24.815057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.815338] page dumped because: kasan: bad access detected
[   24.815661] 
[   24.815754] Memory state around the buggy address:
[   24.815987]  ffff888104a83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.816344]  ffff888104a83c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.816734] >ffff888104a83c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.817067]                                                  ^
[   24.817369]  ffff888104a83d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.817697]  ffff888104a83d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.818032] ==================================================================
[   24.951955] ==================================================================
[   24.952190] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   24.952432] Write of size 1 at addr ffff888104aba0d0 by task kunit_try_catch/210
[   24.953116] 
[   24.953292] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.953338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.953350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.953371] Call Trace:
[   24.953382]  <TASK>
[   24.953396]  dump_stack_lvl+0x73/0xb0
[   24.953422]  print_report+0xd1/0x640
[   24.953445]  ? __virt_addr_valid+0x1db/0x2d0
[   24.953468]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.953491]  ? kasan_addr_to_slab+0x11/0xa0
[   24.953511]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.953535]  kasan_report+0x141/0x180
[   24.953557]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   24.953584]  __asan_report_store1_noabort+0x1b/0x30
[   24.953609]  krealloc_less_oob_helper+0xe23/0x11d0
[   24.953634]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.953658]  ? finish_task_switch.isra.0+0x153/0x700
[   24.953679]  ? __switch_to+0x47/0xf80
[   24.953704]  ? __schedule+0x10da/0x2b60
[   24.953778]  ? __pfx_read_tsc+0x10/0x10
[   24.953803]  krealloc_large_less_oob+0x1c/0x30
[   24.953826]  kunit_try_run_case+0x1a5/0x480
[   24.953863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.953885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.953909]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.953934]  ? __kthread_parkme+0x82/0x180
[   24.953954]  ? preempt_count_sub+0x50/0x80
[   24.953976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.954000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.954023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.954047]  kthread+0x337/0x6f0
[   24.954066]  ? trace_preempt_on+0x20/0xc0
[   24.954088]  ? __pfx_kthread+0x10/0x10
[   24.954109]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.954132]  ? calculate_sigpending+0x7b/0xa0
[   24.954154]  ? __pfx_kthread+0x10/0x10
[   24.954176]  ret_from_fork+0x116/0x1d0
[   24.954208]  ? __pfx_kthread+0x10/0x10
[   24.954228]  ret_from_fork_asm+0x1a/0x30
[   24.954258]  </TASK>
[   24.954269] 
[   24.964373] The buggy address belongs to the physical page:
[   24.964563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ab8
[   24.965301] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.965920] flags: 0x200000000000040(head|node=0|zone=2)
[   24.966158] page_type: f8(unknown)
[   24.966314] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.967188] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.967942] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.968359] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.968846] head: 0200000000000002 ffffea000412ae01 00000000ffffffff 00000000ffffffff
[   24.969151] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.969433] page dumped because: kasan: bad access detected
[   24.970131] 
[   24.970447] Memory state around the buggy address:
[   24.970726]  ffff888104ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.971021]  ffff888104aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.971803] >ffff888104aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.972274]                                                  ^
[   24.972699]  ffff888104aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.973040]  ffff888104aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.973586] ==================================================================
[   24.819909] ==================================================================
[   24.820244] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   24.820663] Write of size 1 at addr ffff888104a83cda by task kunit_try_catch/206
[   24.821009] 
[   24.821121] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.821206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.821220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.821240] Call Trace:
[   24.821253]  <TASK>
[   24.821267]  dump_stack_lvl+0x73/0xb0
[   24.821294]  print_report+0xd1/0x640
[   24.821316]  ? __virt_addr_valid+0x1db/0x2d0
[   24.821339]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.821362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.821405]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.821514]  kasan_report+0x141/0x180
[   24.821543]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.821572]  __asan_report_store1_noabort+0x1b/0x30
