Hay
Date
July 25, 2025, 3:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.273726] ==================================================================
[   32.273878] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.273940] Write of size 1 at addr fff00000c9b260eb by task kunit_try_catch/192
[   32.274129] 
[   32.274164] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.274381] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.274576] Hardware name: linux,dummy-virt (DT)
[   32.274620] Call trace:
[   32.274701]  show_stack+0x20/0x38 (C)
[   32.274752]  dump_stack_lvl+0x8c/0xd0
[   32.274799]  print_report+0x118/0x5e8
[   32.274881]  kasan_report+0xdc/0x128
[   32.275039]  __asan_report_store1_noabort+0x20/0x30
[   32.275361]  krealloc_more_oob_helper+0x60c/0x678
[   32.275512]  krealloc_large_more_oob+0x20/0x38
[   32.275703]  kunit_try_run_case+0x170/0x3f0
[   32.275785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.275889]  kthread+0x328/0x630
[   32.275934]  ret_from_fork+0x10/0x20
[   32.276422] 
[   32.276552] The buggy address belongs to the physical page:
[   32.276717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.276855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.276930] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.277170] page_type: f8(unknown)
[   32.277345] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.277463] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.277673] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.277780] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.277937] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.278023] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.278338] page dumped because: kasan: bad access detected
[   32.278537] 
[   32.278629] Memory state around the buggy address:
[   32.278766]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.278875]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.279039] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.279079]                                                           ^
[   32.279140]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.279196]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.279370] ==================================================================
[   32.201519] ==================================================================
[   32.201604] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.201734] Write of size 1 at addr fff00000c8754cf0 by task kunit_try_catch/188
[   32.201784] 
[   32.201815] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.201899] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.201935] Hardware name: linux,dummy-virt (DT)
[   32.201965] Call trace:
[   32.201986]  show_stack+0x20/0x38 (C)
[   32.202032]  dump_stack_lvl+0x8c/0xd0
[   32.202078]  print_report+0x118/0x5e8
[   32.202121]  kasan_report+0xdc/0x128
[   32.202171]  __asan_report_store1_noabort+0x20/0x30
[   32.202224]  krealloc_more_oob_helper+0x5c0/0x678
[   32.202273]  krealloc_more_oob+0x20/0x38
[   32.202318]  kunit_try_run_case+0x170/0x3f0
[   32.202362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.202412]  kthread+0x328/0x630
[   32.202461]  ret_from_fork+0x10/0x20
[   32.202506] 
[   32.202525] Allocated by task 188:
[   32.202558]  kasan_save_stack+0x3c/0x68
[   32.202605]  kasan_save_track+0x20/0x40
[   32.202649]  kasan_save_alloc_info+0x40/0x58
[   32.202685]  __kasan_krealloc+0x118/0x178
[   32.202719]  krealloc_noprof+0x128/0x360
[   32.202757]  krealloc_more_oob_helper+0x168/0x678
[   32.202796]  krealloc_more_oob+0x20/0x38
[   32.202832]  kunit_try_run_case+0x170/0x3f0
[   32.202878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.202919]  kthread+0x328/0x630
[   32.203525]  ret_from_fork+0x10/0x20
[   32.203586] 
[   32.203607] The buggy address belongs to the object at fff00000c8754c00
[   32.203607]  which belongs to the cache kmalloc-256 of size 256
[   32.204098] The buggy address is located 5 bytes to the right of
[   32.204098]  allocated 235-byte region [fff00000c8754c00, fff00000c8754ceb)
[   32.204271] 
[   32.204357] The buggy address belongs to the physical page:
[   32.204447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.204548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.204778] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.205083] page_type: f5(slab)
[   32.205153] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.205246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.206010] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.206463] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.206740] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.207127] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.207174] page dumped because: kasan: bad access detected
[   32.207429] 
[   32.207637] Memory state around the buggy address:
[   32.207738]  fff00000c8754b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.207785]  fff00000c8754c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.207879] >fff00000c8754c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.208019]                                                              ^
[   32.208390]  fff00000c8754d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.208492]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.208721] ==================================================================
