Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   22.926445] ==================================================================
[   22.933271] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   22.940817] Write of size 1 at addr ffff0008032a08d0 by task kunit_try_catch/205
[   22.948195] 
[   22.949681] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.949733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.949750] Hardware name: WinLink E850-96 board (DT)
[   22.949770] Call trace:
[   22.949786]  show_stack+0x20/0x38 (C)
[   22.949820]  dump_stack_lvl+0x8c/0xd0
[   22.949858]  print_report+0x118/0x608
[   22.949892]  kasan_report+0xdc/0x128
[   22.949928]  __asan_report_store1_noabort+0x20/0x30
[   22.949960]  krealloc_less_oob_helper+0xb9c/0xc50
[   22.949991]  krealloc_less_oob+0x20/0x38
[   22.950020]  kunit_try_run_case+0x170/0x3f0
[   22.950055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.950092]  kthread+0x328/0x630
[   22.950121]  ret_from_fork+0x10/0x20
[   22.950156] 
[   23.017033] Allocated by task 205:
[   23.020418]  kasan_save_stack+0x3c/0x68
[   23.024235]  kasan_save_track+0x20/0x40
[   23.028055]  kasan_save_alloc_info+0x40/0x58
[   23.032309]  __kasan_krealloc+0x118/0x178
[   23.036302]  krealloc_noprof+0x128/0x360
[   23.040207]  krealloc_less_oob_helper+0x168/0xc50
[   23.044895]  krealloc_less_oob+0x20/0x38
[   23.048801]  kunit_try_run_case+0x170/0x3f0
[   23.052969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.058438]  kthread+0x328/0x630
[   23.061649]  ret_from_fork+0x10/0x20
[   23.065207] 
[   23.066684] The buggy address belongs to the object at ffff0008032a0800
[   23.066684]  which belongs to the cache kmalloc-256 of size 256
[   23.079185] The buggy address is located 7 bytes to the right of
[   23.079185]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   23.092117] 
[   23.093596] The buggy address belongs to the physical page:
[   23.099152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   23.107137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.114774] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.121720] page_type: f5(slab)
[   23.124854] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.132574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.140301] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.148112] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.155925] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   23.163737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.171543] page dumped because: kasan: bad access detected
[   23.177098] 
[   23.178573] Memory state around the buggy address:
[   23.183353]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.190556]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.197761] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.204962]                                                  ^
[   23.210782]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.217987]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.225187] ==================================================================
[   25.085531] ==================================================================
[   25.092612] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   25.100161] Write of size 1 at addr ffff0008032a60da by task kunit_try_catch/209
[   25.107537] 
[   25.109021] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.109074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.109089] Hardware name: WinLink E850-96 board (DT)
[   25.109109] Call trace:
[   25.109123]  show_stack+0x20/0x38 (C)
[   25.109157]  dump_stack_lvl+0x8c/0xd0
[   25.109194]  print_report+0x118/0x608
[   25.109228]  kasan_report+0xdc/0x128
[   25.109261]  __asan_report_store1_noabort+0x20/0x30
[   25.109295]  krealloc_less_oob_helper+0xa80/0xc50
[   25.109327]  krealloc_large_less_oob+0x20/0x38
[   25.109359]  kunit_try_run_case+0x170/0x3f0
[   25.109396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.109433]  kthread+0x328/0x630
[   25.109463]  ret_from_fork+0x10/0x20
[   25.109497] 
[   25.176896] The buggy address belongs to the physical page:
[   25.182454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   25.190439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.198077] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.205019] page_type: f8(unknown)
[   25.208418] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.216137] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.223864] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.231674] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.239488] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   25.247300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.255105] page dumped because: kasan: bad access detected
[   25.260661] 
[   25.262136] Memory state around the buggy address:
[   25.266917]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.274119]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.281324] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.288525]                                                     ^
[   25.294606]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.301810]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.309010] ==================================================================
[   23.846457] ==================================================================
[   23.853485] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.861029] Write of size 1 at addr ffff0008032a08eb by task kunit_try_catch/205
[   23.868408] 
[   23.869892] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.869945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.869961] Hardware name: WinLink E850-96 board (DT)
[   23.869983] Call trace:
[   23.869996]  show_stack+0x20/0x38 (C)
[   23.870028]  dump_stack_lvl+0x8c/0xd0
[   23.870063]  print_report+0x118/0x608
[   23.870097]  kasan_report+0xdc/0x128
[   23.870129]  __asan_report_store1_noabort+0x20/0x30
[   23.870161]  krealloc_less_oob_helper+0xa58/0xc50
[   23.870194]  krealloc_less_oob+0x20/0x38
[   23.870224]  kunit_try_run_case+0x170/0x3f0
[   23.870259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.870295]  kthread+0x328/0x630
[   23.870324]  ret_from_fork+0x10/0x20
[   23.870359] 
[   23.937243] Allocated by task 205:
[   23.940631]  kasan_save_stack+0x3c/0x68
[   23.944448]  kasan_save_track+0x20/0x40
[   23.948268]  kasan_save_alloc_info+0x40/0x58
[   23.952522]  __kasan_krealloc+0x118/0x178
[   23.956514]  krealloc_noprof+0x128/0x360
[   23.960419]  krealloc_less_oob_helper+0x168/0xc50
[   23.965107]  krealloc_less_oob+0x20/0x38
[   23.969013]  kunit_try_run_case+0x170/0x3f0
[   23.973181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.978649]  kthread+0x328/0x630
[   23.981860]  ret_from_fork+0x10/0x20
[   23.985419] 
[   23.986896] The buggy address belongs to the object at ffff0008032a0800
[   23.986896]  which belongs to the cache kmalloc-256 of size 256
[   23.999396] The buggy address is located 34 bytes to the right of
[   23.999396]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   24.012415] 
[   24.013893] The buggy address belongs to the physical page:
[   24.019451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   24.027434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.035074] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.042017] page_type: f5(slab)
[   24.045154] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.052874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.060599] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.068411] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.076224] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   24.084036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.091841] page dumped because: kasan: bad access detected
[   24.097397] 
[   24.098872] Memory state around the buggy address:
[   24.103654]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.110855]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.118060] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.125261]                                                           ^
[   24.131862]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.139066]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146269] ==================================================================
[   25.316294] ==================================================================
[   25.323425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.330972] Write of size 1 at addr ffff0008032a60ea by task kunit_try_catch/209
[   25.338350] 
[   25.339834] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.339882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.339895] Hardware name: WinLink E850-96 board (DT)
[   25.339915] Call trace:
[   25.339926]  show_stack+0x20/0x38 (C)
[   25.339958]  dump_stack_lvl+0x8c/0xd0
[   25.339992]  print_report+0x118/0x608
[   25.340024]  kasan_report+0xdc/0x128
[   25.340059]  __asan_report_store1_noabort+0x20/0x30
[   25.340089]  krealloc_less_oob_helper+0xae4/0xc50
[   25.340122]  krealloc_large_less_oob+0x20/0x38
[   25.340155]  kunit_try_run_case+0x170/0x3f0
[   25.340191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.340229]  kthread+0x328/0x630
[   25.340258]  ret_from_fork+0x10/0x20
[   25.340292] 
[   25.407707] The buggy address belongs to the physical page:
[   25.413264] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   25.421250] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.428889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.435832] page_type: f8(unknown)
[   25.439226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.446949] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.454675] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.462487] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.470300] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   25.478112] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.485917] page dumped because: kasan: bad access detected
[   25.491473] 
[   25.492949] Memory state around the buggy address:
[   25.497729]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.504931]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.512136] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.519337]                                                           ^
[   25.525938]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.533143]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.540344] ==================================================================
[   25.547658] ==================================================================
[   25.554759] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.562307] Write of size 1 at addr ffff0008032a60eb by task kunit_try_catch/209
[   25.569684] 
[   25.571169] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.571219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.571235] Hardware name: WinLink E850-96 board (DT)
[   25.571255] Call trace:
[   25.571268]  show_stack+0x20/0x38 (C)
[   25.571301]  dump_stack_lvl+0x8c/0xd0
[   25.571335]  print_report+0x118/0x608
[   25.571371]  kasan_report+0xdc/0x128
[   25.571404]  __asan_report_store1_noabort+0x20/0x30
[   25.571435]  krealloc_less_oob_helper+0xa58/0xc50
[   25.571464]  krealloc_large_less_oob+0x20/0x38
[   25.571493]  kunit_try_run_case+0x170/0x3f0
[   25.571525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.571559]  kthread+0x328/0x630
[   25.571587]  ret_from_fork+0x10/0x20
[   25.571620] 
[   25.639042] The buggy address belongs to the physical page:
[   25.644598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   25.652584] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.660221] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.667165] page_type: f8(unknown)
[   25.670562] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.678283] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.686009] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.693820] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.701634] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   25.709445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.717251] page dumped because: kasan: bad access detected
[   25.722807] 
[   25.724282] Memory state around the buggy address:
[   25.729061]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.736265]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.743470] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.750670]                                                           ^
[   25.757271]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.764476]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.771677] ==================================================================
[   22.617770] ==================================================================
[   22.627200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.634748] Write of size 1 at addr ffff0008032a08c9 by task kunit_try_catch/205
[   22.642125] 
[   22.643611] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.643662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.643678] Hardware name: WinLink E850-96 board (DT)
[   22.643699] Call trace:
[   22.643713]  show_stack+0x20/0x38 (C)
[   22.643750]  dump_stack_lvl+0x8c/0xd0
[   22.643786]  print_report+0x118/0x608
[   22.643824]  kasan_report+0xdc/0x128
[   22.643857]  __asan_report_store1_noabort+0x20/0x30
[   22.643889]  krealloc_less_oob_helper+0xa48/0xc50
[   22.643922]  krealloc_less_oob+0x20/0x38
[   22.643950]  kunit_try_run_case+0x170/0x3f0
[   22.643988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.644026]  kthread+0x328/0x630
[   22.644058]  ret_from_fork+0x10/0x20
[   22.644096] 
[   22.710960] Allocated by task 205:
[   22.714347]  kasan_save_stack+0x3c/0x68
[   22.718164]  kasan_save_track+0x20/0x40
[   22.721985]  kasan_save_alloc_info+0x40/0x58
[   22.726237]  __kasan_krealloc+0x118/0x178
[   22.730230]  krealloc_noprof+0x128/0x360
[   22.734136]  krealloc_less_oob_helper+0x168/0xc50
[   22.738824]  krealloc_less_oob+0x20/0x38
[   22.742730]  kunit_try_run_case+0x170/0x3f0
[   22.746896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.752365]  kthread+0x328/0x630
[   22.755578]  ret_from_fork+0x10/0x20
[   22.759135] 
[   22.760614] The buggy address belongs to the object at ffff0008032a0800
[   22.760614]  which belongs to the cache kmalloc-256 of size 256
[   22.773113] The buggy address is located 0 bytes to the right of
[   22.773113]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   22.786046] 
[   22.787523] The buggy address belongs to the physical page:
[   22.793081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   22.801065] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.808702] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.815648] page_type: f5(slab)
[   22.818784] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.826503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.834232] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.842042] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.849853] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   22.857665] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.865471] page dumped because: kasan: bad access detected
[   22.871026] 
[   22.872502] Memory state around the buggy address:
[   22.877285]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.884485]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.891689] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.898890]                                               ^
[   22.904449]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.911654]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.918858] ==================================================================
[   24.855166] ==================================================================
[   24.862060] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.869608] Write of size 1 at addr ffff0008032a60d0 by task kunit_try_catch/209
[   24.876986] 
[   24.878470] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.878526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.878543] Hardware name: WinLink E850-96 board (DT)
[   24.878565] Call trace:
[   24.878578]  show_stack+0x20/0x38 (C)
[   24.878612]  dump_stack_lvl+0x8c/0xd0
[   24.878649]  print_report+0x118/0x608
[   24.878682]  kasan_report+0xdc/0x128
[   24.878715]  __asan_report_store1_noabort+0x20/0x30
[   24.878750]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.878783]  krealloc_large_less_oob+0x20/0x38
[   24.878813]  kunit_try_run_case+0x170/0x3f0
[   24.878848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.878888]  kthread+0x328/0x630
[   24.878918]  ret_from_fork+0x10/0x20
[   24.878952] 
[   24.946344] The buggy address belongs to the physical page:
[   24.951900] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   24.959887] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.967524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.974467] page_type: f8(unknown)
[   24.977865] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.985585] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.993311] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.001122] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.008936] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   25.016747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.024553] page dumped because: kasan: bad access detected
[   25.030108] 
[   25.031584] Memory state around the buggy address:
[   25.036365]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.043567]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.050772] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.057972]                                                  ^