[   24.821596]  krealloc_less_oob_helper+0xec6/0x11d0
[   24.821621]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.821644]  ? irqentry_exit+0x2a/0x60
[   24.821665]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.821696]  ? __pfx_krealloc_less_oob+0x10/0x10
[   24.821721]  krealloc_less_oob+0x1c/0x30
[   24.821743]  kunit_try_run_case+0x1a5/0x480
[   24.821767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.821789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.821813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.821849]  ? __kthread_parkme+0x82/0x180
[   24.821887]  ? preempt_count_sub+0x50/0x80
[   24.821910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.821934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.821957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.821997]  kthread+0x337/0x6f0
[   24.822017]  ? trace_preempt_on+0x20/0xc0
[   24.822039]  ? __pfx_kthread+0x10/0x10
[   24.822060]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.822083]  ? calculate_sigpending+0x7b/0xa0
[   24.822105]  ? __pfx_kthread+0x10/0x10
[   24.822127]  ret_from_fork+0x116/0x1d0
[   24.822165]  ? __pfx_kthread+0x10/0x10
[   24.822186]  ret_from_fork_asm+0x1a/0x30
[   24.822217]  </TASK>
[   24.822228] 
[   24.830232] Allocated by task 206:
[   24.830434]  kasan_save_stack+0x45/0x70
[   24.830845]  kasan_save_track+0x18/0x40
[   24.831065]  kasan_save_alloc_info+0x3b/0x50
[   24.831276]  __kasan_krealloc+0x190/0x1f0
[   24.831568]  krealloc_noprof+0xf3/0x340
[   24.831729]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.831994]  krealloc_less_oob+0x1c/0x30
[   24.832214]  kunit_try_run_case+0x1a5/0x480
[   24.832430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.832744]  kthread+0x337/0x6f0
[   24.832926]  ret_from_fork+0x116/0x1d0
[   24.833128]  ret_from_fork_asm+0x1a/0x30
[   24.833336] 
[   24.833437] The buggy address belongs to the object at ffff888104a83c00
[   24.833437]  which belongs to the cache kmalloc-256 of size 256
[   24.834090] The buggy address is located 17 bytes to the right of
[   24.834090]  allocated 201-byte region [ffff888104a83c00, ffff888104a83cc9)
[   24.834729] 
[   24.834825] The buggy address belongs to the physical page:
[   24.835081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a82
[   24.835400] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.835918] ksm flags: 0x200000000000040(head|node=0|zone=2)
[   24.836251] page_type: f5(slab)
[   24.836456] raw: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.836855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.837206] head: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.837648] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.838013] head: 0200000000000001 ffffea000412a081 00000000ffffffff 00000000ffffffff
[   24.838382] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.838797] page dumped because: kasan: bad access detected
[   24.839069] 
[   24.839183] Memory state around the buggy address:
[   24.839406]  ffff888104a83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.839782]  ffff888104a83c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.840015] >ffff888104a83c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.840378]                                                     ^
[   24.840874]  ffff888104a83d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.841109]  ffff888104a83d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.841477] ==================================================================
[   24.842246] ==================================================================
[   24.842683] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   24.843030] Write of size 1 at addr ffff888104a83cea by task kunit_try_catch/206
[   24.843386] 
[   24.843576] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.843642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.843655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.843675] Call Trace:
[   24.843689]  <TASK>
[   24.843704]  dump_stack_lvl+0x73/0xb0
[   24.843731]  print_report+0xd1/0x640
[   24.843754]  ? __virt_addr_valid+0x1db/0x2d0
[   24.843777]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.843800]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.843825]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.843879]  kasan_report+0x141/0x180
[   24.843901]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.843929]  __asan_report_store1_noabort+0x1b/0x30
[   24.843971]  krealloc_less_oob_helper+0xe90/0x11d0
[   24.843997]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.844020]  ? irqentry_exit+0x2a/0x60
[   24.844040]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.844070]  ? __pfx_krealloc_less_oob+0x10/0x10
[   24.844096]  krealloc_less_oob+0x1c/0x30
[   24.844117]  kunit_try_run_case+0x1a5/0x480
[   24.844141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.844164]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.844188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.844232]  ? __kthread_parkme+0x82/0x180
[   24.844252]  ? preempt_count_sub+0x50/0x80
