Hay
Date
July 24, 2025, 4:41 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.376631] ==================================================================
[   32.377078] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.377284] Write of size 1 at addr fff00000c99620d0 by task kunit_try_catch/193
[   32.377345] 
[   32.377381] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.377986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.378074] Hardware name: linux,dummy-virt (DT)
[   32.378115] Call trace:
[   32.378148]  show_stack+0x20/0x38 (C)
[   32.378218]  dump_stack_lvl+0x8c/0xd0
[   32.378552]  print_report+0x118/0x5e8
[   32.378623]  kasan_report+0xdc/0x128
[   32.378667]  __asan_report_store1_noabort+0x20/0x30
[   32.378716]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.378775]  krealloc_large_less_oob+0x20/0x38
[   32.378823]  kunit_try_run_case+0x170/0x3f0
[   32.378869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.379198]  kthread+0x328/0x630
[   32.379856]  ret_from_fork+0x10/0x20
[   32.380001] 
[   32.380125] The buggy address belongs to the physical page:
[   32.380197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.380607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.380664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.380941] page_type: f8(unknown)
[   32.381027] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.381216] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.381495] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.381650] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.381871] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.381923] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.381971] page dumped because: kasan: bad access detected
[   32.382002] 
[   32.382021] Memory state around the buggy address:
[   32.382064]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.382113]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.382154] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.382191]                                                  ^
[   32.382227]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.382270]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.382324] ==================================================================
[   32.316959] ==================================================================
[   32.317191] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.317466] Write of size 1 at addr fff00000c8575ec9 by task kunit_try_catch/189
[   32.317559] 
[   32.317681] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.317778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.317805] Hardware name: linux,dummy-virt (DT)
[   32.317838] Call trace:
[   32.317924]  show_stack+0x20/0x38 (C)
[   32.318001]  dump_stack_lvl+0x8c/0xd0
[   32.318047]  print_report+0x118/0x5e8
[   32.318151]  kasan_report+0xdc/0x128
[   32.318194]  __asan_report_store1_noabort+0x20/0x30
[   32.318262]  krealloc_less_oob_helper+0xa48/0xc50
[   32.318338]  krealloc_less_oob+0x20/0x38
[   32.318595]  kunit_try_run_case+0x170/0x3f0
[   32.318657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.318788]  kthread+0x328/0x630
[   32.318856]  ret_from_fork+0x10/0x20
[   32.318911] 
[   32.318940] Allocated by task 189:
[   32.318968]  kasan_save_stack+0x3c/0x68
[   32.319013]  kasan_save_track+0x20/0x40
[   32.319070]  kasan_save_alloc_info+0x40/0x58
[   32.319156]  __kasan_krealloc+0x118/0x178
[   32.319202]  krealloc_noprof+0x128/0x360
[   32.319259]  krealloc_less_oob_helper+0x168/0xc50
[   32.319349]  krealloc_less_oob+0x20/0x38
[   32.319440]  kunit_try_run_case+0x170/0x3f0
[   32.319476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.319517]  kthread+0x328/0x630
[   32.319548]  ret_from_fork+0x10/0x20
[   32.319582] 
[   32.319601] The buggy address belongs to the object at fff00000c8575e00
[   32.319601]  which belongs to the cache kmalloc-256 of size 256
[   32.319657] The buggy address is located 0 bytes to the right of
[   32.319657]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.319975] 
[   32.320146] The buggy address belongs to the physical page:
[   32.320239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.320380] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.320455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.320530] page_type: f5(slab)
[   32.320657] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.320786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.320918] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.320965] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.321338] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.321440] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.321573] page dumped because: kasan: bad access detected
[   32.321640] 
[   32.321667] Memory state around the buggy address:
[   32.321776]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.321853]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.321946] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.322083]                                               ^
[   32.322142]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.322190]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.322398] ==================================================================
[   32.396741] ==================================================================
[   32.396971] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.397041] Write of size 1 at addr fff00000c99620eb by task kunit_try_catch/193
[   32.397142] 
[   32.397178] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.397281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.397315] Hardware name: linux,dummy-virt (DT)
[   32.397499] Call trace:
[   32.397533]  show_stack+0x20/0x38 (C)
[   32.397760]  dump_stack_lvl+0x8c/0xd0
[   32.397823]  print_report+0x118/0x5e8
[   32.398075]  kasan_report+0xdc/0x128
[   32.398280]  __asan_report_store1_noabort+0x20/0x30
[   32.398343]  krealloc_less_oob_helper+0xa58/0xc50
[   32.398510]  krealloc_large_less_oob+0x20/0x38
[   32.398607]  kunit_try_run_case+0x170/0x3f0
[   32.398663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.398714]  kthread+0x328/0x630
[   32.399041]  ret_from_fork+0x10/0x20
[   32.399236] 
[   32.399332] The buggy address belongs to the physical page:
[   32.399412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.399523] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.399706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.399991] page_type: f8(unknown)
[   32.400059] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.400203] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.400309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.400445] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.400559] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.400608] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.400819] page dumped because: kasan: bad access detected
[   32.401060] 
[   32.401103] Memory state around the buggy address:
[   32.401149]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.401986]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.402058] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.402149]                                                           ^
[   32.402211]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.402278]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.402453] ==================================================================
[   32.368095] ==================================================================
[   32.368474] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   32.368537] Write of size 1 at addr fff00000c99620c9 by task kunit_try_catch/193
[   32.368690] 
[   32.368776] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.369210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.369290] Hardware name: linux,dummy-virt (DT)
[   32.369325] Call trace:
[   32.369393]  show_stack+0x20/0x38 (C)
[   32.369446]  dump_stack_lvl+0x8c/0xd0
[   32.369503]  print_report+0x118/0x5e8
[   32.369736]  kasan_report+0xdc/0x128
[   32.369818]  __asan_report_store1_noabort+0x20/0x30
[   32.369868]  krealloc_less_oob_helper+0xa48/0xc50
[   32.369917]  krealloc_large_less_oob+0x20/0x38
[   32.370302]  kunit_try_run_case+0x170/0x3f0