[   25.063792]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.070997]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.078198] ==================================================================
[   23.232510] ==================================================================
[   23.239599] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.247149] Write of size 1 at addr ffff0008032a08da by task kunit_try_catch/205
[   23.254529] 
[   23.256013] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.256067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.256083] Hardware name: WinLink E850-96 board (DT)
[   23.256102] Call trace:
[   23.256115]  show_stack+0x20/0x38 (C)
[   23.256150]  dump_stack_lvl+0x8c/0xd0
[   23.256185]  print_report+0x118/0x608
[   23.256219]  kasan_report+0xdc/0x128
[   23.256251]  __asan_report_store1_noabort+0x20/0x30
[   23.256283]  krealloc_less_oob_helper+0xa80/0xc50
[   23.256315]  krealloc_less_oob+0x20/0x38
[   23.256344]  kunit_try_run_case+0x170/0x3f0
[   23.256380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.256419]  kthread+0x328/0x630
[   23.256448]  ret_from_fork+0x10/0x20
[   23.256480] 
[   23.323363] Allocated by task 205:
[   23.326750]  kasan_save_stack+0x3c/0x68
[   23.330569]  kasan_save_track+0x20/0x40
[   23.334387]  kasan_save_alloc_info+0x40/0x58
[   23.338641]  __kasan_krealloc+0x118/0x178
[   23.342634]  krealloc_noprof+0x128/0x360
[   23.346540]  krealloc_less_oob_helper+0x168/0xc50
[   23.351227]  krealloc_less_oob+0x20/0x38
[   23.355133]  kunit_try_run_case+0x170/0x3f0
[   23.359302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.364769]  kthread+0x328/0x630
[   23.367981]  ret_from_fork+0x10/0x20
[   23.371539] 
[   23.373017] The buggy address belongs to the object at ffff0008032a0800
[   23.373017]  which belongs to the cache kmalloc-256 of size 256
[   23.385517] The buggy address is located 17 bytes to the right of
[   23.385517]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   23.398535] 
[   23.400013] The buggy address belongs to the physical page:
[   23.405573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   23.413556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.421193] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.428137] page_type: f5(slab)
[   23.431272] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.438995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.446720] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.454531] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.462344] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   23.470156] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.477962] page dumped because: kasan: bad access detected
[   23.483517] 
[   23.484992] Memory state around the buggy address:
[   23.489772]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.496976]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.504180] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.511381]                                                     ^
[   23.517461]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.524666]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.531867] ==================================================================
[   23.539190] ==================================================================
[   23.546280] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.553829] Write of size 1 at addr ffff0008032a08ea by task kunit_try_catch/205
[   23.561207] 
[   23.562691] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.562742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.562756] Hardware name: WinLink E850-96 board (DT)
[   23.562774] Call trace:
[   23.562787]  show_stack+0x20/0x38 (C)
[   23.562821]  dump_stack_lvl+0x8c/0xd0
[   23.562856]  print_report+0x118/0x608
[   23.562891]  kasan_report+0xdc/0x128
[   23.562923]  __asan_report_store1_noabort+0x20/0x30
[   23.562952]  krealloc_less_oob_helper+0xae4/0xc50
[   23.562984]  krealloc_less_oob+0x20/0x38
[   23.563013]  kunit_try_run_case+0x170/0x3f0
[   23.563046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.563081]  kthread+0x328/0x630
[   23.563109]  ret_from_fork+0x10/0x20
[   23.563142] 
[   23.630043] Allocated by task 205:
[   23.633428]  kasan_save_stack+0x3c/0x68
[   23.637249]  kasan_save_track+0x20/0x40
[   23.641068]  kasan_save_alloc_info+0x40/0x58
[   23.645320]  __kasan_krealloc+0x118/0x178
[   23.649313]  krealloc_noprof+0x128/0x360
[   23.653219]  krealloc_less_oob_helper+0x168/0xc50
[   23.657907]  krealloc_less_oob+0x20/0x38
[   23.661815]  kunit_try_run_case+0x170/0x3f0
[   23.665981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.671448]  kthread+0x328/0x630
[   23.674660]  ret_from_fork+0x10/0x20
[   23.678219] 
[   23.679696] The buggy address belongs to the object at ffff0008032a0800
[   23.679696]  which belongs to the cache kmalloc-256 of size 256
[   23.692195] The buggy address is located 33 bytes to the right of
[   23.692195]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   23.705215] 
[   23.706693] The buggy address belongs to the physical page:
[   23.712248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   23.720234] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.727874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.734817] page_type: f5(slab)
[   23.737951] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.745673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.753399] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.761211] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.769024] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   23.776835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.784641] page dumped because: kasan: bad access detected
[   23.790196] 
[   23.791672] Memory state around the buggy address:
[   23.796451]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.803655]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.810860] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.818061]                                                           ^
[   23.824661]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.831866]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.839067] ==================================================================
[   24.621849] ==================================================================
[   24.631768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.639317] Write of size 1 at addr ffff0008032a60c9 by task kunit_try_catch/209
[   24.646696] 
[   24.648179] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.648234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.648250] Hardware name: WinLink E850-96 board (DT)
[   24.648269] Call trace:
[   24.648283]  show_stack+0x20/0x38 (C)
[   24.648320]  dump_stack_lvl+0x8c/0xd0
[   24.648356]  print_report+0x118/0x608
[   24.648393]  kasan_report+0xdc/0x128
[   24.648428]  __asan_report_store1_noabort+0x20/0x30
[   24.648459]  krealloc_less_oob_helper+0xa48/0xc50
[   24.648495]  krealloc_large_less_oob+0x20/0x38
[   24.648527]  kunit_try_run_case+0x170/0x3f0
[   24.648563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.648600]  kthread+0x328/0x630
[   24.648631]  ret_from_fork+0x10/0x20
[   24.648665] 
[   24.716054] The buggy address belongs to the physical page:
[   24.721609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   24.729595] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.737234] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.744176] page_type: f8(unknown)
[   24.747572] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.755294] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.763019] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.770831] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.778644] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   24.786456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.794261] page dumped because: kasan: bad access detected
[   24.799817] 
[   24.801292] Memory state around the buggy address:
[   24.806077]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.813275]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.820480] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.827680]                                               ^
[   24.833240]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.840445]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.847647] ==================================================================

[   25.062020] ==================================================================
[   25.062113] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   25.062216] Write of size 1 at addr fff00000c64be0d0 by task kunit_try_catch/162
[   25.062329] 
[   25.062391] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.062575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.062637] Hardware name: linux,dummy-virt (DT)
[   25.062709] Call trace:
[   25.062768]  show_stack+0x20/0x38 (C)
[   25.063022]  dump_stack_lvl+0x8c/0xd0
[   25.063161]  print_report+0x118/0x608
[   25.063322]  kasan_report+0xdc/0x128
[   25.063463]  __asan_report_store1_noabort+0x20/0x30
[   25.063605]  krealloc_less_oob_helper+0xb9c/0xc50
[   25.063736]  krealloc_large_less_oob+0x20/0x38
[   25.064103]  kunit_try_run_case+0x170/0x3f0
[   25.064241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.064379]  kthread+0x328/0x630
[   25.064503]  ret_from_fork+0x10/0x20
[   25.064719] 
[   25.064768] The buggy address belongs to the physical page:
[   25.064889] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064bc
[   25.065040] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.065172] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.065311] page_type: f8(unknown)
[   25.065420] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.065676] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.065810] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.065927] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.066058] head: 0bfffe0000000002 ffffc1ffc3192f01 00000000ffffffff 00000000ffffffff
[   25.066175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.066341] page dumped because: kasan: bad access detected
[   25.066452] 
[   25.066541] Memory state around the buggy address:
[   25.066712]  fff00000c64bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.066818]  fff00000c64be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.066951] >fff00000c64be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.067155]                                                  ^
[   25.067344]  fff00000c64be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.067522]  fff00000c64be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.067753] ==================================================================
[   24.952291] ==================================================================
[   24.952388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   24.952493] Write of size 1 at addr fff00000c178bcda by task kunit_try_catch/158
[   24.952606] 
[   24.952669] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.952851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.952916] Hardware name: linux,dummy-virt (DT)
[   24.953520] Call trace:
[   24.953581]  show_stack+0x20/0x38 (C)
[   24.953962]  dump_stack_lvl+0x8c/0xd0
[   24.954888]  print_report+0x118/0x608
[   24.955778]  kasan_report+0xdc/0x128
[   24.955915]  __asan_report_store1_noabort+0x20/0x30
[   24.956958]  krealloc_less_oob_helper+0xa80/0xc50
[   24.957778]  krealloc_less_oob+0x20/0x38
[   24.958116]  kunit_try_run_case+0x170/0x3f0
[   24.958961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.959136]  kthread+0x328/0x630
[   24.959270]  ret_from_fork+0x10/0x20
[   24.959395] 
[   24.959441] Allocated by task 158:
[   24.959578]  kasan_save_stack+0x3c/0x68
[   24.959818]  kasan_save_track+0x20/0x40
[   24.960684]  kasan_save_alloc_info+0x40/0x58
[   24.960828]  __kasan_krealloc+0x118/0x178
[   24.960925]  krealloc_noprof+0x128/0x360
[   24.961399]  krealloc_less_oob_helper+0x168/0xc50
[   24.961920]  krealloc_less_oob+0x20/0x38
[   24.962302]  kunit_try_run_case+0x170/0x3f0
[   24.962612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.963092]  kthread+0x328/0x630
[   24.963206]  ret_from_fork+0x10/0x20
[   24.963311] 
[   24.963363] The buggy address belongs to the object at fff00000c178bc00
[   24.963363]  which belongs to the cache kmalloc-256 of size 256
[   24.963507] The buggy address is located 17 bytes to the right of
[   24.963507]  allocated 201-byte region [fff00000c178bc00, fff00000c178bcc9)
[   24.963797] 
[   24.964980] The buggy address belongs to the physical page:
[   24.965066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a
[   24.965199] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.965375] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.965500] page_type: f5(slab)
[   24.965588] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.965705] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.965891] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.966047] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.966306] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff
[   24.966576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.966675] page dumped because: kasan: bad access detected
[   24.966748] 
[   24.966825] Memory state around the buggy address:
[   24.966993]  fff00000c178bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.967113]  fff00000c178bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.967250] >fff00000c178bc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.967359]                                                     ^
[   24.967461]  fff00000c178bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.967579]  fff00000c178bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.967750] ==================================================================
[   25.069635] ==================================================================
[   25.069731] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   25.069838] Write of size 1 at addr fff00000c64be0da by task kunit_try_catch/162
[   25.070172] 
[   25.070260] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.070469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.070542] Hardware name: linux,dummy-virt (DT)
[   25.070730] Call trace:
[   25.070792]  show_stack+0x20/0x38 (C)
[   25.070965]  dump_stack_lvl+0x8c/0xd0
[   25.071111]  print_report+0x118/0x608
[   25.071353]  kasan_report+0xdc/0x128
[   25.071600]  __asan_report_store1_noabort+0x20/0x30
[   25.071744]  krealloc_less_oob_helper+0xa80/0xc50
[   25.072215]  krealloc_large_less_oob+0x20/0x38
[   25.072699]  kunit_try_run_case+0x170/0x3f0
[   25.073430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.073711]  kthread+0x328/0x630
[   25.074223]  ret_from_fork+0x10/0x20
[   25.074675] 
[   25.074845] The buggy address belongs to the physical page:
[   25.075024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064bc
[   25.075385] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.075517] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.075646] page_type: f8(unknown)
[   25.075738] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.075865] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.077244] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.077397] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.077790] head: 0bfffe0000000002 ffffc1ffc3192f01 00000000ffffffff 00000000ffffffff
[   25.078623] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.078727] page dumped because: kasan: bad access detected
[   25.079147] 
[   25.079345] Memory state around the buggy address:
[   25.079422]  fff00000c64bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.080156]  fff00000c64be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.080276] >fff00000c64be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.080377]                                                     ^
[   25.080476]  fff00000c64be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.080590]  fff00000c64be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.081413] ==================================================================
[   24.969130] ==================================================================
[   24.969293] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   24.969530] Write of size 1 at addr fff00000c178bcea by task kunit_try_catch/158
[   24.969734] 
[   24.969821] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.970039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.970283] Hardware name: linux,dummy-virt (DT)
[   24.970377] Call trace:
[   24.970580]  show_stack+0x20/0x38 (C)
[   24.970769]  dump_stack_lvl+0x8c/0xd0
[   24.970909]  print_report+0x118/0x608
[   24.971055]  kasan_report+0xdc/0x128
[   24.971351]  __asan_report_store1_noabort+0x20/0x30
[   24.971515]  krealloc_less_oob_helper+0xae4/0xc50
[   24.971647]  krealloc_less_oob+0x20/0x38
[   24.971972]  kunit_try_run_case+0x170/0x3f0
[   24.972136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.972367]  kthread+0x328/0x630
[   24.972551]  ret_from_fork+0x10/0x20
[   24.972829] 
[   24.973114] Allocated by task 158:
[   24.973190]  kasan_save_stack+0x3c/0x68
[   24.973287]  kasan_save_track+0x20/0x40
[   24.974034]  kasan_save_alloc_info+0x40/0x58
[   24.974167]  __kasan_krealloc+0x118/0x178
[   24.974283]  krealloc_noprof+0x128/0x360
[   24.974389]  krealloc_less_oob_helper+0x168/0xc50
[   24.974919]  krealloc_less_oob+0x20/0x38
[   24.975140]  kunit_try_run_case+0x170/0x3f0
[   24.975252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.975767]  kthread+0x328/0x630
[   24.975886]  ret_from_fork+0x10/0x20
[   24.976006] 
[   24.976053] The buggy address belongs to the object at fff00000c178bc00
[   24.976053]  which belongs to the cache kmalloc-256 of size 256
[   24.976515] The buggy address is located 33 bytes to the right of