[   24.844275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.844299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.844322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.844345]  kthread+0x337/0x6f0
[   24.844365]  ? trace_preempt_on+0x20/0xc0
[   24.844406]  ? __pfx_kthread+0x10/0x10
[   24.844448]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.844551]  ? calculate_sigpending+0x7b/0xa0
[   24.844581]  ? __pfx_kthread+0x10/0x10
[   24.844618]  ret_from_fork+0x116/0x1d0
[   24.844638]  ? __pfx_kthread+0x10/0x10
[   24.844672]  ret_from_fork_asm+0x1a/0x30
[   24.844704]  </TASK>
[   24.844715] 
[   24.852614] Allocated by task 206:
[   24.852745]  kasan_save_stack+0x45/0x70
[   24.853227]  kasan_save_track+0x18/0x40
[   24.853436]  kasan_save_alloc_info+0x3b/0x50
[   24.853739]  __kasan_krealloc+0x190/0x1f0
[   24.853937]  krealloc_noprof+0xf3/0x340
[   24.854120]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.854396]  krealloc_less_oob+0x1c/0x30
[   24.854656]  kunit_try_run_case+0x1a5/0x480
[   24.854877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.855128]  kthread+0x337/0x6f0
[   24.855310]  ret_from_fork+0x116/0x1d0
[   24.855553]  ret_from_fork_asm+0x1a/0x30
[   24.855767] 
[   24.855877] The buggy address belongs to the object at ffff888104a83c00
[   24.855877]  which belongs to the cache kmalloc-256 of size 256
[   24.856413] The buggy address is located 33 bytes to the right of
[   24.856413]  allocated 201-byte region [ffff888104a83c00, ffff888104a83cc9)
[   24.857056] 
[   24.857148] The buggy address belongs to the physical page:
[   24.857419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a82
[   24.857975] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.858260] ksm flags: 0x200000000000040(head|node=0|zone=2)
[   24.858538] page_type: f5(slab)
[   24.858713] raw: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.859066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.859536] head: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.859881] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.860239] head: 0200000000000001 ffffea000412a081 00000000ffffffff 00000000ffffffff
[   24.860654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.861013] page dumped because: kasan: bad access detected
[   24.861248] 
[   24.861341] Memory state around the buggy address:
[   24.861643]  ffff888104a83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.861992]  ffff888104a83c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.862304] >ffff888104a83c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.862806]                                                           ^
[   24.863110]  ffff888104a83d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.863536]  ffff888104a83d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.863872] ==================================================================
[   25.017155] ==================================================================
[   25.017416] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   25.017768] Write of size 1 at addr ffff888104aba0eb by task kunit_try_catch/210
[   25.018006] 
[   25.018086] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   25.018130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.018142] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.018162] Call Trace:
[   25.018175]  <TASK>
[   25.018189]  dump_stack_lvl+0x73/0xb0
[   25.018217]  print_report+0xd1/0x640
[   25.018240]  ? __virt_addr_valid+0x1db/0x2d0
[   25.018263]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   25.018286]  ? kasan_addr_to_slab+0x11/0xa0
[   25.018307]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   25.018330]  kasan_report+0x141/0x180
[   25.018353]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   25.018425]  __asan_report_store1_noabort+0x1b/0x30
[   25.018451]  krealloc_less_oob_helper+0xd47/0x11d0
[   25.018506]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.018530]  ? finish_task_switch.isra.0+0x153/0x700
[   25.018551]  ? __switch_to+0x47/0xf80
[   25.018576]  ? __schedule+0x10da/0x2b60
[   25.018601]  ? __pfx_read_tsc+0x10/0x10
[   25.018626]  krealloc_large_less_oob+0x1c/0x30
[   25.018648]  kunit_try_run_case+0x1a5/0x480
[   25.018672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.018695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.018719]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.018744]  ? __kthread_parkme+0x82/0x180
[   25.018766]  ? preempt_count_sub+0x50/0x80
[   25.018790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.018816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.018853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.018877]  kthread+0x337/0x6f0
[   25.018897]  ? trace_preempt_on+0x20/0xc0
[   25.018920]  ? __pfx_kthread+0x10/0x10
[   25.018940]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.018963]  ? calculate_sigpending+0x7b/0xa0
[   25.018986]  ? __pfx_kthread+0x10/0x10
[   25.019007]  ret_from_fork+0x116/0x1d0
[   25.019027]  ? __pfx_kthread+0x10/0x10
[   25.019047]  ret_from_fork_asm+0x1a/0x30
[   25.019077]  </TASK>
[   25.019088] 
[   25.027394] The buggy address belongs to the physical page:
[   25.027698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ab8