[   32.370697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.370786]  kthread+0x328/0x630
[   32.370830]  ret_from_fork+0x10/0x20
[   32.371019] 
[   32.371070] The buggy address belongs to the physical page:
[   32.371379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.371699] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.372242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.372364] page_type: f8(unknown)
[   32.372440] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.372762] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.373003] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.373260] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.373356] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.373598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.373675] page dumped because: kasan: bad access detected
[   32.374044] 
[   32.374169] Memory state around the buggy address:
[   32.374226]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.374375]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.374421] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.374507]                                               ^
[   32.374723]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.374852]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.375048] ==================================================================
[   32.328497] ==================================================================
[   32.328700] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.328782] Write of size 1 at addr fff00000c8575eda by task kunit_try_catch/189
[   32.328832] 
[   32.328971] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.329056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.329083] Hardware name: linux,dummy-virt (DT)
[   32.329114] Call trace:
[   32.329137]  show_stack+0x20/0x38 (C)
[   32.329333]  dump_stack_lvl+0x8c/0xd0
[   32.329398]  print_report+0x118/0x5e8
[   32.329442]  kasan_report+0xdc/0x128
[   32.329502]  __asan_report_store1_noabort+0x20/0x30
[   32.329557]  krealloc_less_oob_helper+0xa80/0xc50
[   32.329622]  krealloc_less_oob+0x20/0x38
[   32.329679]  kunit_try_run_case+0x170/0x3f0
[   32.329733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.329824]  kthread+0x328/0x630
[   32.329882]  ret_from_fork+0x10/0x20
[   32.329949] 
[   32.329988] Allocated by task 189:
[   32.330035]  kasan_save_stack+0x3c/0x68
[   32.330137]  kasan_save_track+0x20/0x40
[   32.330174]  kasan_save_alloc_info+0x40/0x58
[   32.330241]  __kasan_krealloc+0x118/0x178
[   32.330293]  krealloc_noprof+0x128/0x360
[   32.330327]  krealloc_less_oob_helper+0x168/0xc50
[   32.330366]  krealloc_less_oob+0x20/0x38
[   32.330402]  kunit_try_run_case+0x170/0x3f0
[   32.330546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.330685]  kthread+0x328/0x630
[   32.330730]  ret_from_fork+0x10/0x20
[   32.330776] 
[   32.330795] The buggy address belongs to the object at fff00000c8575e00
[   32.330795]  which belongs to the cache kmalloc-256 of size 256
[   32.330937] The buggy address is located 17 bytes to the right of
[   32.330937]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.331131] 
[   32.331152] The buggy address belongs to the physical page:
[   32.331186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.331252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.331307] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.331357] page_type: f5(slab)
[   32.331579] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.331665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.331784] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.331903] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.332001] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.332106] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.332158] page dumped because: kasan: bad access detected
[   32.332226] 
[   32.332244] Memory state around the buggy address:
[   32.332274]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.332369]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.332414] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.332572]                                                     ^
[   32.332610]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.332651]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.332688] ==================================================================
[   32.389870] ==================================================================
[   32.390119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.390361] Write of size 1 at addr fff00000c99620ea by task kunit_try_catch/193
[   32.390423] 
[   32.390459] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.390543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.390570] Hardware name: linux,dummy-virt (DT)
[   32.390691] Call trace:
[   32.390718]  show_stack+0x20/0x38 (C)
[   32.390900]  dump_stack_lvl+0x8c/0xd0
[   32.391024]  print_report+0x118/0x5e8
[   32.391306]  kasan_report+0xdc/0x128
[   32.391577]  __asan_report_store1_noabort+0x20/0x30
[   32.391685]  krealloc_less_oob_helper+0xae4/0xc50
[   32.391832]  krealloc_large_less_oob+0x20/0x38
[   32.391895]  kunit_try_run_case+0x170/0x3f0
[   32.391941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.392442]  kthread+0x328/0x630
[   32.392520]  ret_from_fork+0x10/0x20
[   32.392718] 
[   32.392815] The buggy address belongs to the physical page:
[   32.392873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.393006] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.393237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.393407] page_type: f8(unknown)
[   32.393468] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.393533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.393592] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.393648] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.393705] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.393781] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.393827] page dumped because: kasan: bad access detected
[   32.393862] 
[   32.393880] Memory state around the buggy address:
[   32.393925]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.393968]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.394022] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.394061]                                                           ^
[   32.394098]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.394146]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.394183] ==================================================================
[   32.339155] ==================================================================
[   32.339203] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   32.339249] Write of size 1 at addr fff00000c8575eeb by task kunit_try_catch/189
[   32.339324] 
[   32.339352] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.339434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.339459] Hardware name: linux,dummy-virt (DT)
[   32.339625] Call trace:
[   32.339658]  show_stack+0x20/0x38 (C)
[   32.339706]  dump_stack_lvl+0x8c/0xd0
[   32.339762]  print_report+0x118/0x5e8
[   32.340036]  kasan_report+0xdc/0x128
[   32.340093]  __asan_report_store1_noabort+0x20/0x30
[   32.340141]  krealloc_less_oob_helper+0xa58/0xc50
[   32.340208]  krealloc_less_oob+0x20/0x38
[   32.340271]  kunit_try_run_case+0x170/0x3f0
[   32.340351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.340403]  kthread+0x328/0x630
[   32.340647]  ret_from_fork+0x10/0x20
[   32.340777] 
[   32.340816] Allocated by task 189:
[   32.340863]  kasan_save_stack+0x3c/0x68
[   32.340902]  kasan_save_track+0x20/0x40
[   32.340937]  kasan_save_alloc_info+0x40/0x58
[   32.340973]  __kasan_krealloc+0x118/0x178
[   32.341032]  krealloc_noprof+0x128/0x360
[   32.341067]  krealloc_less_oob_helper+0x168/0xc50
[   32.341107]  krealloc_less_oob+0x20/0x38
[   32.341143]  kunit_try_run_case+0x170/0x3f0
[   32.341178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.341385]  kthread+0x328/0x630
[   32.341439]  ret_from_fork+0x10/0x20
[   32.341474] 
[   32.341520] The buggy address belongs to the object at fff00000c8575e00
[   32.341520]  which belongs to the cache kmalloc-256 of size 256
[   32.341590] The buggy address is located 34 bytes to the right of