[   24.976515]  allocated 201-byte region [fff00000c178bc00, fff00000c178bcc9)
[   24.976670] 
[   24.976716] The buggy address belongs to the physical page:
[   24.976784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a
[   24.976907] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.977285] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.977831] page_type: f5(slab)
[   24.977965] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.978106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.978955] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.979256] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.979608] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff
[   24.979928] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.980218] page dumped because: kasan: bad access detected
[   24.980295] 
[   24.980896] Memory state around the buggy address:
[   24.981051]  fff00000c178bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.981251]  fff00000c178bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.981593] >fff00000c178bc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.981689]                                                           ^
[   24.982059]  fff00000c178bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.982320]  fff00000c178bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.982611] ==================================================================
[   24.984804] ==================================================================
[   24.984903] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   24.985027] Write of size 1 at addr fff00000c178bceb by task kunit_try_catch/158
[   24.985142] 
[   24.985208] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.985393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.985454] Hardware name: linux,dummy-virt (DT)
[   24.986234] Call trace:
[   24.986305]  show_stack+0x20/0x38 (C)
[   24.986535]  dump_stack_lvl+0x8c/0xd0
[   24.986787]  print_report+0x118/0x608
[   24.987558]  kasan_report+0xdc/0x128
[   24.987774]  __asan_report_store1_noabort+0x20/0x30
[   24.988636]  krealloc_less_oob_helper+0xa58/0xc50
[   24.988820]  krealloc_less_oob+0x20/0x38
[   24.989387]  kunit_try_run_case+0x170/0x3f0
[   24.989621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.990020]  kthread+0x328/0x630
[   24.990641]  ret_from_fork+0x10/0x20
[   24.991090] 
[   24.991285] Allocated by task 158:
[   24.991362]  kasan_save_stack+0x3c/0x68
[   24.991664]  kasan_save_track+0x20/0x40
[   24.991800]  kasan_save_alloc_info+0x40/0x58
[   24.992097]  __kasan_krealloc+0x118/0x178
[   24.992231]  krealloc_noprof+0x128/0x360
[   24.992330]  krealloc_less_oob_helper+0x168/0xc50
[   24.992426]  krealloc_less_oob+0x20/0x38
[   24.992513]  kunit_try_run_case+0x170/0x3f0
[   24.992606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.992712]  kthread+0x328/0x630
[   24.992792]  ret_from_fork+0x10/0x20
[   24.992877] 
[   24.992922] The buggy address belongs to the object at fff00000c178bc00
[   24.992922]  which belongs to the cache kmalloc-256 of size 256
[   24.993269] The buggy address is located 34 bytes to the right of
[   24.993269]  allocated 201-byte region [fff00000c178bc00, fff00000c178bcc9)
[   24.993423] 
[   24.993527] The buggy address belongs to the physical page:
[   24.993719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a
[   24.993990] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.994121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.994296] page_type: f5(slab)
[   24.994407] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.994544] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.994697] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.994916] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.995095] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff
[   24.995258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.995668] page dumped because: kasan: bad access detected
[   24.995795] 
[   24.996092] Memory state around the buggy address:
[   24.996651]  fff00000c178bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.997283]  fff00000c178bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.997744] >fff00000c178bc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.997862]                                                           ^
[   24.997972]  fff00000c178bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.998074]  fff00000c178bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.998164] ==================================================================
[   25.096187] ==================================================================
[   25.096913] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.097071] Write of size 1 at addr fff00000c64be0eb by task kunit_try_catch/162
[   25.097366] 
[   25.097448] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.097634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.097696] Hardware name: linux,dummy-virt (DT)
[   25.097763] Call trace:
[   25.097810]  show_stack+0x20/0x38 (C)
[   25.097948]  dump_stack_lvl+0x8c/0xd0
[   25.098070]  print_report+0x118/0x608
[   25.098190]  kasan_report+0xdc/0x128
[   25.098307]  __asan_report_store1_noabort+0x20/0x30
[   25.098424]  krealloc_less_oob_helper+0xa58/0xc50
[   25.098540]  krealloc_large_less_oob+0x20/0x38
[   25.098654]  kunit_try_run_case+0x170/0x3f0
[   25.098770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.099959]  kthread+0x328/0x630
[   25.100094]  ret_from_fork+0x10/0x20
[   25.100222] 
[   25.100276] The buggy address belongs to the physical page:
[   25.100351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064bc
[   25.100478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.100593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.100709] page_type: f8(unknown)
[   25.100797] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.100913] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.101063] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.101198] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.101333] head: 0bfffe0000000002 ffffc1ffc3192f01 00000000ffffffff 00000000ffffffff
[   25.101461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.101553] page dumped because: kasan: bad access detected
[   25.101624] 
[   25.101667] Memory state around the buggy address:
[   25.101735]  fff00000c64bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.101838]  fff00000c64be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.101969] >fff00000c64be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.102064]                                                           ^
[   25.102157]  fff00000c64be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.102254]  fff00000c64be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.107203] ==================================================================
[   25.086124] ==================================================================
[   25.086325] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.086452] Write of size 1 at addr fff00000c64be0ea by task kunit_try_catch/162
[   25.086583] 
[   25.086650] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.087448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.087658] Hardware name: linux,dummy-virt (DT)
[   25.087717] Call trace:
[   25.087744]  show_stack+0x20/0x38 (C)
[   25.087814]  dump_stack_lvl+0x8c/0xd0
[   25.087878]  print_report+0x118/0x608
[   25.087972]  kasan_report+0xdc/0x128
[   25.088109]  __asan_report_store1_noabort+0x20/0x30
[   25.088200]  krealloc_less_oob_helper+0xae4/0xc50
[   25.088264]  krealloc_large_less_oob+0x20/0x38
[   25.088382]  kunit_try_run_case+0x170/0x3f0
[   25.088516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.088659]  kthread+0x328/0x630
[   25.088860]  ret_from_fork+0x10/0x20
[   25.089147] 
[   25.089202] The buggy address belongs to the physical page:
[   25.089330] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064bc
[   25.089568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.089905] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.090106] page_type: f8(unknown)
[   25.090217] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.090510] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.090705] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.091009] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.091314] head: 0bfffe0000000002 ffffc1ffc3192f01 00000000ffffffff 00000000ffffffff
[   25.091474] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.091584] page dumped because: kasan: bad access detected
[   25.092005] 
[   25.092051] Memory state around the buggy address:
[   25.092497]  fff00000c64bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.092656]  fff00000c64be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.092967] >fff00000c64be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.093421]                                                           ^
[   25.093576]  fff00000c64be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.094048]  fff00000c64be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.094169] ==================================================================
[   24.931803] ==================================================================
[   24.932533] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.933272] Write of size 1 at addr fff00000c178bcd0 by task kunit_try_catch/158
[   24.933674] 
[   24.933899] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.934797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.935051] Hardware name: linux,dummy-virt (DT)
[   24.935127] Call trace:
[   24.935423]  show_stack+0x20/0x38 (C)
[   24.935923]  dump_stack_lvl+0x8c/0xd0
[   24.936068]  print_report+0x118/0x608
[   24.936513]  kasan_report+0xdc/0x128
[   24.936921]  __asan_report_store1_noabort+0x20/0x30
[   24.937687]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.938586]  krealloc_less_oob+0x20/0x38
[   24.939229]  kunit_try_run_case+0x170/0x3f0
[   24.939371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.939512]  kthread+0x328/0x630
[   24.939784]  ret_from_fork+0x10/0x20
[   24.940101] 
[   24.940236] Allocated by task 158:
[   24.940315]  kasan_save_stack+0x3c/0x68
[   24.940415]  kasan_save_track+0x20/0x40
[   24.940503]  kasan_save_alloc_info+0x40/0x58
[   24.940597]  __kasan_krealloc+0x118/0x178
[   24.940686]  krealloc_noprof+0x128/0x360
[   24.940860]  krealloc_less_oob_helper+0x168/0xc50
[   24.941154]  krealloc_less_oob+0x20/0x38
[   24.941270]  kunit_try_run_case+0x170/0x3f0
[   24.941922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.942109]  kthread+0x328/0x630
[   24.942653]  ret_from_fork+0x10/0x20
[   24.942765] 
[   24.942838] The buggy address belongs to the object at fff00000c178bc00
[   24.942838]  which belongs to the cache kmalloc-256 of size 256
[   24.943003] The buggy address is located 7 bytes to the right of
[   24.943003]  allocated 201-byte region [fff00000c178bc00, fff00000c178bcc9)
[   24.943646] 
[   24.943699] The buggy address belongs to the physical page:
[   24.944009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a
[   24.944167] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.944389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.944965] page_type: f5(slab)
[   24.945062] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.945640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.945797] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.946340] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.946759] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff
[   24.946980] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.947102] page dumped because: kasan: bad access detected
[   24.947713] 
[   24.947769] Memory state around the buggy address:
[   24.947854]  fff00000c178bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.948443]  fff00000c178bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.949018] >fff00000c178bc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.949246]                                                  ^
[   24.949339]  fff00000c178bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.950060]  fff00000c178bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.950156] ==================================================================
[   25.053106] ==================================================================
[   25.053956] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   25.054214] Write of size 1 at addr fff00000c64be0c9 by task kunit_try_catch/162
[   25.054772] 
[   25.054879] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.055187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.055300] Hardware name: linux,dummy-virt (DT)
[   25.055503] Call trace:
[   25.055735]  show_stack+0x20/0x38 (C)
[   25.055896]  dump_stack_lvl+0x8c/0xd0
[   25.056044]  print_report+0x118/0x608
[   25.056174]  kasan_report+0xdc/0x128
[   25.056299]  __asan_report_store1_noabort+0x20/0x30
[   25.056473]  krealloc_less_oob_helper+0xa48/0xc50
[   25.056645]  krealloc_large_less_oob+0x20/0x38
[   25.056830]  kunit_try_run_case+0x170/0x3f0
[   25.057203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.057381]  kthread+0x328/0x630
[   25.057653]  ret_from_fork+0x10/0x20
[   25.057806] 
[   25.057922] The buggy address belongs to the physical page:
[   25.058020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064bc
[   25.058166] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.058300] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.058445] page_type: f8(unknown)
[   25.058562] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.058698] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.058847] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.059177] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.059301] head: 0bfffe0000000002 ffffc1ffc3192f01 00000000ffffffff 00000000ffffffff
[   25.059420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.059516] page dumped because: kasan: bad access detected
[   25.059592] 
[   25.059642] Memory state around the buggy address:
[   25.059724]  fff00000c64bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.059832]  fff00000c64be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.059970] >fff00000c64be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.060082]                                               ^
[   25.060182]  fff00000c64be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.060300]  fff00000c64be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.060470] ==================================================================
[   24.913397] ==================================================================
[   24.913516] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.913658] Write of size 1 at addr fff00000c178bcc9 by task kunit_try_catch/158
[   24.913782] 
[   24.913866] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.914078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.914147] Hardware name: linux,dummy-virt (DT)
[   24.914228] Call trace:
[   24.914290]  show_stack+0x20/0x38 (C)
[   24.914625]  dump_stack_lvl+0x8c/0xd0
[   24.914758]  print_report+0x118/0x608
[   24.914896]  kasan_report+0xdc/0x128
[   24.915037]  __asan_report_store1_noabort+0x20/0x30
[   24.915191]  krealloc_less_oob_helper+0xa48/0xc50
[   24.915444]  krealloc_less_oob+0x20/0x38
[   24.915589]  kunit_try_run_case+0x170/0x3f0
[   24.915724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.915865]  kthread+0x328/0x630
[   24.916537]  ret_from_fork+0x10/0x20
[   24.917583] 
[   24.917631] Allocated by task 158:
[   24.917702]  kasan_save_stack+0x3c/0x68
[   24.918610]  kasan_save_track+0x20/0x40
[   24.919091]  kasan_save_alloc_info+0x40/0x58
[   24.919356]  __kasan_krealloc+0x118/0x178
[   24.919672]  krealloc_noprof+0x128/0x360
[   24.919803]  krealloc_less_oob_helper+0x168/0xc50
[   24.919918]  krealloc_less_oob+0x20/0x38
[   24.920526]  kunit_try_run_case+0x170/0x3f0
[   24.921006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.921150]  kthread+0x328/0x630
[   24.921276]  ret_from_fork+0x10/0x20
[   24.921372] 
[   24.921811] The buggy address belongs to the object at fff00000c178bc00
[   24.921811]  which belongs to the cache kmalloc-256 of size 256
[   24.921995] The buggy address is located 0 bytes to the right of
[   24.921995]  allocated 201-byte region [fff00000c178bc00, fff00000c178bcc9)
[   24.922147] 
[   24.922199] The buggy address belongs to the physical page:
[   24.922652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a
[   24.923141] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.923552] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.923713] page_type: f5(slab)
[   24.923812] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.924392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.924700] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.924839] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.925552] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff
[   24.925704] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.926038] page dumped because: kasan: bad access detected
[   24.926117] 
[   24.926162] Memory state around the buggy address:
[   24.926234]  fff00000c178bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.926745]  fff00000c178bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.926884] >fff00000c178bc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.927395]                                               ^
[   24.927776]  fff00000c178bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.928267]  fff00000c178bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.928629] ==================================================================

[   25.188474] ==================================================================
[   25.188642] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   25.188783] Write of size 1 at addr fff00000c17ed4da by task kunit_try_catch/158