[   25.028026] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.028401] flags: 0x200000000000040(head|node=0|zone=2)
[   25.028672] page_type: f8(unknown)
[   25.028800] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.029485] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.029791] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.030041] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.030571] head: 0200000000000002 ffffea000412ae01 00000000ffffffff 00000000ffffffff
[   25.030806] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.031156] page dumped because: kasan: bad access detected
[   25.031404] 
[   25.031494] Memory state around the buggy address:
[   25.031687]  ffff888104ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.031915]  ffff888104aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.032511] >ffff888104aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.032874]                                                           ^
[   25.033182]  ffff888104aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.033504]  ffff888104aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.033738] ==================================================================
[   24.999822] ==================================================================
[   25.000683] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   25.001355] Write of size 1 at addr ffff888104aba0ea by task kunit_try_catch/210
[   25.001713] 
[   25.001821] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   25.001880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.001893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.001913] Call Trace:
[   25.001929]  <TASK>
[   25.001944]  dump_stack_lvl+0x73/0xb0
[   25.001974]  print_report+0xd1/0x640
[   25.001997]  ? __virt_addr_valid+0x1db/0x2d0
[   25.002021]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   25.002045]  ? kasan_addr_to_slab+0x11/0xa0
[   25.002066]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   25.002090]  kasan_report+0x141/0x180
[   25.002112]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   25.002139]  __asan_report_store1_noabort+0x1b/0x30
[   25.002164]  krealloc_less_oob_helper+0xe90/0x11d0
[   25.002200]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.002224]  ? finish_task_switch.isra.0+0x153/0x700
[   25.002246]  ? __switch_to+0x47/0xf80
[   25.002271]  ? __schedule+0x10da/0x2b60
[   25.002297]  ? __pfx_read_tsc+0x10/0x10
[   25.002322]  krealloc_large_less_oob+0x1c/0x30
[   25.002345]  kunit_try_run_case+0x1a5/0x480
[   25.002370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.002392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.002416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.002441]  ? __kthread_parkme+0x82/0x180
[   25.002504]  ? preempt_count_sub+0x50/0x80
[   25.002530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.002554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.002578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.002601]  kthread+0x337/0x6f0
[   25.002621]  ? trace_preempt_on+0x20/0xc0
[   25.002644]  ? __pfx_kthread+0x10/0x10
[   25.002664]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.002688]  ? calculate_sigpending+0x7b/0xa0
[   25.002711]  ? __pfx_kthread+0x10/0x10
[   25.002733]  ret_from_fork+0x116/0x1d0
[   25.002753]  ? __pfx_kthread+0x10/0x10
[   25.002773]  ret_from_fork_asm+0x1a/0x30
[   25.002804]  </TASK>
[   25.002814] 
[   25.010600] The buggy address belongs to the physical page:
[   25.011065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ab8
[   25.011357] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.011583] flags: 0x200000000000040(head|node=0|zone=2)
[   25.011756] page_type: f8(unknown)
[   25.012173] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.012527] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.012883] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.013284] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.013692] head: 0200000000000002 ffffea000412ae01 00000000ffffffff 00000000ffffffff
[   25.014004] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.014305] page dumped because: kasan: bad access detected
[   25.014591] 
[   25.014682] Memory state around the buggy address:
[   25.014873]  ffff888104ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.015161]  ffff888104aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.015451] >ffff888104aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.015918]                                                           ^
[   25.016209]  ffff888104aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.016438]  ffff888104aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.016807] ==================================================================
[   24.931784] ==================================================================
[   24.932234] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   24.932719] Write of size 1 at addr ffff888104aba0c9 by task kunit_try_catch/210
[   24.933027] 
[   24.933134] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.933180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.933193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.933213] Call Trace:
[   24.933225]  <TASK>
[   24.933240]  dump_stack_lvl+0x73/0xb0
[   24.933269]  print_report+0xd1/0x640
[   24.933292]  ? __virt_addr_valid+0x1db/0x2d0
[   24.933316]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.933339]  ? kasan_addr_to_slab+0x11/0xa0
[   24.933360]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.933383]  kasan_report+0x141/0x180
[   24.933406]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.933435]  __asan_report_store1_noabort+0x1b/0x30
[   24.933503]  krealloc_less_oob_helper+0xd70/0x11d0
[   24.933533]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.933557]  ? finish_task_switch.isra.0+0x153/0x700
[   24.933579]  ? __switch_to+0x47/0xf80
[   24.933606]  ? __schedule+0x10da/0x2b60
[   24.933632]  ? __pfx_read_tsc+0x10/0x10
[   24.933656]  krealloc_large_less_oob+0x1c/0x30
[   24.933679]  kunit_try_run_case+0x1a5/0x480
[   24.933704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.933727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.933753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.933778]  ? __kthread_parkme+0x82/0x180
[   24.933798]  ? preempt_count_sub+0x50/0x80
[   24.933821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.933858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.933881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.933905]  kthread+0x337/0x6f0
[   24.933925]  ? trace_preempt_on+0x20/0xc0
[   24.933948]  ? __pfx_kthread+0x10/0x10
[   24.933968]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.933992]  ? calculate_sigpending+0x7b/0xa0
[   24.934016]  ? __pfx_kthread+0x10/0x10
[   24.934037]  ret_from_fork+0x116/0x1d0
[   24.934057]  ? __pfx_kthread+0x10/0x10
[   24.934077]  ret_from_fork_asm+0x1a/0x30
[   24.934110]  </TASK>
[   24.934121] 
[   24.942154] The buggy address belongs to the physical page:
[   24.942401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ab8
[   24.942788] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.943105] flags: 0x200000000000040(head|node=0|zone=2)
[   24.943366] page_type: f8(unknown)
[   24.943699] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.944038] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.944275] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.944593] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.945059] head: 0200000000000002 ffffea000412ae01 00000000ffffffff 00000000ffffffff
[   24.945303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.945947] page dumped because: kasan: bad access detected
[   24.946218] 
[   24.946305] Memory state around the buggy address:
[   24.946467]  ffff888104ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.946686]  ffff888104aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.948072] >ffff888104aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.949062]                                               ^
[   24.949790]  ffff888104aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.950627]  ffff888104aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.951315] ==================================================================
[   24.864342] ==================================================================
[   24.864759] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   24.865097] Write of size 1 at addr ffff888104a83ceb by task kunit_try_catch/206
[   24.865521] 
[   24.865626] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.865693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.865706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.865726] Call Trace:
[   24.865739]  <TASK>
[   24.865753]  dump_stack_lvl+0x73/0xb0
[   24.865796]  print_report+0xd1/0x640
[   24.865818]  ? __virt_addr_valid+0x1db/0x2d0
[   24.865851]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.865874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.865900]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.865923]  kasan_report+0x141/0x180
[   24.865946]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.865975]  __asan_report_store1_noabort+0x1b/0x30
[   24.865999]  krealloc_less_oob_helper+0xd47/0x11d0
[   24.866042]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.866065]  ? irqentry_exit+0x2a/0x60
[   24.866086]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.866117]  ? __pfx_krealloc_less_oob+0x10/0x10
[   24.866143]  krealloc_less_oob+0x1c/0x30
[   24.866164]  kunit_try_run_case+0x1a5/0x480
[   24.866207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.866230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.866255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.866280]  ? __kthread_parkme+0x82/0x180
[   24.866300]  ? preempt_count_sub+0x50/0x80
[   24.866341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.866366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.866390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.866413]  kthread+0x337/0x6f0
[   24.866433]  ? trace_preempt_on+0x20/0xc0
[   24.866539]  ? __pfx_kthread+0x10/0x10
[   24.866576]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.866600]  ? calculate_sigpending+0x7b/0xa0
[   24.866636]  ? __pfx_kthread+0x10/0x10
[   24.866657]  ret_from_fork+0x116/0x1d0
[   24.866677]  ? __pfx_kthread+0x10/0x10