[   32.341590]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.341654] 
[   32.341692] The buggy address belongs to the physical page:
[   32.341726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.341904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.342043] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.342103] page_type: f5(slab)
[   32.342150] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.342198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.342247] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.342296] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.342344] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.342391] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.342430] page dumped because: kasan: bad access detected
[   32.342460] 
[   32.342478] Memory state around the buggy address:
[   32.342507]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342549]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.342659] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.342705]                                                           ^
[   32.342883]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342924]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342967] ==================================================================
[   32.333682] ==================================================================
[   32.333767] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   32.333831] Write of size 1 at addr fff00000c8575eea by task kunit_try_catch/189
[   32.333880] 
[   32.333915] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.334148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.334186] Hardware name: linux,dummy-virt (DT)
[   32.334229] Call trace:
[   32.334251]  show_stack+0x20/0x38 (C)
[   32.334299]  dump_stack_lvl+0x8c/0xd0
[   32.334343]  print_report+0x118/0x5e8
[   32.334386]  kasan_report+0xdc/0x128
[   32.334428]  __asan_report_store1_noabort+0x20/0x30
[   32.334475]  krealloc_less_oob_helper+0xae4/0xc50
[   32.334524]  krealloc_less_oob+0x20/0x38
[   32.334569]  kunit_try_run_case+0x170/0x3f0
[   32.334620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.334671]  kthread+0x328/0x630
[   32.334711]  ret_from_fork+0x10/0x20
[   32.334767] 
[   32.334785] Allocated by task 189:
[   32.334813]  kasan_save_stack+0x3c/0x68
[   32.334850]  kasan_save_track+0x20/0x40
[   32.335061]  kasan_save_alloc_info+0x40/0x58
[   32.335113]  __kasan_krealloc+0x118/0x178
[   32.335273]  krealloc_noprof+0x128/0x360
[   32.335429]  krealloc_less_oob_helper+0x168/0xc50
[   32.335500]  krealloc_less_oob+0x20/0x38
[   32.335596]  kunit_try_run_case+0x170/0x3f0
[   32.335682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.335735]  kthread+0x328/0x630
[   32.335806]  ret_from_fork+0x10/0x20
[   32.335884] 
[   32.335981] The buggy address belongs to the object at fff00000c8575e00
[   32.335981]  which belongs to the cache kmalloc-256 of size 256
[   32.336112] The buggy address is located 33 bytes to the right of
[   32.336112]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.336177] 
[   32.336233] The buggy address belongs to the physical page:
[   32.336269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.336319] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.336588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.336729] page_type: f5(slab)
[   32.336806] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.336873] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.336921] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.337002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.337242] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.337351] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.337459] page dumped because: kasan: bad access detected
[   32.337537] 
[   32.337588] Memory state around the buggy address:
[   32.337691]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.337786]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.337828] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.338138]                                                           ^
[   32.338285]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.338359]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.338408] ==================================================================
[   32.382458] ==================================================================
[   32.382508] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   32.382564] Write of size 1 at addr fff00000c99620da by task kunit_try_catch/193
[   32.382612] 
[   32.382653] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.382735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.383219] Hardware name: linux,dummy-virt (DT)
[   32.383270] Call trace:
[   32.383315]  show_stack+0x20/0x38 (C)
[   32.383571]  dump_stack_lvl+0x8c/0xd0
[   32.383624]  print_report+0x118/0x5e8
[   32.383856]  kasan_report+0xdc/0x128
[   32.383916]  __asan_report_store1_noabort+0x20/0x30
[   32.384285]  krealloc_less_oob_helper+0xa80/0xc50
[   32.384501]  krealloc_large_less_oob+0x20/0x38
[   32.384741]  kunit_try_run_case+0x170/0x3f0
[   32.384950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.385146]  kthread+0x328/0x630
[   32.385277]  ret_from_fork+0x10/0x20
[   32.385495] 
[   32.385564] The buggy address belongs to the physical page:
[   32.385616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960
[   32.385987] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.386242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.386413] page_type: f8(unknown)
[   32.386488] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.386575] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.386775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.386875] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.387155] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff
[   32.387240] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.387405] page dumped because: kasan: bad access detected
[   32.387457] 
[   32.387475] Memory state around the buggy address:
[   32.387512]  fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.387555]  fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.388017] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   32.388206]                                                     ^
[   32.388536]  fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.388611]  fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.388739] ==================================================================
[   32.323622] ==================================================================
[   32.323681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   32.323733] Write of size 1 at addr fff00000c8575ed0 by task kunit_try_catch/189
[   32.323799] 
[   32.323832] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.323923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.323950] Hardware name: linux,dummy-virt (DT)
[   32.323981] Call trace:
[   32.324012]  show_stack+0x20/0x38 (C)
[   32.324060]  dump_stack_lvl+0x8c/0xd0
[   32.324111]  print_report+0x118/0x5e8
[   32.324155]  kasan_report+0xdc/0x128
[   32.324206]  __asan_report_store1_noabort+0x20/0x30
[   32.324255]  krealloc_less_oob_helper+0xb9c/0xc50
[   32.324303]  krealloc_less_oob+0x20/0x38
[   32.324349]  kunit_try_run_case+0x170/0x3f0
[   32.324394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.324444]  kthread+0x328/0x630
[   32.324485]  ret_from_fork+0x10/0x20
[   32.324532] 
[   32.324550] Allocated by task 189:
[   32.324583]  kasan_save_stack+0x3c/0x68
[   32.324620]  kasan_save_track+0x20/0x40
[   32.324659]  kasan_save_alloc_info+0x40/0x58
[   32.324695]  __kasan_krealloc+0x118/0x178
[   32.324731]  krealloc_noprof+0x128/0x360
[   32.324775]  krealloc_less_oob_helper+0x168/0xc50
[   32.324815]  krealloc_less_oob+0x20/0x38
[   32.324851]  kunit_try_run_case+0x170/0x3f0
[   32.324886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.324993]  kthread+0x328/0x630
[   32.325034]  ret_from_fork+0x10/0x20
[   32.325566] 
[   32.325600] The buggy address belongs to the object at fff00000c8575e00
[   32.325600]  which belongs to the cache kmalloc-256 of size 256
[   32.325659] The buggy address is located 7 bytes to the right of