[   25.188919] 
[   25.188994] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.189243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.189316] Hardware name: linux,dummy-virt (DT)
[   25.189431] Call trace:
[   25.189616]  show_stack+0x20/0x38 (C)
[   25.189929]  dump_stack_lvl+0x8c/0xd0
[   25.190094]  print_report+0x118/0x608
[   25.190424]  kasan_report+0xdc/0x128
[   25.190623]  __asan_report_store1_noabort+0x20/0x30
[   25.190751]  krealloc_less_oob_helper+0xa80/0xc50
[   25.190948]  krealloc_less_oob+0x20/0x38
[   25.191289]  kunit_try_run_case+0x170/0x3f0
[   25.191412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.191550]  kthread+0x328/0x630
[   25.191828]  ret_from_fork+0x10/0x20
[   25.192127] 
[   25.192180] Allocated by task 158:
[   25.192259]  kasan_save_stack+0x3c/0x68
[   25.192372]  kasan_save_track+0x20/0x40
[   25.192472]  kasan_save_alloc_info+0x40/0x58
[   25.192573]  __kasan_krealloc+0x118/0x178
[   25.192667]  krealloc_noprof+0x128/0x360
[   25.192781]  krealloc_less_oob_helper+0x168/0xc50
[   25.192922]  krealloc_less_oob+0x20/0x38
[   25.193135]  kunit_try_run_case+0x170/0x3f0
[   25.193324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.193446]  kthread+0x328/0x630
[   25.193604]  ret_from_fork+0x10/0x20
[   25.193815] 
[   25.193879] The buggy address belongs to the object at fff00000c17ed400
[   25.193879]  which belongs to the cache kmalloc-256 of size 256
[   25.194070] The buggy address is located 17 bytes to the right of
[   25.194070]  allocated 201-byte region [fff00000c17ed400, fff00000c17ed4c9)
[   25.194273] 
[   25.194326] The buggy address belongs to the physical page:
[   25.194397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec
[   25.194535] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.194740] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.195184] page_type: f5(slab)
[   25.195475] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.195925] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.196658] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.196868] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.197312] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff
[   25.197442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.197606] page dumped because: kasan: bad access detected
[   25.197686] 
[   25.197728] Memory state around the buggy address:
[   25.197799]  fff00000c17ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.197921]  fff00000c17ed400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.198022] >fff00000c17ed480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.198140]                                                     ^
[   25.198231]  fff00000c17ed500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.198331]  fff00000c17ed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.198489] ==================================================================
[   25.155177] ==================================================================
[   25.155302] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   25.155427] Write of size 1 at addr fff00000c17ed4c9 by task kunit_try_catch/158
[   25.155542] 
[   25.157517] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.157855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.158063] Hardware name: linux,dummy-virt (DT)
[   25.158177] Call trace:
[   25.158230]  show_stack+0x20/0x38 (C)
[   25.158451]  dump_stack_lvl+0x8c/0xd0
[   25.158611]  print_report+0x118/0x608
[   25.158749]  kasan_report+0xdc/0x128
[   25.158947]  __asan_report_store1_noabort+0x20/0x30
[   25.159080]  krealloc_less_oob_helper+0xa48/0xc50
[   25.159207]  krealloc_less_oob+0x20/0x38
[   25.159333]  kunit_try_run_case+0x170/0x3f0
[   25.159534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.159816]  kthread+0x328/0x630
[   25.160043]  ret_from_fork+0x10/0x20
[   25.160173] 
[   25.160305] Allocated by task 158:
[   25.160377]  kasan_save_stack+0x3c/0x68
[   25.160471]  kasan_save_track+0x20/0x40
[   25.160601]  kasan_save_alloc_info+0x40/0x58
[   25.160701]  __kasan_krealloc+0x118/0x178
[   25.160973]  krealloc_noprof+0x128/0x360
[   25.161173]  krealloc_less_oob_helper+0x168/0xc50
[   25.161276]  krealloc_less_oob+0x20/0x38
[   25.161416]  kunit_try_run_case+0x170/0x3f0
[   25.161528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.161647]  kthread+0x328/0x630
[   25.161788]  ret_from_fork+0x10/0x20
[   25.161990] 
[   25.162078] The buggy address belongs to the object at fff00000c17ed400
[   25.162078]  which belongs to the cache kmalloc-256 of size 256
[   25.162343] The buggy address is located 0 bytes to the right of
[   25.162343]  allocated 201-byte region [fff00000c17ed400, fff00000c17ed4c9)
[   25.162635] 
[   25.162690] The buggy address belongs to the physical page:
[   25.162796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec
[   25.162957] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.163287] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.163449] page_type: f5(slab)
[   25.163554] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.163673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.163817] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.163973] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.164146] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff
[   25.164312] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.164415] page dumped because: kasan: bad access detected
[   25.164496] 
[   25.164584] Memory state around the buggy address:
[   25.164702]  fff00000c17ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.164892]  fff00000c17ed400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.165011] >fff00000c17ed480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.165157]                                               ^
[   25.165251]  fff00000c17ed500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.165366]  fff00000c17ed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.165466] ==================================================================
[   25.314353] ==================================================================
[   25.314446] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.314571] Write of size 1 at addr fff00000c65020ea by task kunit_try_catch/162
[   25.314688] 
[   25.315137] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.315360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.315424] Hardware name: linux,dummy-virt (DT)
[   25.315493] Call trace:
[   25.315540]  show_stack+0x20/0x38 (C)
[   25.315655]  dump_stack_lvl+0x8c/0xd0
[   25.315771]  print_report+0x118/0x608
[   25.315918]  kasan_report+0xdc/0x128
[   25.316031]  __asan_report_store1_noabort+0x20/0x30
[   25.316147]  krealloc_less_oob_helper+0xae4/0xc50
[   25.316264]  krealloc_large_less_oob+0x20/0x38
[   25.316442]  kunit_try_run_case+0x170/0x3f0
[   25.316564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.316692]  kthread+0x328/0x630
[   25.316799]  ret_from_fork+0x10/0x20
[   25.317264] 
[   25.317425] The buggy address belongs to the physical page:
[   25.317507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500
[   25.318818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.318977] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.319113] page_type: f8(unknown)
[   25.319747] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.319895] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.320436] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.320806] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.321160] head: 0bfffe0000000002 ffffc1ffc3194001 00000000ffffffff 00000000ffffffff
[   25.321298] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.321399] page dumped because: kasan: bad access detected
[   25.321771] 
[   25.321826] Memory state around the buggy address:
[   25.321928]  fff00000c6501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.322057]  fff00000c6502000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.322250] >fff00000c6502080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.322750]                                                           ^
[   25.323241]  fff00000c6502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.323377]  fff00000c6502180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.323496] ==================================================================
[   25.294335] ==================================================================
[   25.294428] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   25.294543] Write of size 1 at addr fff00000c65020d0 by task kunit_try_catch/162
[   25.294656] 
[   25.294722] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.294923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.294984] Hardware name: linux,dummy-virt (DT)
[   25.295049] Call trace:
[   25.295094]  show_stack+0x20/0x38 (C)
[   25.295211]  dump_stack_lvl+0x8c/0xd0
[   25.295323]  print_report+0x118/0x608
[   25.295438]  kasan_report+0xdc/0x128
[   25.295556]  __asan_report_store1_noabort+0x20/0x30
[   25.295685]  krealloc_less_oob_helper+0xb9c/0xc50
[   25.299002]  krealloc_large_less_oob+0x20/0x38
[   25.299134]  kunit_try_run_case+0x170/0x3f0
[   25.299248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.299372]  kthread+0x328/0x630
[   25.299472]  ret_from_fork+0x10/0x20
[   25.299581] 
[   25.299625] The buggy address belongs to the physical page:
[   25.299695] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500
[   25.299828] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.299958] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.300089] page_type: f8(unknown)
[   25.300191] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.300314] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.300442] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.300563] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.300686] head: 0bfffe0000000002 ffffc1ffc3194001 00000000ffffffff 00000000ffffffff
[   25.300805] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.303229] page dumped because: kasan: bad access detected
[   25.303320] 
[   25.303385] Memory state around the buggy address:
[   25.303469]  fff00000c6501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.303682]  fff00000c6502000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.303932] >fff00000c6502080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.304163]                                                  ^
[   25.304353]  fff00000c6502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.304518]  fff00000c6502180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.304611] ==================================================================
[   25.305745] ==================================================================
[   25.305876] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   25.306158] Write of size 1 at addr fff00000c65020da by task kunit_try_catch/162
[   25.306278] 
[   25.306341] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.306531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.306624] Hardware name: linux,dummy-virt (DT)
[   25.306739] Call trace:
[   25.306801]  show_stack+0x20/0x38 (C)
[   25.306974]  dump_stack_lvl+0x8c/0xd0
[   25.307107]  print_report+0x118/0x608
[   25.307242]  kasan_report+0xdc/0x128
[   25.307364]  __asan_report_store1_noabort+0x20/0x30
[   25.307659]  krealloc_less_oob_helper+0xa80/0xc50
[   25.307963]  krealloc_large_less_oob+0x20/0x38
[   25.308099]  kunit_try_run_case+0x170/0x3f0
[   25.308222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.308349]  kthread+0x328/0x630
[   25.308466]  ret_from_fork+0x10/0x20
[   25.308679] 
[   25.308766] The buggy address belongs to the physical page:
[   25.308934] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500
[   25.309076] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.309198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.309332] page_type: f8(unknown)
[   25.309436] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.309569] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.309694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.309810] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.310358] head: 0bfffe0000000002 ffffc1ffc3194001 00000000ffffffff 00000000ffffffff
[   25.311050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.311175] page dumped because: kasan: bad access detected
[   25.311294] 
[   25.311342] Memory state around the buggy address:
[   25.311417]  fff00000c6501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.311547]  fff00000c6502000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.311679] >fff00000c6502080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.311879]                                                     ^
[   25.311986]  fff00000c6502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.312104]  fff00000c6502180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.312193] ==================================================================
[   25.214527] ==================================================================
[   25.214619] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.214735] Write of size 1 at addr fff00000c17ed4eb by task kunit_try_catch/158
[   25.215135] 
[   25.215313] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.215563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.215625] Hardware name: linux,dummy-virt (DT)
[   25.215695] Call trace:
[   25.215753]  show_stack+0x20/0x38 (C)
[   25.216530]  dump_stack_lvl+0x8c/0xd0
[   25.217236]  print_report+0x118/0x608
[   25.217450]  kasan_report+0xdc/0x128
[   25.217595]  __asan_report_store1_noabort+0x20/0x30
[   25.217770]  krealloc_less_oob_helper+0xa58/0xc50
[   25.217982]  krealloc_less_oob+0x20/0x38
[   25.218177]  kunit_try_run_case+0x170/0x3f0
[   25.218637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.218797]  kthread+0x328/0x630
[   25.218951]  ret_from_fork+0x10/0x20
[   25.219090] 
[   25.219144] Allocated by task 158:
[   25.219222]  kasan_save_stack+0x3c/0x68
[   25.220138]  kasan_save_track+0x20/0x40
[   25.220256]  kasan_save_alloc_info+0x40/0x58
[   25.220366]  __kasan_krealloc+0x118/0x178
[   25.220513]  krealloc_noprof+0x128/0x360
[   25.220774]  krealloc_less_oob_helper+0x168/0xc50
[   25.221353]  krealloc_less_oob+0x20/0x38
[   25.221467]  kunit_try_run_case+0x170/0x3f0
[   25.221720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.221830]  kthread+0x328/0x630
[   25.222238]  ret_from_fork+0x10/0x20
[   25.222381] 
[   25.222517] The buggy address belongs to the object at fff00000c17ed400
[   25.222517]  which belongs to the cache kmalloc-256 of size 256
[   25.223129] The buggy address is located 34 bytes to the right of
[   25.223129]  allocated 201-byte region [fff00000c17ed400, fff00000c17ed4c9)
[   25.223286] 
[   25.223335] The buggy address belongs to the physical page:
[   25.223407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec
[   25.224398] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.224892] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.225393] page_type: f5(slab)
[   25.225496] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.225876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.226938] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.227066] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.227186] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff
[   25.228221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.228357] page dumped because: kasan: bad access detected
[   25.228722] 
[   25.228801] Memory state around the buggy address:
[   25.228894]  fff00000c17ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.228997]  fff00000c17ed400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.229115] >fff00000c17ed480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.229981]                                                           ^
[   25.230123]  fff00000c17ed500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.230242]  fff00000c17ed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.230411] ==================================================================
[   25.283273] ==================================================================
[   25.283383] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   25.283492] Write of size 1 at addr fff00000c65020c9 by task kunit_try_catch/162
[   25.283608] 
[   25.284212] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.284625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.284704] Hardware name: linux,dummy-virt (DT)
[   25.284910] Call trace:
[   25.285050]  show_stack+0x20/0x38 (C)
[   25.285185]  dump_stack_lvl+0x8c/0xd0
[   25.285303]  print_report+0x118/0x608
[   25.285416]  kasan_report+0xdc/0x128
[   25.285526]  __asan_report_store1_noabort+0x20/0x30
[   25.285643]  krealloc_less_oob_helper+0xa48/0xc50
[   25.285764]  krealloc_large_less_oob+0x20/0x38
[   25.285906]  kunit_try_run_case+0x170/0x3f0
[   25.286427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.286588]  kthread+0x328/0x630
[   25.287263]  ret_from_fork+0x10/0x20
[   25.287859] 
[   25.288150] The buggy address belongs to the physical page:
[   25.288275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500
[   25.288530] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.288814] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.289013] page_type: f8(unknown)
[   25.289115] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.289234] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.289353] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.289485] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.289613] head: 0bfffe0000000002 ffffc1ffc3194001 00000000ffffffff 00000000ffffffff
[   25.289732] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.289827] page dumped because: kasan: bad access detected
[   25.289926] 