[   32.280671] ==================================================================
[   32.280769] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.280825] Write of size 1 at addr fff00000c9b260f0 by task kunit_try_catch/192
[   32.280882] 
[   32.280911] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.281315] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.281359] Hardware name: linux,dummy-virt (DT)
[   32.281705] Call trace:
[   32.281933]  show_stack+0x20/0x38 (C)
[   32.282151]  dump_stack_lvl+0x8c/0xd0
[   32.282212]  print_report+0x118/0x5e8
[   32.282257]  kasan_report+0xdc/0x128
[   32.282334]  __asan_report_store1_noabort+0x20/0x30
[   32.282387]  krealloc_more_oob_helper+0x5c0/0x678
[   32.282436]  krealloc_large_more_oob+0x20/0x38
[   32.282527]  kunit_try_run_case+0x170/0x3f0
[   32.282583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.282634]  kthread+0x328/0x630
[   32.282685]  ret_from_fork+0x10/0x20
[   32.282730] 
[   32.282749] The buggy address belongs to the physical page:
[   32.282780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24
[   32.282838] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.282881] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.282929] page_type: f8(unknown)
[   32.283109] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.283156] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.283593] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.283767] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.283853] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff
[   32.284035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.284085] page dumped because: kasan: bad access detected
[   32.284114] 
[   32.284379] Memory state around the buggy address:
[   32.284534]  fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.284587]  fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.284840] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.284931]                                                              ^
[   32.285099]  fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.285166]  fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.285252] ==================================================================
[   32.189566] ==================================================================
[   32.189626] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.189697] Write of size 1 at addr fff00000c8754ceb by task kunit_try_catch/188
[   32.190165] 
[   32.190297] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.190439] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.190786] Hardware name: linux,dummy-virt (DT)
[   32.190945] Call trace:
[   32.191027]  show_stack+0x20/0x38 (C)
[   32.191138]  dump_stack_lvl+0x8c/0xd0
[   32.191246]  print_report+0x118/0x5e8
[   32.191397]  kasan_report+0xdc/0x128
[   32.191461]  __asan_report_store1_noabort+0x20/0x30
[   32.191542]  krealloc_more_oob_helper+0x60c/0x678
[   32.191593]  krealloc_more_oob+0x20/0x38
[   32.191649]  kunit_try_run_case+0x170/0x3f0
[   32.192052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.192320]  kthread+0x328/0x630
[   32.192456]  ret_from_fork+0x10/0x20
[   32.192741] 
[   32.192893] Allocated by task 188:
[   32.192965]  kasan_save_stack+0x3c/0x68
[   32.193297]  kasan_save_track+0x20/0x40
[   32.193408]  kasan_save_alloc_info+0x40/0x58
[   32.193527]  __kasan_krealloc+0x118/0x178
[   32.193736]  krealloc_noprof+0x128/0x360
[   32.194014]  krealloc_more_oob_helper+0x168/0x678
[   32.194264]  krealloc_more_oob+0x20/0x38
[   32.194340]  kunit_try_run_case+0x170/0x3f0
[   32.194473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.194534]  kthread+0x328/0x630
[   32.194574]  ret_from_fork+0x10/0x20
[   32.194609] 
[   32.194629] The buggy address belongs to the object at fff00000c8754c00
[   32.194629]  which belongs to the cache kmalloc-256 of size 256
[   32.194698] The buggy address is located 0 bytes to the right of
[   32.194698]  allocated 235-byte region [fff00000c8754c00, fff00000c8754ceb)
[   32.194769] 
[   32.194798] The buggy address belongs to the physical page:
[   32.194835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754
[   32.194886] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.194936] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.195160] page_type: f5(slab)
[   32.195498] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.195781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.195960] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002
[   32.196064] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.196224] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff
[   32.196334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.196606] page dumped because: kasan: bad access detected
[   32.196746] 
[   32.196908] Memory state around the buggy address:
[   32.197032]  fff00000c8754b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197194]  fff00000c8754c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.197461] >fff00000c8754c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.197555]                                                           ^
[   32.197744]  fff00000c8754d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197930]  fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.198089] ==================================================================

[   25.493443] ==================================================================