[   32.325659]  allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9)
[   32.325928] 
[   32.325976] The buggy address belongs to the physical page:
[   32.326042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574
[   32.326096] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.326165] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.326218] page_type: f5(slab)
[   32.326275] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.326482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.326662] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.326737] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.326841] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff
[   32.326908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.326948] page dumped because: kasan: bad access detected
[   32.326978] 
[   32.327041] Memory state around the buggy address:
[   32.327072]  fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.327114]  fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.327155] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   32.327193]                                                  ^
[   32.327227]  fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.327308]  fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.327472] ==================================================================

[   26.678806] ==================================================================
[   26.679272] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   26.679829] Write of size 1 at addr ffff88810616e0c9 by task kunit_try_catch/210
[   26.680262] 
[   26.680354] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.680403] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.680416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.680438] Call Trace:
[   26.680450]  <TASK>
[   26.680466]  dump_stack_lvl+0x73/0xb0
[   26.680495]  print_report+0xd1/0x640
[   26.680517]  ? __virt_addr_valid+0x1db/0x2d0
[   26.680541]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   26.680563]  ? kasan_addr_to_slab+0x11/0xa0
[   26.680596]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   26.680619]  kasan_report+0x141/0x180
[   26.680641]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   26.680668]  __asan_report_store1_noabort+0x1b/0x30
[   26.680692]  krealloc_less_oob_helper+0xd70/0x11d0
[   26.680716]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.680739]  ? finish_task_switch.isra.0+0x153/0x700
[   26.680760]  ? __switch_to+0x47/0xf80
[   26.681176]  ? __schedule+0x10da/0x2b60
[   26.681216]  ? __pfx_read_tsc+0x10/0x10
[   26.681243]  krealloc_large_less_oob+0x1c/0x30
[   26.681266]  kunit_try_run_case+0x1a5/0x480
[   26.681292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.681314]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.681338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.681362]  ? __kthread_parkme+0x82/0x180
[   26.681381]  ? preempt_count_sub+0x50/0x80
[   26.681403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.681425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.681447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.681470]  kthread+0x337/0x6f0
[   26.681489]  ? trace_preempt_on+0x20/0xc0
[   26.681513]  ? __pfx_kthread+0x10/0x10
[   26.681532]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.681554]  ? calculate_sigpending+0x7b/0xa0
[   26.681591]  ? __pfx_kthread+0x10/0x10
[   26.681612]  ret_from_fork+0x116/0x1d0
[   26.681631]  ? __pfx_kthread+0x10/0x10
[   26.681651]  ret_from_fork_asm+0x1a/0x30
[   26.681681]  </TASK>
[   26.681691] 
[   26.692357] The buggy address belongs to the physical page:
[   26.692636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   26.693353] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.693668] flags: 0x200000000000040(head|node=0|zone=2)
[   26.694132] page_type: f8(unknown)
[   26.694334] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.694667] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.695198] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.695607] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.695964] head: 0200000000000002 ffffea0004185b01 00000000ffffffff 00000000ffffffff
[   26.696390] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.696715] page dumped because: kasan: bad access detected
[   26.697210] 
[   26.697290] Memory state around the buggy address:
[   26.697494]  ffff88810616df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.697775]  ffff88810616e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.698356] >ffff88810616e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.698658]                                               ^
[   26.698893]  ffff88810616e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.699424]  ffff88810616e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.699878] ==================================================================
[   26.554656] ==================================================================
[   26.555303] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   26.555627] Write of size 1 at addr ffff888104a4cada by task kunit_try_catch/206
[   26.556035] 
[   26.556214] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.556543] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.556557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.556590] Call Trace:
[   26.556607]  <TASK>
[   26.556624]  dump_stack_lvl+0x73/0xb0
[   26.556651]  print_report+0xd1/0x640
[   26.556672]  ? __virt_addr_valid+0x1db/0x2d0
[   26.556695]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.556717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.556742]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.556765]  kasan_report+0x141/0x180
[   26.556845]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.556874]  __asan_report_store1_noabort+0x1b/0x30
[   26.556897]  krealloc_less_oob_helper+0xec6/0x11d0
[   26.556922]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.556945]  ? finish_task_switch.isra.0+0x153/0x700
[   26.556965]  ? __switch_to+0x47/0xf80
[   26.556990]  ? __schedule+0x10da/0x2b60
[   26.557015]  ? __pfx_read_tsc+0x10/0x10
[   26.557038]  krealloc_less_oob+0x1c/0x30
[   26.557058]  kunit_try_run_case+0x1a5/0x480
[   26.557082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.557103]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.557126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.557151]  ? __kthread_parkme+0x82/0x180
[   26.557170]  ? preempt_count_sub+0x50/0x80
[   26.557191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.557214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.557236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.557258]  kthread+0x337/0x6f0
[   26.557278]  ? trace_preempt_on+0x20/0xc0
[   26.557302]  ? __pfx_kthread+0x10/0x10
[   26.557322]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.557344]  ? calculate_sigpending+0x7b/0xa0
[   26.557367]  ? __pfx_kthread+0x10/0x10
[   26.557387]  ret_from_fork+0x116/0x1d0
[   26.557406]  ? __pfx_kthread+0x10/0x10
[   26.557425]  ret_from_fork_asm+0x1a/0x30
[   26.557456]  </TASK>
[   26.557466] 
[   26.568759] Allocated by task 206:
[   26.569118]  kasan_save_stack+0x45/0x70
[   26.569383]  kasan_save_track+0x18/0x40
[   26.569637]  kasan_save_alloc_info+0x3b/0x50
[   26.570141]  __kasan_krealloc+0x190/0x1f0
[   26.570341]  krealloc_noprof+0xf3/0x340
[   26.570488]  krealloc_less_oob_helper+0x1aa/0x11d0
[   26.570730]  krealloc_less_oob+0x1c/0x30
[   26.570920]  kunit_try_run_case+0x1a5/0x480
[   26.571376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.571619]  kthread+0x337/0x6f0
[   26.571949]  ret_from_fork+0x116/0x1d0
[   26.572149]  ret_from_fork_asm+0x1a/0x30
[   26.572319] 
[   26.572409] The buggy address belongs to the object at ffff888104a4ca00
[   26.572409]  which belongs to the cache kmalloc-256 of size 256
[   26.573239] The buggy address is located 17 bytes to the right of
[   26.573239]  allocated 201-byte region [ffff888104a4ca00, ffff888104a4cac9)
[   26.573738] 
[   26.574046] The buggy address belongs to the physical page:
[   26.574353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4c
[   26.574683] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.575050] flags: 0x200000000000040(head|node=0|zone=2)