[   25.289970] Memory state around the buggy address:
[   25.290043]  fff00000c6501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.290144]  fff00000c6502000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.290251] >fff00000c6502080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.290349]                                               ^
[   25.290440]  fff00000c6502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.290548]  fff00000c6502180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.290643] ==================================================================
[   25.166739] ==================================================================
[   25.166829] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   25.166984] Write of size 1 at addr fff00000c17ed4d0 by task kunit_try_catch/158
[   25.167157] 
[   25.167234] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.167445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.167557] Hardware name: linux,dummy-virt (DT)
[   25.167673] Call trace:
[   25.167737]  show_stack+0x20/0x38 (C)
[   25.167900]  dump_stack_lvl+0x8c/0xd0
[   25.168091]  print_report+0x118/0x608
[   25.168362]  kasan_report+0xdc/0x128
[   25.168645]  __asan_report_store1_noabort+0x20/0x30
[   25.168792]  krealloc_less_oob_helper+0xb9c/0xc50
[   25.168934]  krealloc_less_oob+0x20/0x38
[   25.171156]  kunit_try_run_case+0x170/0x3f0
[   25.171314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.171691]  kthread+0x328/0x630
[   25.172229]  ret_from_fork+0x10/0x20
[   25.172348] 
[   25.172392] Allocated by task 158:
[   25.172465]  kasan_save_stack+0x3c/0x68
[   25.172568]  kasan_save_track+0x20/0x40
[   25.174522]  kasan_save_alloc_info+0x40/0x58
[   25.174664]  __kasan_krealloc+0x118/0x178
[   25.175411]  krealloc_noprof+0x128/0x360
[   25.175989]  krealloc_less_oob_helper+0x168/0xc50
[   25.176538]  krealloc_less_oob+0x20/0x38
[   25.177522]  kunit_try_run_case+0x170/0x3f0
[   25.177661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.177872]  kthread+0x328/0x630
[   25.178458]  ret_from_fork+0x10/0x20
[   25.178588] 
[   25.178730] The buggy address belongs to the object at fff00000c17ed400
[   25.178730]  which belongs to the cache kmalloc-256 of size 256
[   25.178961] The buggy address is located 7 bytes to the right of
[   25.178961]  allocated 201-byte region [fff00000c17ed400, fff00000c17ed4c9)
[   25.179349] 
[   25.179774] The buggy address belongs to the physical page:
[   25.180040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec
[   25.180279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.180700] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.181378] page_type: f5(slab)
[   25.181491] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.181758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.182255] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.182412] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.183292] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff
[   25.183756] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.183960] page dumped because: kasan: bad access detected
[   25.184035] 
[   25.184078] Memory state around the buggy address:
[   25.184647]  fff00000c17ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.184753]  fff00000c17ed400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.185278] >fff00000c17ed480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.185454]                                                  ^
[   25.185559]  fff00000c17ed500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.185675]  fff00000c17ed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.185866] ==================================================================
[   25.326452] ==================================================================
[   25.326562] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.326677] Write of size 1 at addr fff00000c65020eb by task kunit_try_catch/162
[   25.326780] 
[   25.326860] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.327706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.327791] Hardware name: linux,dummy-virt (DT)
[   25.327892] Call trace:
[   25.328215]  show_stack+0x20/0x38 (C)
[   25.328469]  dump_stack_lvl+0x8c/0xd0
[   25.329053]  print_report+0x118/0x608
[   25.329889]  kasan_report+0xdc/0x128
[   25.330053]  __asan_report_store1_noabort+0x20/0x30
[   25.330709]  krealloc_less_oob_helper+0xa58/0xc50
[   25.331278]  krealloc_large_less_oob+0x20/0x38
[   25.331390]  kunit_try_run_case+0x170/0x3f0
[   25.331920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.332442]  kthread+0x328/0x630
[   25.332590]  ret_from_fork+0x10/0x20
[   25.332707] 
[   25.332754] The buggy address belongs to the physical page:
[   25.332825] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500
[   25.332967] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.333089] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.334144] page_type: f8(unknown)
[   25.334280] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.334422] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.334560] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.334693] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.334906] head: 0bfffe0000000002 ffffc1ffc3194001 00000000ffffffff 00000000ffffffff
[   25.335414] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.335581] page dumped because: kasan: bad access detected
[   25.336150] 
[   25.336432] Memory state around the buggy address:
[   25.336562]  fff00000c6501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.336665]  fff00000c6502000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.337237] >fff00000c6502080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.337347]                                                           ^
[   25.337544]  fff00000c6502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.337718]  fff00000c6502180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.338259] ==================================================================
[   25.199541] ==================================================================
[   25.199638] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.199740] Write of size 1 at addr fff00000c17ed4ea by task kunit_try_catch/158
[   25.199892] 
[   25.199954] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.200573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.200660] Hardware name: linux,dummy-virt (DT)
[   25.200742] Call trace:
[   25.200802]  show_stack+0x20/0x38 (C)
[   25.200954]  dump_stack_lvl+0x8c/0xd0
[   25.201174]  print_report+0x118/0x608
[   25.201859]  kasan_report+0xdc/0x128
[   25.201989]  __asan_report_store1_noabort+0x20/0x30
[   25.202132]  krealloc_less_oob_helper+0xae4/0xc50
[   25.202351]  krealloc_less_oob+0x20/0x38
[   25.202519]  kunit_try_run_case+0x170/0x3f0
[   25.202654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.203147]  kthread+0x328/0x630
[   25.203365]  ret_from_fork+0x10/0x20
[   25.203489] 
[   25.204094] Allocated by task 158:
[   25.204457]  kasan_save_stack+0x3c/0x68
[   25.204558]  kasan_save_track+0x20/0x40
[   25.204653]  kasan_save_alloc_info+0x40/0x58
[   25.204747]  __kasan_krealloc+0x118/0x178
[   25.205433]  krealloc_noprof+0x128/0x360
[   25.205825]  krealloc_less_oob_helper+0x168/0xc50
[   25.206060]  krealloc_less_oob+0x20/0x38
[   25.206178]  kunit_try_run_case+0x170/0x3f0
[   25.206272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.206886]  kthread+0x328/0x630
[   25.206992]  ret_from_fork+0x10/0x20
[   25.207096] 
[   25.207147] The buggy address belongs to the object at fff00000c17ed400
[   25.207147]  which belongs to the cache kmalloc-256 of size 256
[   25.207786] The buggy address is located 33 bytes to the right of
[   25.207786]  allocated 201-byte region [fff00000c17ed400, fff00000c17ed4c9)
[   25.208160] 
[   25.208392] The buggy address belongs to the physical page:
[   25.208752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec
[   25.208892] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.209459] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.209673] page_type: f5(slab)
[   25.210046] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.210497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.210640] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.210767] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.211185] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff
[   25.211310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.211421] page dumped because: kasan: bad access detected
[   25.211494] 
[   25.211537] Memory state around the buggy address:
[   25.211607]  fff00000c17ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.211707]  fff00000c17ed400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.211816] >fff00000c17ed480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.211926]                                                           ^
[   25.212084]  fff00000c17ed500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.212189]  fff00000c17ed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.212310] ==================================================================

[   18.516404] ==================================================================
[   18.517112] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   18.518065] Write of size 1 at addr ffff888102a0a0ea by task kunit_try_catch/180
[   18.518830] 
[   18.519118] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.519282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.519324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.519382] Call Trace:
[   18.519430]  <TASK>
[   18.519482]  dump_stack_lvl+0x73/0xb0
[   18.519747]  print_report+0xd1/0x650
[   18.519829]  ? __virt_addr_valid+0x1db/0x2d0
[   18.519904]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   18.519980]  ? kasan_addr_to_slab+0x11/0xa0
[   18.520051]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   18.520126]  kasan_report+0x141/0x180
[   18.520201]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   18.520287]  __asan_report_store1_noabort+0x1b/0x30
[   18.520419]  krealloc_less_oob_helper+0xe90/0x11d0
[   18.520522]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.520736]  ? finish_task_switch.isra.0+0x153/0x700
[   18.520785]  ? __switch_to+0x47/0xf50
[   18.520824]  ? __schedule+0x10cc/0x2b60
[   18.520858]  ? __pfx_read_tsc+0x10/0x10
[   18.520892]  krealloc_large_less_oob+0x1c/0x30
[   18.520927]  kunit_try_run_case+0x1a5/0x480
[   18.520964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.520997]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.521030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.521062]  ? __kthread_parkme+0x82/0x180
[   18.521088]  ? preempt_count_sub+0x50/0x80
[   18.521119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.521152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.521184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.521218]  kthread+0x337/0x6f0
[   18.521244]  ? trace_preempt_on+0x20/0xc0
[   18.521277]  ? __pfx_kthread+0x10/0x10
[   18.521328]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.521395]  ? calculate_sigpending+0x7b/0xa0
[   18.521430]  ? __pfx_kthread+0x10/0x10
[   18.521460]  ret_from_fork+0x116/0x1d0
[   18.521485]  ? __pfx_kthread+0x10/0x10
[   18.521553]  ret_from_fork_asm+0x1a/0x30
[   18.521689]  </TASK>
[   18.521720] 
[   18.542728] The buggy address belongs to the physical page:
[   18.544393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   18.545808] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.546913] flags: 0x200000000000040(head|node=0|zone=2)
[   18.547330] page_type: f8(unknown)
[   18.547722] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.549190] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.549887] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.550544] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.551074] head: 0200000000000002 ffffea00040a8201 00000000ffffffff 00000000ffffffff
[   18.552661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.553438] page dumped because: kasan: bad access detected
[   18.555046] 
[   18.555216] Memory state around the buggy address:
[   18.555599]  ffff888102a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.556106]  ffff888102a0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.556910] >ffff888102a0a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.557385]                                                           ^
[   18.558254]  ffff888102a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.559351]  ffff888102a0a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.559758] ==================================================================
[   18.023309] ==================================================================
[   18.024468] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   18.025935] Write of size 1 at addr ffff8881003494d0 by task kunit_try_catch/176
[   18.027260] 
[   18.027834] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.027967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.028006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.028066] Call Trace:
[   18.028571]  <TASK>
[   18.028633]  dump_stack_lvl+0x73/0xb0
[   18.028751]  print_report+0xd1/0x650
[   18.028805]  ? __virt_addr_valid+0x1db/0x2d0
[   18.028846]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.028887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.028922]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.028961]  kasan_report+0x141/0x180
[   18.028995]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.029040]  __asan_report_store1_noabort+0x1b/0x30
[   18.029080]  krealloc_less_oob_helper+0xe23/0x11d0
[   18.029120]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.029157]  ? irqentry_exit+0x2a/0x60
[   18.029192]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.029249]  ? __pfx_krealloc_less_oob+0x10/0x10
[   18.029327]  krealloc_less_oob+0x1c/0x30
[   18.029427]  kunit_try_run_case+0x1a5/0x480
[   18.029520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.029582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.029662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.029722]  ? __kthread_parkme+0x82/0x180
[   18.029774]  ? preempt_count_sub+0x50/0x80
[   18.029831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.029891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.029952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.030011]  kthread+0x337/0x6f0
[   18.030059]  ? trace_preempt_on+0x20/0xc0
[   18.030118]  ? __pfx_kthread+0x10/0x10
[   18.030168]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.030224]  ? calculate_sigpending+0x7b/0xa0
[   18.030284]  ? __pfx_kthread+0x10/0x10
[   18.030337]  ret_from_fork+0x116/0x1d0
[   18.030385]  ? __pfx_kthread+0x10/0x10
[   18.030438]  ret_from_fork_asm+0x1a/0x30
[   18.030529]  </TASK>
[   18.030559] 
[   18.056135] Allocated by task 176:
[   18.056749]  kasan_save_stack+0x45/0x70
[   18.057174]  kasan_save_track+0x18/0x40
[   18.057614]  kasan_save_alloc_info+0x3b/0x50
[   18.058049]  __kasan_krealloc+0x190/0x1f0
[   18.058370]  krealloc_noprof+0xf3/0x340
[   18.058791]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.059397]  krealloc_less_oob+0x1c/0x30
[   18.060620]  kunit_try_run_case+0x1a5/0x480
[   18.060970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.062093]  kthread+0x337/0x6f0
[   18.063104]  ret_from_fork+0x116/0x1d0
[   18.063671]  ret_from_fork_asm+0x1a/0x30
[   18.064525] 
[   18.064789] The buggy address belongs to the object at ffff888100349400
[   18.064789]  which belongs to the cache kmalloc-256 of size 256
[   18.066410] The buggy address is located 7 bytes to the right of
[   18.066410]  allocated 201-byte region [ffff888100349400, ffff8881003494c9)
[   18.070201] 
[   18.070779] The buggy address belongs to the physical page:
[   18.072266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   18.073475] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.074064] flags: 0x200000000000040(head|node=0|zone=2)
[   18.074656] page_type: f5(slab)
[   18.075210] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.075856] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.076790] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.078929] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.079823] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   18.081614] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.082368] page dumped because: kasan: bad access detected
[   18.083664] 
[   18.084684] Memory state around the buggy address:
[   18.085489]  ffff888100349380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.087217]  ffff888100349400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.088374] >ffff888100349480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.089485]                                                  ^
[   18.091266]  ffff888100349500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.092825]  ffff888100349580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.094282] ==================================================================
[   18.471494] ==================================================================
[   18.472310] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   18.474696] Write of size 1 at addr ffff888102a0a0da by task kunit_try_catch/180
[   18.475558] 
[   18.475922] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.476048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.476087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.476145] Call Trace:
[   18.476194]  <TASK>
[   18.476305]  dump_stack_lvl+0x73/0xb0
[   18.476450]  print_report+0xd1/0x650
[   18.476592]  ? __virt_addr_valid+0x1db/0x2d0
[   18.476678]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   18.476720]  ? kasan_addr_to_slab+0x11/0xa0