[   24.866711]  ret_from_fork_asm+0x1a/0x30
[   24.866755]  </TASK>
[   24.866766] 
[   24.874550] Allocated by task 206:
[   24.874743]  kasan_save_stack+0x45/0x70
[   24.874961]  kasan_save_track+0x18/0x40
[   24.875126]  kasan_save_alloc_info+0x3b/0x50
[   24.875350]  __kasan_krealloc+0x190/0x1f0
[   24.875761]  krealloc_noprof+0xf3/0x340
[   24.876017]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.876275]  krealloc_less_oob+0x1c/0x30
[   24.876557]  kunit_try_run_case+0x1a5/0x480
[   24.876768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.877041]  kthread+0x337/0x6f0
[   24.877234]  ret_from_fork+0x116/0x1d0
[   24.877418]  ret_from_fork_asm+0x1a/0x30
[   24.877671] 
[   24.877759] The buggy address belongs to the object at ffff888104a83c00
[   24.877759]  which belongs to the cache kmalloc-256 of size 256
[   24.878309] The buggy address is located 34 bytes to the right of
[   24.878309]  allocated 201-byte region [ffff888104a83c00, ffff888104a83cc9)
[   24.878914] 
[   24.879010] The buggy address belongs to the physical page:
[   24.879287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a82
[   24.879683] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.880008] ksm flags: 0x200000000000040(head|node=0|zone=2)
[   24.880295] page_type: f5(slab)
[   24.880483] raw: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.880771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.881307] head: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.881759] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.882115] head: 0200000000000001 ffffea000412a081 00000000ffffffff 00000000ffffffff
[   24.882531] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.882874] page dumped because: kasan: bad access detected
[   24.883046] 
[   24.883112] Memory state around the buggy address:
[   24.883353]  ffff888104a83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.883745]  ffff888104a83c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.884076] >ffff888104a83c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.884397]                                                           ^
[   24.884748]  ffff888104a83d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.885540]  ffff888104a83d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.885817] ==================================================================
[   24.974412] ==================================================================
[   24.975405] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   24.975933] Write of size 1 at addr ffff888104aba0da by task kunit_try_catch/210
[   24.976484] 
[   24.976749] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.976809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.976822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.976852] Call Trace:
[   24.976873]  <TASK>
[   24.976887]  dump_stack_lvl+0x73/0xb0
[   24.976917]  print_report+0xd1/0x640
[   24.976939]  ? __virt_addr_valid+0x1db/0x2d0
[   24.976963]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.976987]  ? kasan_addr_to_slab+0x11/0xa0
[   24.977007]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.977031]  kasan_report+0x141/0x180
[   24.977053]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   24.977082]  __asan_report_store1_noabort+0x1b/0x30
[   24.977109]  krealloc_less_oob_helper+0xec6/0x11d0
[   24.977136]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.977283]  ? finish_task_switch.isra.0+0x153/0x700
[   24.977316]  ? __switch_to+0x47/0xf80
[   24.977343]  ? __schedule+0x10da/0x2b60
[   24.977371]  ? __pfx_read_tsc+0x10/0x10
[   24.977398]  krealloc_large_less_oob+0x1c/0x30
[   24.977520]  kunit_try_run_case+0x1a5/0x480
[   24.977553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.977577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.977603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.977629]  ? __kthread_parkme+0x82/0x180
[   24.977648]  ? preempt_count_sub+0x50/0x80
[   24.977671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.977694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.977718]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.977741]  kthread+0x337/0x6f0
[   24.977761]  ? trace_preempt_on+0x20/0xc0
[   24.977783]  ? __pfx_kthread+0x10/0x10
[   24.977804]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.977841]  ? calculate_sigpending+0x7b/0xa0
[   24.977864]  ? __pfx_kthread+0x10/0x10
[   24.977886]  ret_from_fork+0x116/0x1d0
[   24.977905]  ? __pfx_kthread+0x10/0x10
[   24.977925]  ret_from_fork_asm+0x1a/0x30
[   24.977956]  </TASK>
[   24.977967] 
[   24.989926] The buggy address belongs to the physical page:
[   24.990157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ab8
[   24.990856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.991613] flags: 0x200000000000040(head|node=0|zone=2)
[   24.991863] page_type: f8(unknown)
[   24.992029] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.992696] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.993347] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.993878] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.994375] head: 0200000000000002 ffffea000412ae01 00000000ffffffff 00000000ffffffff