[   26.575473] page_type: f5(slab)
[   26.575662] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.576050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.576407] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.576688] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.577030] head: 0200000000000001 ffffea0004129301 00000000ffffffff 00000000ffffffff
[   26.577353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.577671] page dumped because: kasan: bad access detected
[   26.577959] 
[   26.578029] Memory state around the buggy address:
[   26.578177]  ffff888104a4c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.578491]  ffff888104a4ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.578723] >ffff888104a4ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.579154]                                                     ^
[   26.579423]  ffff888104a4cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.579711]  ffff888104a4cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.579963] ==================================================================
[   26.600905] ==================================================================
[   26.601228] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   26.601502] Write of size 1 at addr ffff888104a4caeb by task kunit_try_catch/206
[   26.601731] 
[   26.601897] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.601945] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.601958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.601977] Call Trace:
[   26.601992]  <TASK>
[   26.602007]  dump_stack_lvl+0x73/0xb0
[   26.602033]  print_report+0xd1/0x640
[   26.602055]  ? __virt_addr_valid+0x1db/0x2d0
[   26.602078]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.602101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.602126]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.602148]  kasan_report+0x141/0x180
[   26.602169]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.602197]  __asan_report_store1_noabort+0x1b/0x30
[   26.602220]  krealloc_less_oob_helper+0xd47/0x11d0
[   26.602245]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.602268]  ? finish_task_switch.isra.0+0x153/0x700
[   26.602288]  ? __switch_to+0x47/0xf80
[   26.602313]  ? __schedule+0x10da/0x2b60
[   26.602337]  ? __pfx_read_tsc+0x10/0x10
[   26.602361]  krealloc_less_oob+0x1c/0x30
[   26.602381]  kunit_try_run_case+0x1a5/0x480
[   26.602405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.602427]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.602450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.602474]  ? __kthread_parkme+0x82/0x180
[   26.602493]  ? preempt_count_sub+0x50/0x80
[   26.602514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.602537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.602559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.602593]  kthread+0x337/0x6f0
[   26.602612]  ? trace_preempt_on+0x20/0xc0
[   26.602635]  ? __pfx_kthread+0x10/0x10
[   26.602655]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.602677]  ? calculate_sigpending+0x7b/0xa0
[   26.602699]  ? __pfx_kthread+0x10/0x10
[   26.602720]  ret_from_fork+0x116/0x1d0
[   26.602738]  ? __pfx_kthread+0x10/0x10
[   26.602758]  ret_from_fork_asm+0x1a/0x30
[   26.602822]  </TASK>
[   26.602836] 
[   26.614400] Allocated by task 206:
[   26.614557]  kasan_save_stack+0x45/0x70
[   26.614766]  kasan_save_track+0x18/0x40
[   26.614937]  kasan_save_alloc_info+0x3b/0x50
[   26.615570]  __kasan_krealloc+0x190/0x1f0
[   26.615740]  krealloc_noprof+0xf3/0x340
[   26.616005]  krealloc_less_oob_helper+0x1aa/0x11d0
[   26.616264]  krealloc_less_oob+0x1c/0x30
[   26.616443]  kunit_try_run_case+0x1a5/0x480
[   26.616661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.616850]  kthread+0x337/0x6f0
[   26.617553]  ret_from_fork+0x116/0x1d0
[   26.617706]  ret_from_fork_asm+0x1a/0x30
[   26.617937] 
[   26.618262] The buggy address belongs to the object at ffff888104a4ca00
[   26.618262]  which belongs to the cache kmalloc-256 of size 256
[   26.618822] The buggy address is located 34 bytes to the right of
[   26.618822]  allocated 201-byte region [ffff888104a4ca00, ffff888104a4cac9)
[   26.619564] 
[   26.619682] The buggy address belongs to the physical page:
[   26.619958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4c
[   26.620550] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.621090] flags: 0x200000000000040(head|node=0|zone=2)
[   26.621403] page_type: f5(slab)
[   26.621530] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.622137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.622460] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.622788] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.623349] head: 0200000000000001 ffffea0004129301 00000000ffffffff 00000000ffffffff
[   26.623731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.624204] page dumped because: kasan: bad access detected
[   26.624430] 
[   26.624526] Memory state around the buggy address:
[   26.624745]  ffff888104a4c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.625290]  ffff888104a4ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.625704] >ffff888104a4ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.626138]                                                           ^
[   26.626361]  ffff888104a4cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.626702]  ffff888104a4cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.627348] ==================================================================
[   26.724705] ==================================================================
[   26.725085] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   26.725550] Write of size 1 at addr ffff88810616e0da by task kunit_try_catch/210
[   26.726027] 
[   26.726156] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.726208] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.726221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.726242] Call Trace:
[   26.726255]  <TASK>
[   26.726273]  dump_stack_lvl+0x73/0xb0
[   26.726301]  print_report+0xd1/0x640
[   26.726342]  ? __virt_addr_valid+0x1db/0x2d0
[   26.726367]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.726404]  ? kasan_addr_to_slab+0x11/0xa0
[   26.726437]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.726460]  kasan_report+0x141/0x180
[   26.726481]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.726508]  __asan_report_store1_noabort+0x1b/0x30
[   26.726533]  krealloc_less_oob_helper+0xec6/0x11d0
[   26.726558]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.726593]  ? finish_task_switch.isra.0+0x153/0x700
[   26.726614]  ? __switch_to+0x47/0xf80
[   26.726640]  ? __schedule+0x10da/0x2b60
[   26.726664]  ? __pfx_read_tsc+0x10/0x10
[   26.726688]  krealloc_large_less_oob+0x1c/0x30
[   26.726710]  kunit_try_run_case+0x1a5/0x480
[   26.726735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.726756]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.726779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.726866]  ? __kthread_parkme+0x82/0x180
[   26.726886]  ? preempt_count_sub+0x50/0x80
[   26.726908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.726938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.726960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.726983]  kthread+0x337/0x6f0
[   26.727003]  ? trace_preempt_on+0x20/0xc0
[   26.727027]  ? __pfx_kthread+0x10/0x10
[   26.727046]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.727069]  ? calculate_sigpending+0x7b/0xa0
[   26.727092]  ? __pfx_kthread+0x10/0x10
[   26.727112]  ret_from_fork+0x116/0x1d0
[   26.727131]  ? __pfx_kthread+0x10/0x10
[   26.727151]  ret_from_fork_asm+0x1a/0x30
[   26.727182]  </TASK>
[   26.727192] 
[   26.735958] The buggy address belongs to the physical page:
[   26.736527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   26.736924] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.737319] flags: 0x200000000000040(head|node=0|zone=2)
[   26.737547] page_type: f8(unknown)
[   26.737683] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.738194] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.738536] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.738899] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.739351] head: 0200000000000002 ffffea0004185b01 00000000ffffffff 00000000ffffffff