[   18.476750]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   18.476784]  kasan_report+0x141/0x180
[   18.476816]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   18.476856]  __asan_report_store1_noabort+0x1b/0x30
[   18.476891]  krealloc_less_oob_helper+0xec6/0x11d0
[   18.476927]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.476961]  ? finish_task_switch.isra.0+0x153/0x700
[   18.476992]  ? __switch_to+0x47/0xf50
[   18.477027]  ? __schedule+0x10cc/0x2b60
[   18.477059]  ? __pfx_read_tsc+0x10/0x10
[   18.477092]  krealloc_large_less_oob+0x1c/0x30
[   18.477123]  kunit_try_run_case+0x1a5/0x480
[   18.477160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.477193]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.477250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.477301]  ? __kthread_parkme+0x82/0x180
[   18.477330]  ? preempt_count_sub+0x50/0x80
[   18.477368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.477419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.477454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.477488]  kthread+0x337/0x6f0
[   18.477555]  ? trace_preempt_on+0x20/0xc0
[   18.477641]  ? __pfx_kthread+0x10/0x10
[   18.477702]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.477758]  ? calculate_sigpending+0x7b/0xa0
[   18.477814]  ? __pfx_kthread+0x10/0x10
[   18.477866]  ret_from_fork+0x116/0x1d0
[   18.477916]  ? __pfx_kthread+0x10/0x10
[   18.478006]  ret_from_fork_asm+0x1a/0x30
[   18.478106]  </TASK>
[   18.478160] 
[   18.497139] The buggy address belongs to the physical page:
[   18.497640] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   18.499557] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.500280] flags: 0x200000000000040(head|node=0|zone=2)
[   18.501123] page_type: f8(unknown)
[   18.501435] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.502081] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.502953] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.504409] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.505474] head: 0200000000000002 ffffea00040a8201 00000000ffffffff 00000000ffffffff
[   18.506401] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.507280] page dumped because: kasan: bad access detected
[   18.508124] 
[   18.508416] Memory state around the buggy address:
[   18.508872]  ffff888102a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.510151]  ffff888102a0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.512031] >ffff888102a0a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.512781]                                                     ^
[   18.513304]  ffff888102a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.513879]  ffff888102a0a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.514492] ==================================================================
[   17.965183] ==================================================================
[   17.966019] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   17.967520] Write of size 1 at addr ffff8881003494c9 by task kunit_try_catch/176
[   17.968231] 
[   17.969154] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.969284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.969580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.969740] Call Trace:
[   17.969798]  <TASK>
[   17.969854]  dump_stack_lvl+0x73/0xb0
[   17.969969]  print_report+0xd1/0x650
[   17.970011]  ? __virt_addr_valid+0x1db/0x2d0
[   17.970049]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.970087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.970122]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.970160]  kasan_report+0x141/0x180
[   17.970193]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.970247]  __asan_report_store1_noabort+0x1b/0x30
[   17.970311]  krealloc_less_oob_helper+0xd70/0x11d0
[   17.970355]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.970392]  ? irqentry_exit+0x2a/0x60
[   17.970431]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.970474]  ? __pfx_krealloc_less_oob+0x10/0x10
[   17.970546]  krealloc_less_oob+0x1c/0x30
[   17.970651]  kunit_try_run_case+0x1a5/0x480
[   17.970722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.970763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.970802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.970839]  ? __kthread_parkme+0x82/0x180
[   17.970871]  ? preempt_count_sub+0x50/0x80
[   17.970906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.970943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.970980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.971018]  kthread+0x337/0x6f0
[   17.971048]  ? trace_preempt_on+0x20/0xc0
[   17.971086]  ? __pfx_kthread+0x10/0x10
[   17.971117]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.971151]  ? calculate_sigpending+0x7b/0xa0
[   17.971189]  ? __pfx_kthread+0x10/0x10
[   17.971221]  ret_from_fork+0x116/0x1d0
[   17.971277]  ? __pfx_kthread+0x10/0x10
[   17.971312]  ret_from_fork_asm+0x1a/0x30
[   17.971359]  </TASK>
[   17.971377] 
[   17.989230] Allocated by task 176:
[   17.989959]  kasan_save_stack+0x45/0x70
[   17.990463]  kasan_save_track+0x18/0x40
[   17.991043]  kasan_save_alloc_info+0x3b/0x50
[   17.991679]  __kasan_krealloc+0x190/0x1f0
[   17.992115]  krealloc_noprof+0xf3/0x340
[   17.992771]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.995598]  krealloc_less_oob+0x1c/0x30
[   17.996117]  kunit_try_run_case+0x1a5/0x480
[   17.996678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.997702]  kthread+0x337/0x6f0
[   17.998165]  ret_from_fork+0x116/0x1d0
[   17.998819]  ret_from_fork_asm+0x1a/0x30
[   17.999348] 
[   17.999780] The buggy address belongs to the object at ffff888100349400
[   17.999780]  which belongs to the cache kmalloc-256 of size 256
[   18.001739] The buggy address is located 0 bytes to the right of
[   18.001739]  allocated 201-byte region [ffff888100349400, ffff8881003494c9)
[   18.002703] 
[   18.002965] The buggy address belongs to the physical page:
[   18.004044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   18.004929] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.005523] flags: 0x200000000000040(head|node=0|zone=2)
[   18.006207] page_type: f5(slab)
[   18.006898] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.008456] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.009145] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.010059] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.010937] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   18.011687] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.012521] page dumped because: kasan: bad access detected
[   18.013483] 
[   18.014060] Memory state around the buggy address:
[   18.015316]  ffff888100349380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.015790]  ffff888100349400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.017203] >ffff888100349480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.018579]                                               ^
[   18.019728]  ffff888100349500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.021165]  ffff888100349580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.022201] ==================================================================
[   18.416455] ==================================================================
[   18.417862] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   18.418746] Write of size 1 at addr ffff888102a0a0d0 by task kunit_try_catch/180
[   18.419815] 
[   18.420811] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.420935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.420967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.421021] Call Trace:
[   18.421065]  <TASK>
[   18.421106]  dump_stack_lvl+0x73/0xb0
[   18.421202]  print_report+0xd1/0x650
[   18.421274]  ? __virt_addr_valid+0x1db/0x2d0
[   18.421329]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.421366]  ? kasan_addr_to_slab+0x11/0xa0
[   18.421395]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.421431]  kasan_report+0x141/0x180
[   18.421463]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.421529]  __asan_report_store1_noabort+0x1b/0x30
[   18.421609]  krealloc_less_oob_helper+0xe23/0x11d0
[   18.421711]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.421787]  ? finish_task_switch.isra.0+0x153/0x700
[   18.421856]  ? __switch_to+0x47/0xf50
[   18.421943]  ? __schedule+0x10cc/0x2b60
[   18.422015]  ? __pfx_read_tsc+0x10/0x10
[   18.422090]  krealloc_large_less_oob+0x1c/0x30
[   18.422133]  kunit_try_run_case+0x1a5/0x480
[   18.422174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.422211]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.422285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.422323]  ? __kthread_parkme+0x82/0x180
[   18.422352]  ? preempt_count_sub+0x50/0x80
[   18.422383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.422419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.422452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.422487]  kthread+0x337/0x6f0
[   18.422556]  ? trace_preempt_on+0x20/0xc0
[   18.422635]  ? __pfx_kthread+0x10/0x10
[   18.422693]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.422727]  ? calculate_sigpending+0x7b/0xa0
[   18.422761]  ? __pfx_kthread+0x10/0x10
[   18.422790]  ret_from_fork+0x116/0x1d0
[   18.422817]  ? __pfx_kthread+0x10/0x10
[   18.422846]  ret_from_fork_asm+0x1a/0x30
[   18.422886]  </TASK>
[   18.422902] 
[   18.452033] The buggy address belongs to the physical page:
[   18.453047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   18.454735] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.455637] flags: 0x200000000000040(head|node=0|zone=2)
[   18.456201] page_type: f8(unknown)
[   18.456782] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.457273] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.458135] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.458999] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.460210] head: 0200000000000002 ffffea00040a8201 00000000ffffffff 00000000ffffffff
[   18.461369] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.462362] page dumped because: kasan: bad access detected
[   18.462987] 
[   18.463688] Memory state around the buggy address:
[   18.464746]  ffff888102a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.466175]  ffff888102a0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.467050] >ffff888102a0a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.467731]                                                  ^
[   18.468250]  ffff888102a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.468904]  ffff888102a0a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.469399] ==================================================================
[   18.096316] ==================================================================
[   18.098319] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   18.099826] Write of size 1 at addr ffff8881003494da by task kunit_try_catch/176
[   18.100495] 
[   18.101030] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.101165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.101205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.101263] Call Trace:
[   18.101313]  <TASK>
[   18.101378]  dump_stack_lvl+0x73/0xb0
[   18.101460]  print_report+0xd1/0x650
[   18.101525]  ? __virt_addr_valid+0x1db/0x2d0
[   18.101615]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   18.101702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.101767]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   18.101828]  kasan_report+0x141/0x180
[   18.101885]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   18.101957]  __asan_report_store1_noabort+0x1b/0x30
[   18.102022]  krealloc_less_oob_helper+0xec6/0x11d0
[   18.102090]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.102152]  ? irqentry_exit+0x2a/0x60
[   18.102215]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.102294]  ? __pfx_krealloc_less_oob+0x10/0x10
[   18.102366]  krealloc_less_oob+0x1c/0x30
[   18.102431]  kunit_try_run_case+0x1a5/0x480
[   18.102522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.102600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.102674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.102716]  ? __kthread_parkme+0x82/0x180
[   18.102750]  ? preempt_count_sub+0x50/0x80
[   18.102784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.102823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.102861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.102900]  kthread+0x337/0x6f0
[   18.102928]  ? trace_preempt_on+0x20/0xc0
[   18.102964]  ? __pfx_kthread+0x10/0x10
[   18.102994]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.103027]  ? calculate_sigpending+0x7b/0xa0
[   18.103063]  ? __pfx_kthread+0x10/0x10
[   18.103094]  ret_from_fork+0x116/0x1d0
[   18.103122]  ? __pfx_kthread+0x10/0x10
[   18.103157]  ret_from_fork_asm+0x1a/0x30
[   18.103206]  </TASK>
[   18.103225] 
[   18.121703] Allocated by task 176:
[   18.122447]  kasan_save_stack+0x45/0x70
[   18.123989]  kasan_save_track+0x18/0x40
[   18.124899]  kasan_save_alloc_info+0x3b/0x50
[   18.125248]  __kasan_krealloc+0x190/0x1f0
[   18.125677]  krealloc_noprof+0xf3/0x340
[   18.126371]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.127169]  krealloc_less_oob+0x1c/0x30
[   18.127657]  kunit_try_run_case+0x1a5/0x480
[   18.128768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.129217]  kthread+0x337/0x6f0
[   18.129910]  ret_from_fork+0x116/0x1d0
[   18.130830]  ret_from_fork_asm+0x1a/0x30
[   18.131229] 
[   18.132110] The buggy address belongs to the object at ffff888100349400
[   18.132110]  which belongs to the cache kmalloc-256 of size 256
[   18.134372] The buggy address is located 17 bytes to the right of
[   18.134372]  allocated 201-byte region [ffff888100349400, ffff8881003494c9)
[   18.135777] 
[   18.136043] The buggy address belongs to the physical page:
[   18.136564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   18.137442] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.138359] flags: 0x200000000000040(head|node=0|zone=2)
[   18.138937] page_type: f5(slab)
[   18.139349] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.139987] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.141604] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.142650] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.143760] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   18.144390] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.145658] page dumped because: kasan: bad access detected
[   18.146260] 
[   18.146488] Memory state around the buggy address:
[   18.146974]  ffff888100349380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.147776]  ffff888100349400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.148276] >ffff888100349480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.149242]                                                     ^
[   18.150020]  ffff888100349500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.150903]  ffff888100349580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.152113] ==================================================================
[   18.154156] ==================================================================
[   18.155972] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   18.156918] Write of size 1 at addr ffff8881003494ea by task kunit_try_catch/176
[   18.157559] 
[   18.157858] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.158030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.158072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.158132] Call Trace:
[   18.158183]  <TASK>
[   18.158281]  dump_stack_lvl+0x73/0xb0
[   18.158401]  print_report+0xd1/0x650
[   18.158484]  ? __virt_addr_valid+0x1db/0x2d0
[   18.158666]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   18.158744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.158827]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   18.158905]  kasan_report+0x141/0x180
[   18.158983]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   18.159145]  __asan_report_store1_noabort+0x1b/0x30
[   18.159261]  krealloc_less_oob_helper+0xe90/0x11d0
[   18.159394]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.159464]  ? irqentry_exit+0x2a/0x60
[   18.159545]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.159616]  ? __pfx_krealloc_less_oob+0x10/0x10
[   18.159682]  krealloc_less_oob+0x1c/0x30
[   18.159742]  kunit_try_run_case+0x1a5/0x480
[   18.159807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.159891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.159957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.160021]  ? __kthread_parkme+0x82/0x180
[   18.160079]  ? preempt_count_sub+0x50/0x80
[   18.160143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.160210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.160324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.160395]  kthread+0x337/0x6f0
[   18.160450]  ? trace_preempt_on+0x20/0xc0
[   18.160570]  ? __pfx_kthread+0x10/0x10
[   18.160638]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.160702]  ? calculate_sigpending+0x7b/0xa0
[   18.160773]  ? __pfx_kthread+0x10/0x10
[   18.160836]  ret_from_fork+0x116/0x1d0
[   18.160896]  ? __pfx_kthread+0x10/0x10
[   18.160954]  ret_from_fork_asm+0x1a/0x30
[   18.161036]  </TASK>
[   18.161067] 
[   18.184117] Allocated by task 176:
[   18.184567]  kasan_save_stack+0x45/0x70
[   18.184988]  kasan_save_track+0x18/0x40
[   18.185413]  kasan_save_alloc_info+0x3b/0x50
[   18.185913]  __kasan_krealloc+0x190/0x1f0
[   18.186237]  krealloc_noprof+0xf3/0x340
[   18.186665]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.187405]  krealloc_less_oob+0x1c/0x30
[   18.187947]  kunit_try_run_case+0x1a5/0x480