[   25.493788] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   25.494206] Write of size 1 at addr ffff888102b420f0 by task kunit_try_catch/209
[   25.494593] 
[   25.494701] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   25.494748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.494780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.494809] Call Trace:
[   25.494822]  <TASK>
[   25.494837]  dump_stack_lvl+0x73/0xb0
[   25.494866]  print_report+0xd1/0x640
[   25.494957]  ? __virt_addr_valid+0x1db/0x2d0
[   25.494983]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.495007]  ? kasan_addr_to_slab+0x11/0xa0
[   25.495028]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.495052]  kasan_report+0x141/0x180
[   25.495084]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.495113]  __asan_report_store1_noabort+0x1b/0x30
[   25.495138]  krealloc_more_oob_helper+0x7eb/0x930
[   25.495160]  ? __schedule+0x10da/0x2b60
[   25.495218]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.495243]  ? finish_task_switch.isra.0+0x153/0x700
[   25.495265]  ? __switch_to+0x47/0xf80
[   25.495292]  ? __schedule+0x10da/0x2b60
[   25.495313]  ? __pfx_read_tsc+0x10/0x10
[   25.495368]  krealloc_large_more_oob+0x1c/0x30
[   25.495392]  kunit_try_run_case+0x1a5/0x480
[   25.495417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.495440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.495462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.495520]  ? __kthread_parkme+0x82/0x180
[   25.495540]  ? preempt_count_sub+0x50/0x80
[   25.495563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.495588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.495613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.495659]  kthread+0x337/0x6f0
[   25.495680]  ? trace_preempt_on+0x20/0xc0
[   25.495705]  ? __pfx_kthread+0x10/0x10
[   25.495726]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.495751]  ? calculate_sigpending+0x7b/0xa0
[   25.495776]  ? __pfx_kthread+0x10/0x10
[   25.495811]  ret_from_fork+0x116/0x1d0
[   25.495831]  ? __pfx_kthread+0x10/0x10
[   25.495851]  ret_from_fork_asm+0x1a/0x30
[   25.495884]  </TASK>
[   25.495894] 
[   25.504445] The buggy address belongs to the physical page:
[   25.504686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40
[   25.505149] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.505566] flags: 0x200000000000040(head|node=0|zone=2)
[   25.505872] page_type: f8(unknown)
[   25.506054] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.506405] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.506742] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.507212] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.507540] head: 0200000000000002 ffffea00040ad001 00000000ffffffff 00000000ffffffff
[   25.507870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.508335] page dumped because: kasan: bad access detected
[   25.508592] 
[   25.508673] Memory state around the buggy address:
[   25.508996]  ffff888102b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.509316]  ffff888102b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.509640] >ffff888102b42080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   25.509984]                                                              ^
[   25.510356]  ffff888102b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.510660]  ffff888102b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.510930] ==================================================================
[   25.290940] ==================================================================
[   25.291678] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   25.292339] Write of size 1 at addr ffff8881049ad8f0 by task kunit_try_catch/205
[   25.292656] 
[   25.292764] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   25.292810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.292822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.292841] Call Trace:
[   25.292853]  <TASK>
[   25.293227]  dump_stack_lvl+0x73/0xb0
[   25.293264]  print_report+0xd1/0x640
[   25.293288]  ? __virt_addr_valid+0x1db/0x2d0
[   25.293311]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.293335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.293362]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.293387]  kasan_report+0x141/0x180
[   25.293410]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.293439]  __asan_report_store1_noabort+0x1b/0x30
[   25.293465]  krealloc_more_oob_helper+0x7eb/0x930
[   25.293488]  ? __schedule+0x10da/0x2b60
[   25.293512]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.293537]  ? finish_task_switch.isra.0+0x153/0x700
[   25.293560]  ? __switch_to+0x47/0xf80
[   25.293586]  ? __schedule+0x10da/0x2b60
[   25.293607]  ? __pfx_read_tsc+0x10/0x10
[   25.293632]  krealloc_more_oob+0x1c/0x30
[   25.293655]  kunit_try_run_case+0x1a5/0x480
[   25.293679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.293702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.293725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.293752]  ? __kthread_parkme+0x82/0x180
[   25.293773]  ? preempt_count_sub+0x50/0x80
[   25.293852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.293877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.293902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.293926]  kthread+0x337/0x6f0