[   26.739588] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.739985] page dumped because: kasan: bad access detected
[   26.740371] 
[   26.740516] Memory state around the buggy address:
[   26.740757]  ffff88810616df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.741133]  ffff88810616e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.741454] >ffff88810616e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.741677]                                                     ^
[   26.741853]  ffff88810616e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.742435]  ffff88810616e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.742767] ==================================================================
[   26.581030] ==================================================================
[   26.581352] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   26.581676] Write of size 1 at addr ffff888104a4caea by task kunit_try_catch/206
[   26.582075] 
[   26.582185] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.582232] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.582244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.582264] Call Trace:
[   26.582282]  <TASK>
[   26.582298]  dump_stack_lvl+0x73/0xb0
[   26.582324]  print_report+0xd1/0x640
[   26.582344]  ? __virt_addr_valid+0x1db/0x2d0
[   26.582367]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.582389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.582414]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.582436]  kasan_report+0x141/0x180
[   26.582458]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.582486]  __asan_report_store1_noabort+0x1b/0x30
[   26.582510]  krealloc_less_oob_helper+0xe90/0x11d0
[   26.582534]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.582557]  ? finish_task_switch.isra.0+0x153/0x700
[   26.582591]  ? __switch_to+0x47/0xf80
[   26.582617]  ? __schedule+0x10da/0x2b60
[   26.582641]  ? __pfx_read_tsc+0x10/0x10
[   26.582664]  krealloc_less_oob+0x1c/0x30
[   26.582686]  kunit_try_run_case+0x1a5/0x480
[   26.582709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.582730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.582754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.582777]  ? __kthread_parkme+0x82/0x180
[   26.582796]  ? preempt_count_sub+0x50/0x80
[   26.582872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.582895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.582925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.582947]  kthread+0x337/0x6f0
[   26.582967]  ? trace_preempt_on+0x20/0xc0
[   26.582990]  ? __pfx_kthread+0x10/0x10
[   26.583010]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.583032]  ? calculate_sigpending+0x7b/0xa0
[   26.583055]  ? __pfx_kthread+0x10/0x10
[   26.583076]  ret_from_fork+0x116/0x1d0
[   26.583094]  ? __pfx_kthread+0x10/0x10
[   26.583113]  ret_from_fork_asm+0x1a/0x30
[   26.583144]  </TASK>
[   26.583154] 
[   26.590091] Allocated by task 206:
[   26.590257]  kasan_save_stack+0x45/0x70
[   26.590425]  kasan_save_track+0x18/0x40
[   26.590618]  kasan_save_alloc_info+0x3b/0x50
[   26.591034]  __kasan_krealloc+0x190/0x1f0
[   26.591228]  krealloc_noprof+0xf3/0x340
[   26.591402]  krealloc_less_oob_helper+0x1aa/0x11d0
[   26.591617]  krealloc_less_oob+0x1c/0x30
[   26.591876]  kunit_try_run_case+0x1a5/0x480
[   26.592072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.592302]  kthread+0x337/0x6f0
[   26.592440]  ret_from_fork+0x116/0x1d0
[   26.592635]  ret_from_fork_asm+0x1a/0x30
[   26.592770] 
[   26.592907] The buggy address belongs to the object at ffff888104a4ca00
[   26.592907]  which belongs to the cache kmalloc-256 of size 256
[   26.593393] The buggy address is located 33 bytes to the right of
[   26.593393]  allocated 201-byte region [ffff888104a4ca00, ffff888104a4cac9)
[   26.593796] 
[   26.593862] The buggy address belongs to the physical page:
[   26.594114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4c
[   26.594555] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.595001] flags: 0x200000000000040(head|node=0|zone=2)
[   26.595232] page_type: f5(slab)
[   26.595403] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.595707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.595935] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.596160] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.596386] head: 0200000000000001 ffffea0004129301 00000000ffffffff 00000000ffffffff
[   26.596621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.596872] page dumped because: kasan: bad access detected
[   26.597118] 
[   26.597204] Memory state around the buggy address:
[   26.597419]  ffff888104a4c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.598309]  ffff888104a4ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.598709] >ffff888104a4ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.599273]                                                           ^
[   26.599474]  ffff888104a4cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.599696]  ffff888104a4cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.600416] ==================================================================
[   26.701006] ==================================================================
[   26.701308] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   26.701635] Write of size 1 at addr ffff88810616e0d0 by task kunit_try_catch/210
[   26.702474] 
[   26.702615] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.702666] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.702679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.702700] Call Trace:
[   26.702719]  <TASK>
[   26.702738]  dump_stack_lvl+0x73/0xb0
[   26.702981]  print_report+0xd1/0x640
[   26.703008]  ? __virt_addr_valid+0x1db/0x2d0
[   26.703032]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   26.703056]  ? kasan_addr_to_slab+0x11/0xa0
[   26.703076]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   26.703098]  kasan_report+0x141/0x180
[   26.703119]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   26.703147]  __asan_report_store1_noabort+0x1b/0x30
[   26.703170]  krealloc_less_oob_helper+0xe23/0x11d0
[   26.703195]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.703218]  ? finish_task_switch.isra.0+0x153/0x700
[   26.703240]  ? __switch_to+0x47/0xf80
[   26.703273]  ? __schedule+0x10da/0x2b60
[   26.703297]  ? __pfx_read_tsc+0x10/0x10
[   26.703322]  krealloc_large_less_oob+0x1c/0x30
[   26.703343]  kunit_try_run_case+0x1a5/0x480
[   26.703368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.703390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.703413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.703438]  ? __kthread_parkme+0x82/0x180
[   26.703457]  ? preempt_count_sub+0x50/0x80
[   26.703478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.703501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.703524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.703546]  kthread+0x337/0x6f0
[   26.703565]  ? trace_preempt_on+0x20/0xc0
[   26.703601]  ? __pfx_kthread+0x10/0x10
[   26.703620]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.703643]  ? calculate_sigpending+0x7b/0xa0
[   26.703665]  ? __pfx_kthread+0x10/0x10
[   26.703686]  ret_from_fork+0x116/0x1d0
[   26.703705]  ? __pfx_kthread+0x10/0x10
[   26.703725]  ret_from_fork_asm+0x1a/0x30
[   26.703756]  </TASK>
[   26.703766] 
[   26.714649] The buggy address belongs to the physical page:
[   26.714945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   26.715264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.716199] flags: 0x200000000000040(head|node=0|zone=2)
[   26.716563] page_type: f8(unknown)
[   26.716990] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.717426] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.717923] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.718310] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.718739] head: 0200000000000002 ffffea0004185b01 00000000ffffffff 00000000ffffffff
[   26.719292] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.719712] page dumped because: kasan: bad access detected
[   26.720247] 
[   26.720325] Memory state around the buggy address:
[   26.720762]  ffff88810616df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.721292]  ffff88810616e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.721633] >ffff88810616e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.722244]                                                  ^
[   26.722465]  ffff88810616e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.722924]  ffff88810616e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.723474] ==================================================================
[   26.492008] ==================================================================
[   26.493295] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   26.494429] Write of size 1 at addr ffff888104a4cac9 by task kunit_try_catch/206
[   26.495341] 
[   26.495446] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.495497] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.495511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.495532] Call Trace:
[   26.495545]  <TASK>
[   26.495564]  dump_stack_lvl+0x73/0xb0
[   26.495605]  print_report+0xd1/0x640
[   26.495626]  ? __virt_addr_valid+0x1db/0x2d0
[   26.495650]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   26.495672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.495696]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   26.495719]  kasan_report+0x141/0x180
[   26.495740]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   26.495774]  __asan_report_store1_noabort+0x1b/0x30
[   26.495797]  krealloc_less_oob_helper+0xd70/0x11d0
[   26.495822]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.495845]  ? finish_task_switch.isra.0+0x153/0x700
[   26.495866]  ? __switch_to+0x47/0xf80
[   26.495893]  ? __schedule+0x10da/0x2b60
[   26.495917]  ? __pfx_read_tsc+0x10/0x10
[   26.495941]  krealloc_less_oob+0x1c/0x30
[   26.495961]  kunit_try_run_case+0x1a5/0x480
[   26.495985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.496006]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.496031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.496055]  ? __kthread_parkme+0x82/0x180
[   26.496074]  ? preempt_count_sub+0x50/0x80
[   26.496096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.496119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.496141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.496164]  kthread+0x337/0x6f0
[   26.496183]  ? trace_preempt_on+0x20/0xc0
[   26.496207]  ? __pfx_kthread+0x10/0x10
[   26.496226]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.496249]  ? calculate_sigpending+0x7b/0xa0
[   26.496271]  ? __pfx_kthread+0x10/0x10
[   26.496292]  ret_from_fork+0x116/0x1d0
[   26.496311]  ? __pfx_kthread+0x10/0x10
[   26.496331]  ret_from_fork_asm+0x1a/0x30
[   26.496361]  </TASK>
[   26.496371] 
[   26.509357] Allocated by task 206:
[   26.509707]  kasan_save_stack+0x45/0x70
[   26.510024]  kasan_save_track+0x18/0x40
[   26.510406]  kasan_save_alloc_info+0x3b/0x50
[   26.510786]  __kasan_krealloc+0x190/0x1f0
[   26.510939]  krealloc_noprof+0xf3/0x340
[   26.511130]  krealloc_less_oob_helper+0x1aa/0x11d0
[   26.511337]  krealloc_less_oob+0x1c/0x30
[   26.511519]  kunit_try_run_case+0x1a5/0x480
[   26.511721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.512109]  kthread+0x337/0x6f0
[   26.512299]  ret_from_fork+0x116/0x1d0
[   26.512427]  ret_from_fork_asm+0x1a/0x30
[   26.512565] 
[   26.512664] The buggy address belongs to the object at ffff888104a4ca00
[   26.512664]  which belongs to the cache kmalloc-256 of size 256
[   26.513701] The buggy address is located 0 bytes to the right of
[   26.513701]  allocated 201-byte region [ffff888104a4ca00, ffff888104a4cac9)
[   26.514493] 
[   26.514629] The buggy address belongs to the physical page:
[   26.515065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4c
[   26.515566] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.516151] flags: 0x200000000000040(head|node=0|zone=2)
[   26.516489] page_type: f5(slab)
[   26.516673] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.517337] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.517736] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.518281] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.518635] head: 0200000000000001 ffffea0004129301 00000000ffffffff 00000000ffffffff
[   26.519173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.519616] page dumped because: kasan: bad access detected
[   26.520245] 
[   26.520356] Memory state around the buggy address:
[   26.520555]  ffff888104a4c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.520904]  ffff888104a4ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.521630] >ffff888104a4ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.522187]                                               ^
[   26.522513]  ffff888104a4cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.523011]  ffff888104a4cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.523461] ==================================================================
[   26.743312] ==================================================================
[   26.743647] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   26.744079] Write of size 1 at addr ffff88810616e0ea by task kunit_try_catch/210
[   26.744293] 
[   26.744371] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.744417] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.744430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.744492] Call Trace:
[   26.744508]  <TASK>
[   26.744523]  dump_stack_lvl+0x73/0xb0
[   26.744549]  print_report+0xd1/0x640
[   26.744571]  ? __virt_addr_valid+0x1db/0x2d0
[   26.744607]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.744629]  ? kasan_addr_to_slab+0x11/0xa0
[   26.744649]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.744672]  kasan_report+0x141/0x180
[   26.744693]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.744720]  __asan_report_store1_noabort+0x1b/0x30
[   26.744744]  krealloc_less_oob_helper+0xe90/0x11d0
[   26.744768]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.744974]  ? finish_task_switch.isra.0+0x153/0x700
[   26.745020]  ? __switch_to+0x47/0xf80
[   26.745048]  ? __schedule+0x10da/0x2b60
[   26.745073]  ? __pfx_read_tsc+0x10/0x10
[   26.745097]  krealloc_large_less_oob+0x1c/0x30
[   26.745120]  kunit_try_run_case+0x1a5/0x480
[   26.745188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.745210]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.745234]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.745259]  ? __kthread_parkme+0x82/0x180
[   26.745278]  ? preempt_count_sub+0x50/0x80
[   26.745331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.745355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.745377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.745400]  kthread+0x337/0x6f0
[   26.745420]  ? trace_preempt_on+0x20/0xc0
[   26.745443]  ? __pfx_kthread+0x10/0x10
[   26.745494]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.745517]  ? calculate_sigpending+0x7b/0xa0
[   26.745540]  ? __pfx_kthread+0x10/0x10
[   26.745561]  ret_from_fork+0x116/0x1d0
[   26.745592]  ? __pfx_kthread+0x10/0x10
[   26.745612]  ret_from_fork_asm+0x1a/0x30
[   26.745675]  </TASK>
[   26.745685] 
[   26.754811] The buggy address belongs to the physical page:
[   26.755203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   26.755588] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.756036] flags: 0x200000000000040(head|node=0|zone=2)
[   26.756245] page_type: f8(unknown)
[   26.756379] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.756611] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.757083] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.757437] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.757777] head: 0200000000000002 ffffea0004185b01 00000000ffffffff 00000000ffffffff
[   26.758329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.758623] page dumped because: kasan: bad access detected
[   26.759077] 
[   26.759182] Memory state around the buggy address:
[   26.759425]  ffff88810616df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.759740]  ffff88810616e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.760119] >ffff88810616e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.760312]                                                           ^