[   18.188531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.189268]  kthread+0x337/0x6f0
[   18.189753]  ret_from_fork+0x116/0x1d0
[   18.190177]  ret_from_fork_asm+0x1a/0x30
[   18.190699] 
[   18.190945] The buggy address belongs to the object at ffff888100349400
[   18.190945]  which belongs to the cache kmalloc-256 of size 256
[   18.192137] The buggy address is located 33 bytes to the right of
[   18.192137]  allocated 201-byte region [ffff888100349400, ffff8881003494c9)
[   18.193052] 
[   18.193296] The buggy address belongs to the physical page:
[   18.194076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   18.195048] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.195890] flags: 0x200000000000040(head|node=0|zone=2)
[   18.196450] page_type: f5(slab)
[   18.197644] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.198298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.198893] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.199467] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.200118] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   18.200880] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.201697] page dumped because: kasan: bad access detected
[   18.202179] 
[   18.202464] Memory state around the buggy address:
[   18.203119]  ffff888100349380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203903]  ffff888100349400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.204547] >ffff888100349480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.205206]                                                           ^
[   18.205831]  ffff888100349500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.206651]  ffff888100349580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.207374] ==================================================================
[   18.209110] ==================================================================
[   18.210855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   18.211684] Write of size 1 at addr ffff8881003494eb by task kunit_try_catch/176
[   18.212213] 
[   18.212568] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.212971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.213012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.213069] Call Trace:
[   18.213114]  <TASK>
[   18.213165]  dump_stack_lvl+0x73/0xb0
[   18.213266]  print_report+0xd1/0x650
[   18.213347]  ? __virt_addr_valid+0x1db/0x2d0
[   18.213477]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   18.213578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.213689]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   18.213760]  kasan_report+0x141/0x180
[   18.213821]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   18.213895]  __asan_report_store1_noabort+0x1b/0x30
[   18.213964]  krealloc_less_oob_helper+0xd47/0x11d0
[   18.214035]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.214100]  ? irqentry_exit+0x2a/0x60
[   18.214163]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.214244]  ? __pfx_krealloc_less_oob+0x10/0x10
[   18.214319]  krealloc_less_oob+0x1c/0x30
[   18.214387]  kunit_try_run_case+0x1a5/0x480
[   18.214466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.214552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.214594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.214631]  ? __kthread_parkme+0x82/0x180
[   18.214663]  ? preempt_count_sub+0x50/0x80
[   18.214696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.214734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.214771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.214809]  kthread+0x337/0x6f0
[   18.214837]  ? trace_preempt_on+0x20/0xc0
[   18.214872]  ? __pfx_kthread+0x10/0x10
[   18.214903]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.214937]  ? calculate_sigpending+0x7b/0xa0
[   18.214973]  ? __pfx_kthread+0x10/0x10
[   18.215004]  ret_from_fork+0x116/0x1d0
[   18.215032]  ? __pfx_kthread+0x10/0x10
[   18.215062]  ret_from_fork_asm+0x1a/0x30
[   18.215107]  </TASK>
[   18.215123] 
[   18.231350] Allocated by task 176:
[   18.231768]  kasan_save_stack+0x45/0x70
[   18.232141]  kasan_save_track+0x18/0x40
[   18.232715]  kasan_save_alloc_info+0x3b/0x50
[   18.233382]  __kasan_krealloc+0x190/0x1f0
[   18.233849]  krealloc_noprof+0xf3/0x340
[   18.234236]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.234782]  krealloc_less_oob+0x1c/0x30
[   18.235106]  kunit_try_run_case+0x1a5/0x480
[   18.235445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.236206]  kthread+0x337/0x6f0
[   18.236676]  ret_from_fork+0x116/0x1d0
[   18.237386]  ret_from_fork_asm+0x1a/0x30
[   18.237900] 
[   18.238108] The buggy address belongs to the object at ffff888100349400
[   18.238108]  which belongs to the cache kmalloc-256 of size 256
[   18.238948] The buggy address is located 34 bytes to the right of
[   18.238948]  allocated 201-byte region [ffff888100349400, ffff8881003494c9)
[   18.240131] 
[   18.240518] The buggy address belongs to the physical page:
[   18.240918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   18.241480] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.242341] flags: 0x200000000000040(head|node=0|zone=2)
[   18.243434] page_type: f5(slab)
[   18.244661] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.246584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.247922] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   18.248193] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.248714] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   18.250034] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.250889] page dumped because: kasan: bad access detected
[   18.251620] 
[   18.251856] Memory state around the buggy address:
[   18.252828]  ffff888100349380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.253591]  ffff888100349400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.254353] >ffff888100349480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.255066]                                                           ^
[   18.255724]  ffff888100349500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.255980]  ffff888100349580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.256217] ==================================================================
[   18.366218] ==================================================================
[   18.367290] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   18.368339] Write of size 1 at addr ffff888102a0a0c9 by task kunit_try_catch/180
[   18.369059] 
[   18.369434] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.369580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.369642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.369705] Call Trace:
[   18.369755]  <TASK>
[   18.369807]  dump_stack_lvl+0x73/0xb0
[   18.370210]  print_report+0xd1/0x650
[   18.370462]  ? __virt_addr_valid+0x1db/0x2d0
[   18.370578]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.371039]  ? kasan_addr_to_slab+0x11/0xa0
[   18.371105]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.371166]  kasan_report+0x141/0x180
[   18.371226]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.371298]  __asan_report_store1_noabort+0x1b/0x30
[   18.371363]  krealloc_less_oob_helper+0xd70/0x11d0
[   18.371429]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.371493]  ? finish_task_switch.isra.0+0x153/0x700
[   18.371579]  ? __switch_to+0x47/0xf50
[   18.371837]  ? __schedule+0x10cc/0x2b60
[   18.371874]  ? __pfx_read_tsc+0x10/0x10
[   18.371911]  krealloc_large_less_oob+0x1c/0x30
[   18.371944]  kunit_try_run_case+0x1a5/0x480
[   18.371983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.372016]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.372050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.372083]  ? __kthread_parkme+0x82/0x180
[   18.372111]  ? preempt_count_sub+0x50/0x80
[   18.372142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.372176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.372209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.372301]  kthread+0x337/0x6f0
[   18.372333]  ? trace_preempt_on+0x20/0xc0
[   18.372367]  ? __pfx_kthread+0x10/0x10
[   18.372396]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.372427]  ? calculate_sigpending+0x7b/0xa0
[   18.372461]  ? __pfx_kthread+0x10/0x10
[   18.372490]  ret_from_fork+0x116/0x1d0
[   18.372556]  ? __pfx_kthread+0x10/0x10
[   18.372625]  ret_from_fork_asm+0x1a/0x30
[   18.372704]  </TASK>
[   18.372722] 
[   18.395786] The buggy address belongs to the physical page:
[   18.396656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   18.398226] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.399458] flags: 0x200000000000040(head|node=0|zone=2)
[   18.400182] page_type: f8(unknown)
[   18.401191] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.401805] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.402608] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.403006] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.404866] head: 0200000000000002 ffffea00040a8201 00000000ffffffff 00000000ffffffff
[   18.406295] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.407247] page dumped because: kasan: bad access detected
[   18.408185] 
[   18.408443] Memory state around the buggy address:
[   18.409213]  ffff888102a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.410552]  ffff888102a0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.411585] >ffff888102a0a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.412345]                                               ^
[   18.413261]  ffff888102a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.413853]  ffff888102a0a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.414380] ==================================================================
[   18.560450] ==================================================================
[   18.560829] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   18.561236] Write of size 1 at addr ffff888102a0a0eb by task kunit_try_catch/180
[   18.563754] 
[   18.563969] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.564091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.564130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.564188] Call Trace:
[   18.564360]  <TASK>
[   18.564422]  dump_stack_lvl+0x73/0xb0
[   18.564677]  print_report+0xd1/0x650
[   18.564765]  ? __virt_addr_valid+0x1db/0x2d0
[   18.564862]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   18.564941]  ? kasan_addr_to_slab+0x11/0xa0
[   18.565014]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   18.565091]  kasan_report+0x141/0x180
[   18.565167]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   18.565252]  __asan_report_store1_noabort+0x1b/0x30
[   18.565332]  krealloc_less_oob_helper+0xd47/0x11d0
[   18.565413]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.565487]  ? finish_task_switch.isra.0+0x153/0x700
[   18.565723]  ? __switch_to+0x47/0xf50
[   18.565812]  ? __schedule+0x10cc/0x2b60
[   18.565887]  ? __pfx_read_tsc+0x10/0x10
[   18.565964]  krealloc_large_less_oob+0x1c/0x30
[   18.566037]  kunit_try_run_case+0x1a5/0x480
[   18.566116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.566188]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.566296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.566339]  ? __kthread_parkme+0x82/0x180
[   18.566370]  ? preempt_count_sub+0x50/0x80
[   18.566401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.566437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.566472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.566534]  kthread+0x337/0x6f0
[   18.566630]  ? trace_preempt_on+0x20/0xc0
[   18.566703]  ? __pfx_kthread+0x10/0x10
[   18.566766]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.566826]  ? calculate_sigpending+0x7b/0xa0
[   18.566883]  ? __pfx_kthread+0x10/0x10
[   18.566938]  ret_from_fork+0x116/0x1d0
[   18.566995]  ? __pfx_kthread+0x10/0x10
[   18.567051]  ret_from_fork_asm+0x1a/0x30
[   18.567121]  </TASK>
[   18.567150] 
[   18.590584] The buggy address belongs to the physical page:
[   18.591159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   18.594311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.595039] flags: 0x200000000000040(head|node=0|zone=2)
[   18.595805] page_type: f8(unknown)
[   18.596178] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.596786] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.597165] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.597596] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.597981] head: 0200000000000002 ffffea00040a8201 00000000ffffffff 00000000ffffffff
[   18.598456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.599070] page dumped because: kasan: bad access detected
[   18.599722] 
[   18.600098] Memory state around the buggy address:
[   18.601542]  ffff888102a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.602731]  ffff888102a0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.603650] >ffff888102a0a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.604273]                                                           ^
[   18.605518]  ffff888102a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.606415]  ffff888102a0a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.607112] ==================================================================

[   17.558525] ==================================================================
[   17.559118] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   17.559822] Write of size 1 at addr ffff88810397a0da by task kunit_try_catch/180
[   17.560445] 
[   17.561038] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.561187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.561225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.561278] Call Trace:
[   17.561314]  <TASK>
[   17.561353]  dump_stack_lvl+0x73/0xb0
[   17.561438]  print_report+0xd1/0x650
[   17.561514]  ? __virt_addr_valid+0x1db/0x2d0
[   17.561702]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.561821]  ? kasan_addr_to_slab+0x11/0xa0
[   17.561915]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.561995]  kasan_report+0x141/0x180
[   17.562073]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.562208]  __asan_report_store1_noabort+0x1b/0x30
[   17.562303]  krealloc_less_oob_helper+0xec6/0x11d0
[   17.562390]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.562505]  ? finish_task_switch.isra.0+0x153/0x700
[   17.562696]  ? __switch_to+0x47/0xf50
[   17.562782]  ? __schedule+0x10cc/0x2b60
[   17.562860]  ? __pfx_read_tsc+0x10/0x10
[   17.562996]  krealloc_large_less_oob+0x1c/0x30
[   17.563078]  kunit_try_run_case+0x1a5/0x480
[   17.563160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.563235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.563285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.563321]  ? __kthread_parkme+0x82/0x180
[   17.563349]  ? preempt_count_sub+0x50/0x80
[   17.563380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.563414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.563447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.563482]  kthread+0x337/0x6f0
[   17.563514]  ? trace_preempt_on+0x20/0xc0
[   17.563634]  ? __pfx_kthread+0x10/0x10
[   17.563672]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.563704]  ? calculate_sigpending+0x7b/0xa0
[   17.563738]  ? __pfx_kthread+0x10/0x10
[   17.563767]  ret_from_fork+0x116/0x1d0
[   17.563792]  ? __pfx_kthread+0x10/0x10
[   17.563820]  ret_from_fork_asm+0x1a/0x30
[   17.563860]  </TASK>
[   17.563874] 
[   17.586075] The buggy address belongs to the physical page:
[   17.586663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103978
[   17.587314] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.587947] flags: 0x200000000000040(head|node=0|zone=2)
[   17.588375] page_type: f8(unknown)
[   17.588772] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.589427] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.590311] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.591240] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.592101] head: 0200000000000002 ffffea00040e5e01 00000000ffffffff 00000000ffffffff
[   17.592744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.593532] page dumped because: kasan: bad access detected
[   17.594380] 
[   17.594586] Memory state around the buggy address:
[   17.595040]  ffff888103979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.595704]  ffff88810397a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.596347] >ffff88810397a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.597008]                                                     ^
[   17.597460]  ffff88810397a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.598418]  ffff88810397a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.599155] ==================================================================
[   17.193561] ==================================================================
[   17.194674] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   17.195259] Write of size 1 at addr ffff8881003518da by task kunit_try_catch/176
[   17.196322] 
[   17.196558] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.196662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.196681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.196710] Call Trace:
[   17.196723]  <TASK>
[   17.196738]  dump_stack_lvl+0x73/0xb0
[   17.196796]  print_report+0xd1/0x650
[   17.196856]  ? __virt_addr_valid+0x1db/0x2d0
[   17.196929]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.197011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.197083]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.197159]  kasan_report+0x141/0x180
[   17.197230]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.197318]  __asan_report_store1_noabort+0x1b/0x30