[   25.293959]  ? trace_preempt_on+0x20/0xc0
[   25.293984]  ? __pfx_kthread+0x10/0x10
[   25.294005]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.294031]  ? calculate_sigpending+0x7b/0xa0
[   25.294065]  ? __pfx_kthread+0x10/0x10
[   25.294088]  ret_from_fork+0x116/0x1d0
[   25.294107]  ? __pfx_kthread+0x10/0x10
[   25.294129]  ret_from_fork_asm+0x1a/0x30
[   25.294161]  </TASK>
[   25.294172] 
[   25.304736] Allocated by task 205:
[   25.304928]  kasan_save_stack+0x45/0x70
[   25.305168]  kasan_save_track+0x18/0x40
[   25.305886]  kasan_save_alloc_info+0x3b/0x50
[   25.306111]  __kasan_krealloc+0x190/0x1f0
[   25.306459]  krealloc_noprof+0xf3/0x340
[   25.306701]  krealloc_more_oob_helper+0x1a9/0x930
[   25.307067]  krealloc_more_oob+0x1c/0x30
[   25.307273]  kunit_try_run_case+0x1a5/0x480
[   25.307602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.308014]  kthread+0x337/0x6f0
[   25.308190]  ret_from_fork+0x116/0x1d0
[   25.308502]  ret_from_fork_asm+0x1a/0x30
[   25.308708] 
[   25.309023] The buggy address belongs to the object at ffff8881049ad800
[   25.309023]  which belongs to the cache kmalloc-256 of size 256
[   25.309528] The buggy address is located 5 bytes to the right of
[   25.309528]  allocated 235-byte region [ffff8881049ad800, ffff8881049ad8eb)
[   25.310425] 
[   25.310525] The buggy address belongs to the physical page:
[   25.310747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ac
[   25.311472] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.311758] flags: 0x200000000000040(head|node=0|zone=2)
[   25.312253] page_type: f5(slab)
[   25.312442] raw: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   25.313110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.313435] head: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   25.314082] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.314511] head: 0200000000000001 ffffea0004126b01 00000000ffffffff 00000000ffffffff
[   25.314819] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.315342] page dumped because: kasan: bad access detected
[   25.315591] 
[   25.315763] Memory state around the buggy address:
[   25.316125]  ffff8881049ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.316755]  ffff8881049ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.317259] >ffff8881049ad880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   25.317575]                                                              ^
[   25.318175]  ffff8881049ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.318445]  ffff8881049ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.318750] ==================================================================
[   25.467437] ==================================================================
[   25.467818] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   25.468477] Write of size 1 at addr ffff888102b420eb by task kunit_try_catch/209
[   25.468732] 
[   25.468818] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   25.468868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.468881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.468901] Call Trace:
[   25.468915]  <TASK>
[   25.468933]  dump_stack_lvl+0x73/0xb0
[   25.469445]  print_report+0xd1/0x640
[   25.469472]  ? __virt_addr_valid+0x1db/0x2d0
[   25.469504]  ? krealloc_more_oob_helper+0x821/0x930
[   25.469528]  ? kasan_addr_to_slab+0x11/0xa0
[   25.469549]  ? krealloc_more_oob_helper+0x821/0x930
[   25.469574]  kasan_report+0x141/0x180
[   25.469597]  ? krealloc_more_oob_helper+0x821/0x930
[   25.469626]  __asan_report_store1_noabort+0x1b/0x30
[   25.469651]  krealloc_more_oob_helper+0x821/0x930
[   25.469674]  ? __schedule+0x10da/0x2b60
[   25.469696]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.469720]  ? finish_task_switch.isra.0+0x153/0x700
[   25.469742]  ? __switch_to+0x47/0xf80
[   25.469774]  ? __schedule+0x10da/0x2b60
[   25.469794]  ? __pfx_read_tsc+0x10/0x10
[   25.469819]  krealloc_large_more_oob+0x1c/0x30
[   25.469842]  kunit_try_run_case+0x1a5/0x480
[   25.469867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.469890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.469912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.469939]  ? __kthread_parkme+0x82/0x180
[   25.469969]  ? preempt_count_sub+0x50/0x80
[   25.469992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.470016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.470040]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.470064]  kthread+0x337/0x6f0
[   25.470084]  ? trace_preempt_on+0x20/0xc0
[   25.470106]  ? __pfx_kthread+0x10/0x10
[   25.470178]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.470203]  ? calculate_sigpending+0x7b/0xa0
[   25.470228]  ? __pfx_kthread+0x10/0x10
[   25.470249]  ret_from_fork+0x116/0x1d0
[   25.470269]  ? __pfx_kthread+0x10/0x10
[   25.470290]  ret_from_fork_asm+0x1a/0x30
[   25.470330]  </TASK>
[   25.470342] 
[   25.484000] The buggy address belongs to the physical page:
[   25.484705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40
[   25.485602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.486464] flags: 0x200000000000040(head|node=0|zone=2)
[   25.487114] page_type: f8(unknown)
[   25.487600] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.488379] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.488638] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.488892] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.489266] head: 0200000000000002 ffffea00040ad001 00000000ffffffff 00000000ffffffff