[   26.760898]  ffff88810616e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.761234]  ffff88810616e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.761569] ==================================================================
[   26.762086] ==================================================================
[   26.762375] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   26.762628] Write of size 1 at addr ffff88810616e0eb by task kunit_try_catch/210
[   26.762986] 
[   26.763220] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.763276] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.763289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.763309] Call Trace:
[   26.763324]  <TASK>
[   26.763340]  dump_stack_lvl+0x73/0xb0
[   26.763406]  print_report+0xd1/0x640
[   26.763429]  ? __virt_addr_valid+0x1db/0x2d0
[   26.763453]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.763476]  ? kasan_addr_to_slab+0x11/0xa0
[   26.763497]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.763553]  kasan_report+0x141/0x180
[   26.763587]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.763614]  __asan_report_store1_noabort+0x1b/0x30
[   26.763638]  krealloc_less_oob_helper+0xd47/0x11d0
[   26.763694]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.763718]  ? finish_task_switch.isra.0+0x153/0x700
[   26.763738]  ? __switch_to+0x47/0xf80
[   26.763763]  ? __schedule+0x10da/0x2b60
[   26.763834]  ? __pfx_read_tsc+0x10/0x10
[   26.763896]  krealloc_large_less_oob+0x1c/0x30
[   26.763919]  kunit_try_run_case+0x1a5/0x480
[   26.763954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.763976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.764002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.764026]  ? __kthread_parkme+0x82/0x180
[   26.764075]  ? preempt_count_sub+0x50/0x80
[   26.764097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.764120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.764142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.764165]  kthread+0x337/0x6f0
[   26.764184]  ? trace_preempt_on+0x20/0xc0
[   26.764207]  ? __pfx_kthread+0x10/0x10
[   26.764227]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.764249]  ? calculate_sigpending+0x7b/0xa0
[   26.764272]  ? __pfx_kthread+0x10/0x10
[   26.764292]  ret_from_fork+0x116/0x1d0
[   26.764336]  ? __pfx_kthread+0x10/0x10
[   26.764356]  ret_from_fork_asm+0x1a/0x30
[   26.764387]  </TASK>
[   26.764397] 
[   26.772644] The buggy address belongs to the physical page:
[   26.773133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   26.773404] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.773725] flags: 0x200000000000040(head|node=0|zone=2)
[   26.774219] page_type: f8(unknown)
[   26.774368] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.774732] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.775123] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.775490] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.775851] head: 0200000000000002 ffffea0004185b01 00000000ffffffff 00000000ffffffff
[   26.776246] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.776595] page dumped because: kasan: bad access detected
[   26.776964] 
[   26.777072] Memory state around the buggy address:
[   26.777237]  ffff88810616df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.777437]  ffff88810616e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.777649] >ffff88810616e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.778229]                                                           ^
[   26.778686]  ffff88810616e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.779112]  ffff88810616e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.779319] ==================================================================
[   26.524394] ==================================================================
[   26.524739] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   26.525479] Write of size 1 at addr ffff888104a4cad0 by task kunit_try_catch/206
[   26.526103] 
[   26.526224] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   26.526506] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.526520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.526540] Call Trace:
[   26.526557]  <TASK>
[   26.526587]  dump_stack_lvl+0x73/0xb0
[   26.526618]  print_report+0xd1/0x640
[   26.526640]  ? __virt_addr_valid+0x1db/0x2d0
[   26.526664]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   26.526686]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.526711]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   26.526734]  kasan_report+0x141/0x180
[   26.526755]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   26.526782]  __asan_report_store1_noabort+0x1b/0x30
[   26.526806]  krealloc_less_oob_helper+0xe23/0x11d0
[   26.526831]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.526853]  ? finish_task_switch.isra.0+0x153/0x700
[   26.526874]  ? __switch_to+0x47/0xf80
[   26.526899]  ? __schedule+0x10da/0x2b60
[   26.526970]  ? __pfx_read_tsc+0x10/0x10
[   26.526996]  krealloc_less_oob+0x1c/0x30
[   26.527016]  kunit_try_run_case+0x1a5/0x480
[   26.527040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.527062]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.527086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.527110]  ? __kthread_parkme+0x82/0x180
[   26.527129]  ? preempt_count_sub+0x50/0x80
[   26.527150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.527173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.527196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.527219]  kthread+0x337/0x6f0
[   26.527238]  ? trace_preempt_on+0x20/0xc0
[   26.527268]  ? __pfx_kthread+0x10/0x10
[   26.527289]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.527311]  ? calculate_sigpending+0x7b/0xa0
[   26.527334]  ? __pfx_kthread+0x10/0x10
[   26.527354]  ret_from_fork+0x116/0x1d0
[   26.527373]  ? __pfx_kthread+0x10/0x10
[   26.527392]  ret_from_fork_asm+0x1a/0x30
[   26.527423]  </TASK>
[   26.527433] 
[   26.538765] Allocated by task 206:
[   26.539157]  kasan_save_stack+0x45/0x70
[   26.539537]  kasan_save_track+0x18/0x40
[   26.539851]  kasan_save_alloc_info+0x3b/0x50
[   26.540224]  __kasan_krealloc+0x190/0x1f0
[   26.540415]  krealloc_noprof+0xf3/0x340
[   26.540613]  krealloc_less_oob_helper+0x1aa/0x11d0
[   26.541111]  krealloc_less_oob+0x1c/0x30
[   26.541302]  kunit_try_run_case+0x1a5/0x480
[   26.541696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.542066]  kthread+0x337/0x6f0
[   26.542339]  ret_from_fork+0x116/0x1d0
[   26.542694]  ret_from_fork_asm+0x1a/0x30
[   26.543082] 
[   26.543280] The buggy address belongs to the object at ffff888104a4ca00
[   26.543280]  which belongs to the cache kmalloc-256 of size 256
[   26.543984] The buggy address is located 7 bytes to the right of
[   26.543984]  allocated 201-byte region [ffff888104a4ca00, ffff888104a4cac9)
[   26.544518] 
[   26.544626] The buggy address belongs to the physical page:
[   26.544870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4c
[   26.545561] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.546135] flags: 0x200000000000040(head|node=0|zone=2)
[   26.546638] page_type: f5(slab)
[   26.546970] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.547462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.547978] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.548319] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.548662] head: 0200000000000001 ffffea0004129301 00000000ffffffff 00000000ffffffff
[   26.549302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.549623] page dumped because: kasan: bad access detected
[   26.550012] 
[   26.550110] Memory state around the buggy address:
[   26.550548]  ffff888104a4c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.551072]  ffff888104a4ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.551553] >ffff888104a4ca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.552266]                                                  ^
[   26.552649]  ffff888104a4cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.553219]  ffff888104a4cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.553690] ==================================================================