[   24.995111] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.995438] page dumped because: kasan: bad access detected
[   24.995877] 
[   24.995969] Memory state around the buggy address:
[   24.996159]  ffff888104ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.996422]  ffff888104aba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.996679] >ffff888104aba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.996967]                                                     ^
[   24.997727]  ffff888104aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.998189]  ffff888104aba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.998767] ==================================================================
[   24.775797] ==================================================================
[   24.776394] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   24.776922] Write of size 1 at addr ffff888104a83cc9 by task kunit_try_catch/206
[   24.777285] 
[   24.777388] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.777437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.777449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.777470] Call Trace:
[   24.777483]  <TASK>
[   24.777497]  dump_stack_lvl+0x73/0xb0
[   24.777526]  print_report+0xd1/0x640
[   24.777549]  ? __virt_addr_valid+0x1db/0x2d0
[   24.777571]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.777594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.777620]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.777644]  kasan_report+0x141/0x180
[   24.777665]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   24.777693]  __asan_report_store1_noabort+0x1b/0x30
[   24.777717]  krealloc_less_oob_helper+0xd70/0x11d0
[   24.777743]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.777766]  ? irqentry_exit+0x2a/0x60
[   24.777786]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.777817]  ? __pfx_krealloc_less_oob+0x10/0x10
[   24.777856]  krealloc_less_oob+0x1c/0x30
[   24.777878]  kunit_try_run_case+0x1a5/0x480
[   24.777917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.777949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.777975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.778000]  ? __kthread_parkme+0x82/0x180
[   24.778020]  ? preempt_count_sub+0x50/0x80
[   24.778043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.778067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.778091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.778114]  kthread+0x337/0x6f0
[   24.778133]  ? trace_preempt_on+0x20/0xc0
[   24.778156]  ? __pfx_kthread+0x10/0x10
[   24.778176]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.778199]  ? calculate_sigpending+0x7b/0xa0
[   24.778222]  ? __pfx_kthread+0x10/0x10
[   24.778243]  ret_from_fork+0x116/0x1d0
[   24.778263]  ? __pfx_kthread+0x10/0x10
[   24.778293]  ret_from_fork_asm+0x1a/0x30
[   24.778324]  </TASK>
[   24.778336] 
[   24.786059] Allocated by task 206:
[   24.786331]  kasan_save_stack+0x45/0x70
[   24.786655]  kasan_save_track+0x18/0x40
[   24.786826]  kasan_save_alloc_info+0x3b/0x50
[   24.787026]  __kasan_krealloc+0x190/0x1f0
[   24.787238]  krealloc_noprof+0xf3/0x340
[   24.787400]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.787661]  krealloc_less_oob+0x1c/0x30
[   24.787805]  kunit_try_run_case+0x1a5/0x480
[   24.787968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.788214]  kthread+0x337/0x6f0
[   24.788426]  ret_from_fork+0x116/0x1d0
[   24.788709]  ret_from_fork_asm+0x1a/0x30
[   24.788915] 
[   24.788982] The buggy address belongs to the object at ffff888104a83c00
[   24.788982]  which belongs to the cache kmalloc-256 of size 256
[   24.789670] The buggy address is located 0 bytes to the right of
[   24.789670]  allocated 201-byte region [ffff888104a83c00, ffff888104a83cc9)
[   24.790223] 
[   24.790318] The buggy address belongs to the physical page:
[   24.790608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a82
[   24.790903] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.791136] ksm flags: 0x200000000000040(head|node=0|zone=2)
[   24.791320] page_type: f5(slab)
[   24.791439] raw: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.791753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.792335] head: 0200000000000040 ffff888100041b40 ffffea000402a880 dead000000000003
[   24.792757] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.793132] head: 0200000000000001 ffffea000412a081 00000000ffffffff 00000000ffffffff
[   24.793493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.793763] page dumped because: kasan: bad access detected
[   24.794023] 
[   24.794139] Memory state around the buggy address:
[   24.794405]  ffff888104a83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.794783]  ffff888104a83c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.795102] >ffff888104a83c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.795408]                                               ^
[   24.795755]  ffff888104a83d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.796082]  ffff888104a83d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.796386] ==================================================================