[   25.489611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.489908] page dumped because: kasan: bad access detected
[   25.490182] 
[   25.490299] Memory state around the buggy address:
[   25.490544]  ffff888102b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.490988]  ffff888102b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.491419] >ffff888102b42080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   25.491806]                                                           ^
[   25.492208]  ffff888102b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.492502]  ffff888102b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.492824] ==================================================================
[   25.266383] ==================================================================
[   25.267508] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   25.267821] Write of size 1 at addr ffff8881049ad8eb by task kunit_try_catch/205
[   25.268244] 
[   25.268362] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   25.268411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.268423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.268444] Call Trace:
[   25.268457]  <TASK>
[   25.268473]  dump_stack_lvl+0x73/0xb0
[   25.268504]  print_report+0xd1/0x640
[   25.268528]  ? __virt_addr_valid+0x1db/0x2d0
[   25.268552]  ? krealloc_more_oob_helper+0x821/0x930
[   25.268577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.268604]  ? krealloc_more_oob_helper+0x821/0x930
[   25.268628]  kasan_report+0x141/0x180
[   25.268651]  ? krealloc_more_oob_helper+0x821/0x930
[   25.268681]  __asan_report_store1_noabort+0x1b/0x30
[   25.268706]  krealloc_more_oob_helper+0x821/0x930
[   25.268729]  ? __schedule+0x10da/0x2b60
[   25.268751]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.268776]  ? finish_task_switch.isra.0+0x153/0x700
[   25.268799]  ? __switch_to+0x47/0xf80
[   25.268828]  ? __schedule+0x10da/0x2b60
[   25.268849]  ? __pfx_read_tsc+0x10/0x10
[   25.268875]  krealloc_more_oob+0x1c/0x30
[   25.268897]  kunit_try_run_case+0x1a5/0x480
[   25.268923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.268958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.268981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.269019]  ? __kthread_parkme+0x82/0x180
[   25.269041]  ? preempt_count_sub+0x50/0x80
[   25.269065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.269144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.269170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.269194]  kthread+0x337/0x6f0
[   25.269215]  ? trace_preempt_on+0x20/0xc0
[   25.269240]  ? __pfx_kthread+0x10/0x10
[   25.269262]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.269287]  ? calculate_sigpending+0x7b/0xa0
[   25.269311]  ? __pfx_kthread+0x10/0x10
[   25.269334]  ret_from_fork+0x116/0x1d0
[   25.269353]  ? __pfx_kthread+0x10/0x10
[   25.269375]  ret_from_fork_asm+0x1a/0x30
[   25.269407]  </TASK>
[   25.269418] 
[   25.277539] Allocated by task 205:
[   25.277679]  kasan_save_stack+0x45/0x70
[   25.277847]  kasan_save_track+0x18/0x40
[   25.278271]  kasan_save_alloc_info+0x3b/0x50
[   25.278534]  __kasan_krealloc+0x190/0x1f0
[   25.278695]  krealloc_noprof+0xf3/0x340
[   25.278986]  krealloc_more_oob_helper+0x1a9/0x930
[   25.279172]  krealloc_more_oob+0x1c/0x30
[   25.279308]  kunit_try_run_case+0x1a5/0x480
[   25.279572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.279900]  kthread+0x337/0x6f0
[   25.280052]  ret_from_fork+0x116/0x1d0
[   25.280189]  ret_from_fork_asm+0x1a/0x30
[   25.280329] 
[   25.280395] The buggy address belongs to the object at ffff8881049ad800
[   25.280395]  which belongs to the cache kmalloc-256 of size 256
[   25.280920] The buggy address is located 0 bytes to the right of
[   25.280920]  allocated 235-byte region [ffff8881049ad800, ffff8881049ad8eb)
[   25.281613] 
[   25.281705] The buggy address belongs to the physical page:
[   25.282193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ac
[   25.282454] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.282688] flags: 0x200000000000040(head|node=0|zone=2)
[   25.282929] page_type: f5(slab)
[   25.283110] raw: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   25.283457] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.284876] head: 0200000000000040 ffff888100041b40 ffffea000402a900 dead000000000004
[   25.285306] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.285552] head: 0200000000000001 ffffea0004126b01 00000000ffffffff 00000000ffffffff
[   25.286110] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.286407] page dumped because: kasan: bad access detected
[   25.286656] 
[   25.286745] Memory state around the buggy address:
[   25.286962]  ffff8881049ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.288036]  ffff8881049ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.288380] >ffff8881049ad880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   25.288686]                                                           ^
[   25.289291]  ffff8881049ad900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.289615]  ffff8881049ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.289864] ==================================================================