[   17.197396]  krealloc_less_oob_helper+0xec6/0x11d0
[   17.197455]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.197492]  ? finish_task_switch.isra.0+0x153/0x700
[   17.197525]  ? __switch_to+0x47/0xf50
[   17.197559]  ? __schedule+0x10cc/0x2b60
[   17.197590]  ? __pfx_read_tsc+0x10/0x10
[   17.197623]  krealloc_less_oob+0x1c/0x30
[   17.197652]  kunit_try_run_case+0x1a5/0x480
[   17.197686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.197718]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.197750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.197782]  ? __kthread_parkme+0x82/0x180
[   17.197808]  ? preempt_count_sub+0x50/0x80
[   17.197837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.197871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.197958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.198018]  kthread+0x337/0x6f0
[   17.198056]  ? trace_preempt_on+0x20/0xc0
[   17.198088]  ? __pfx_kthread+0x10/0x10
[   17.198154]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.198187]  ? calculate_sigpending+0x7b/0xa0
[   17.198221]  ? __pfx_kthread+0x10/0x10
[   17.198250]  ret_from_fork+0x116/0x1d0
[   17.198289]  ? __pfx_kthread+0x10/0x10
[   17.198318]  ret_from_fork_asm+0x1a/0x30
[   17.198358]  </TASK>
[   17.198373] 
[   17.216018] Allocated by task 176:
[   17.216350]  kasan_save_stack+0x45/0x70
[   17.216672]  kasan_save_track+0x18/0x40
[   17.217189]  kasan_save_alloc_info+0x3b/0x50
[   17.217673]  __kasan_krealloc+0x190/0x1f0
[   17.218127]  krealloc_noprof+0xf3/0x340
[   17.218545]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.219147]  krealloc_less_oob+0x1c/0x30
[   17.219553]  kunit_try_run_case+0x1a5/0x480
[   17.220008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.220581]  kthread+0x337/0x6f0
[   17.220867]  ret_from_fork+0x116/0x1d0
[   17.221248]  ret_from_fork_asm+0x1a/0x30
[   17.221698] 
[   17.221978] The buggy address belongs to the object at ffff888100351800
[   17.221978]  which belongs to the cache kmalloc-256 of size 256
[   17.223146] The buggy address is located 17 bytes to the right of
[   17.223146]  allocated 201-byte region [ffff888100351800, ffff8881003518c9)
[   17.224012] 
[   17.224335] The buggy address belongs to the physical page:
[   17.224832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   17.225547] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.226154] flags: 0x200000000000040(head|node=0|zone=2)
[   17.226649] page_type: f5(slab)
[   17.227068] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.227804] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.228561] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.229202] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.229755] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   17.230493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.231191] page dumped because: kasan: bad access detected
[   17.231654] 
[   17.231838] Memory state around the buggy address:
[   17.232232]  ffff888100351780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.232873]  ffff888100351800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.233549] >ffff888100351880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.234283]                                                     ^
[   17.234844]  ffff888100351900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.235517]  ffff888100351980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.236020] ==================================================================
[   17.289302] ==================================================================
[   17.290010] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   17.291585] Write of size 1 at addr ffff8881003518eb by task kunit_try_catch/176
[   17.292962] 
[   17.293277] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.293376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.293403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.293449] Call Trace:
[   17.293481]  <TASK>
[   17.293512]  dump_stack_lvl+0x73/0xb0
[   17.293576]  print_report+0xd1/0x650
[   17.293626]  ? __virt_addr_valid+0x1db/0x2d0
[   17.293681]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.293734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.293789]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.293846]  kasan_report+0x141/0x180
[   17.293916]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.293986]  __asan_report_store1_noabort+0x1b/0x30
[   17.294041]  krealloc_less_oob_helper+0xd47/0x11d0
[   17.294100]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.294154]  ? finish_task_switch.isra.0+0x153/0x700
[   17.294203]  ? __switch_to+0x47/0xf50
[   17.294267]  ? __schedule+0x10cc/0x2b60
[   17.294323]  ? __pfx_read_tsc+0x10/0x10
[   17.294376]  krealloc_less_oob+0x1c/0x30
[   17.294425]  kunit_try_run_case+0x1a5/0x480
[   17.294483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.294533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.294587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.294640]  ? __kthread_parkme+0x82/0x180
[   17.294684]  ? preempt_count_sub+0x50/0x80
[   17.294737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.294790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.294844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.294919]  kthread+0x337/0x6f0
[   17.294990]  ? trace_preempt_on+0x20/0xc0
[   17.295067]  ? __pfx_kthread+0x10/0x10
[   17.295186]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.295284]  ? calculate_sigpending+0x7b/0xa0
[   17.295364]  ? __pfx_kthread+0x10/0x10
[   17.295485]  ret_from_fork+0x116/0x1d0
[   17.295541]  ? __pfx_kthread+0x10/0x10
[   17.295589]  ret_from_fork_asm+0x1a/0x30
[   17.295656]  </TASK>
[   17.295681] 
[   17.326452] Allocated by task 176:
[   17.326801]  kasan_save_stack+0x45/0x70
[   17.327331]  kasan_save_track+0x18/0x40
[   17.327908]  kasan_save_alloc_info+0x3b/0x50
[   17.329683]  __kasan_krealloc+0x190/0x1f0
[   17.330214]  krealloc_noprof+0xf3/0x340
[   17.331734]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.332139]  krealloc_less_oob+0x1c/0x30
[   17.332936]  kunit_try_run_case+0x1a5/0x480
[   17.334373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.334926]  kthread+0x337/0x6f0
[   17.336410]  ret_from_fork+0x116/0x1d0
[   17.337648]  ret_from_fork_asm+0x1a/0x30
[   17.338246] 
[   17.338524] The buggy address belongs to the object at ffff888100351800
[   17.338524]  which belongs to the cache kmalloc-256 of size 256
[   17.340824] The buggy address is located 34 bytes to the right of
[   17.340824]  allocated 201-byte region [ffff888100351800, ffff8881003518c9)
[   17.342810] 
[   17.343066] The buggy address belongs to the physical page:
[   17.344654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   17.345341] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.346460] flags: 0x200000000000040(head|node=0|zone=2)
[   17.347314] page_type: f5(slab)
[   17.347674] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.349321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.350432] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.351397] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.352203] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   17.352835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.354020] page dumped because: kasan: bad access detected
[   17.354539] 
[   17.355375] Memory state around the buggy address:
[   17.356643]  ffff888100351780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.357124]  ffff888100351800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.357654] >ffff888100351880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.362747]                                                           ^
[   17.365191]  ffff888100351900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.369368]  ffff888100351980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.370535] ==================================================================
[   17.600122] ==================================================================
[   17.600579] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   17.601217] Write of size 1 at addr ffff88810397a0ea by task kunit_try_catch/180
[   17.602282] 
[   17.602490] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.602602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.602637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.602689] Call Trace:
[   17.602727]  <TASK>
[   17.602765]  dump_stack_lvl+0x73/0xb0
[   17.602851]  print_report+0xd1/0x650
[   17.602946]  ? __virt_addr_valid+0x1db/0x2d0
[   17.603021]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.603095]  ? kasan_addr_to_slab+0x11/0xa0
[   17.603169]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.603247]  kasan_report+0x141/0x180
[   17.603327]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.603416]  __asan_report_store1_noabort+0x1b/0x30
[   17.603499]  krealloc_less_oob_helper+0xe90/0x11d0
[   17.603589]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.603671]  ? finish_task_switch.isra.0+0x153/0x700
[   17.603746]  ? __switch_to+0x47/0xf50
[   17.603827]  ? __schedule+0x10cc/0x2b60
[   17.604014]  ? __pfx_read_tsc+0x10/0x10
[   17.604101]  krealloc_large_less_oob+0x1c/0x30
[   17.604181]  kunit_try_run_case+0x1a5/0x480
[   17.604259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.604336]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.604412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.604487]  ? __kthread_parkme+0x82/0x180
[   17.604660]  ? preempt_count_sub+0x50/0x80
[   17.604717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.604756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.604791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.604825]  kthread+0x337/0x6f0
[   17.604852]  ? trace_preempt_on+0x20/0xc0
[   17.604910]  ? __pfx_kthread+0x10/0x10
[   17.604946]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.604979]  ? calculate_sigpending+0x7b/0xa0
[   17.605013]  ? __pfx_kthread+0x10/0x10
[   17.605042]  ret_from_fork+0x116/0x1d0
[   17.605068]  ? __pfx_kthread+0x10/0x10
[   17.605097]  ret_from_fork_asm+0x1a/0x30
[   17.605170]  </TASK>
[   17.605185] 
[   17.630076] The buggy address belongs to the physical page:
[   17.631896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103978
[   17.632366] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.632779] flags: 0x200000000000040(head|node=0|zone=2)
[   17.634482] page_type: f8(unknown)
[   17.635203] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.636225] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.637072] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.637821] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.638529] head: 0200000000000002 ffffea00040e5e01 00000000ffffffff 00000000ffffffff
[   17.639187] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.640480] page dumped because: kasan: bad access detected
[   17.640928] 
[   17.641145] Memory state around the buggy address:
[   17.641516]  ffff888103979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.642203]  ffff88810397a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.643135] >ffff88810397a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.643935]                                                           ^
[   17.644665]  ffff88810397a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.645311]  ffff88810397a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.646080] ==================================================================
[   17.236907] ==================================================================
[   17.237381] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   17.238035] Write of size 1 at addr ffff8881003518ea by task kunit_try_catch/176
[   17.238560] 
[   17.238810] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.239560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.239599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.239989] Call Trace:
[   17.240035]  <TASK>
[   17.240076]  dump_stack_lvl+0x73/0xb0
[   17.240203]  print_report+0xd1/0x650
[   17.240277]  ? __virt_addr_valid+0x1db/0x2d0
[   17.240349]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.240424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.240497]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.240576]  kasan_report+0x141/0x180
[   17.240652]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.240737]  __asan_report_store1_noabort+0x1b/0x30
[   17.240782]  krealloc_less_oob_helper+0xe90/0x11d0
[   17.240821]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.240857]  ? finish_task_switch.isra.0+0x153/0x700
[   17.240919]  ? __switch_to+0x47/0xf50
[   17.240957]  ? __schedule+0x10cc/0x2b60
[   17.240988]  ? __pfx_read_tsc+0x10/0x10
[   17.241020]  krealloc_less_oob+0x1c/0x30
[   17.241050]  kunit_try_run_case+0x1a5/0x480
[   17.241085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.241165]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.241202]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.241236]  ? __kthread_parkme+0x82/0x180
[   17.241262]  ? preempt_count_sub+0x50/0x80
[   17.241294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.241328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.241361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.241394]  kthread+0x337/0x6f0
[   17.241420]  ? trace_preempt_on+0x20/0xc0
[   17.241450]  ? __pfx_kthread+0x10/0x10
[   17.241478]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.241508]  ? calculate_sigpending+0x7b/0xa0
[   17.241540]  ? __pfx_kthread+0x10/0x10
[   17.241569]  ret_from_fork+0x116/0x1d0
[   17.241593]  ? __pfx_kthread+0x10/0x10
[   17.241621]  ret_from_fork_asm+0x1a/0x30
[   17.241660]  </TASK>
[   17.241673] 
[   17.261455] Allocated by task 176:
[   17.261823]  kasan_save_stack+0x45/0x70
[   17.262695]  kasan_save_track+0x18/0x40
[   17.263035]  kasan_save_alloc_info+0x3b/0x50
[   17.263750]  __kasan_krealloc+0x190/0x1f0
[   17.264661]  krealloc_noprof+0xf3/0x340
[   17.265033]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.265572]  krealloc_less_oob+0x1c/0x30
[   17.265913]  kunit_try_run_case+0x1a5/0x480
[   17.266359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.266765]  kthread+0x337/0x6f0
[   17.268140]  ret_from_fork+0x116/0x1d0
[   17.268503]  ret_from_fork_asm+0x1a/0x30
[   17.269122] 
[   17.269661] The buggy address belongs to the object at ffff888100351800
[   17.269661]  which belongs to the cache kmalloc-256 of size 256
[   17.271045] The buggy address is located 33 bytes to the right of
[   17.271045]  allocated 201-byte region [ffff888100351800, ffff8881003518c9)
[   17.271942] 
[   17.272364] The buggy address belongs to the physical page:
[   17.272813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   17.273799] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.274294] flags: 0x200000000000040(head|node=0|zone=2)
[   17.275125] page_type: f5(slab)
[   17.275487] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.276493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.277047] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.278431] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.279176] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   17.280017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.280870] page dumped because: kasan: bad access detected
[   17.281497] 
[   17.281723] Memory state around the buggy address:
[   17.282599]  ffff888100351780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.283259]  ffff888100351800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.283770] >ffff888100351880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.284317]                                                           ^
[   17.285336]  ffff888100351900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.285821]  ffff888100351980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.286597] ==================================================================
[   17.144790] ==================================================================
[   17.145546] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   17.146201] Write of size 1 at addr ffff8881003518d0 by task kunit_try_catch/176
[   17.146743] 
[   17.146997] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.147379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.147420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.147480] Call Trace:
[   17.147514]  <TASK>
[   17.147555]  dump_stack_lvl+0x73/0xb0
[   17.147641]  print_report+0xd1/0x650
[   17.147717]  ? __virt_addr_valid+0x1db/0x2d0
[   17.147792]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.147868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.147964]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.148043]  kasan_report+0x141/0x180
[   17.148226]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.148315]  __asan_report_store1_noabort+0x1b/0x30
[   17.148392]  krealloc_less_oob_helper+0xe23/0x11d0
[   17.148472]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.148548]  ? finish_task_switch.isra.0+0x153/0x700
[   17.148600]  ? __switch_to+0x47/0xf50
[   17.148637]  ? __schedule+0x10cc/0x2b60
[   17.148669]  ? __pfx_read_tsc+0x10/0x10
[   17.148702]  krealloc_less_oob+0x1c/0x30
[   17.148733]  kunit_try_run_case+0x1a5/0x480
[   17.148769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.148802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.148833]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.148865]  ? __kthread_parkme+0x82/0x180
[   17.148920]  ? preempt_count_sub+0x50/0x80
[   17.148954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.148989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.149021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.149054]  kthread+0x337/0x6f0
[   17.149081]  ? trace_preempt_on+0x20/0xc0
[   17.149160]  ? __pfx_kthread+0x10/0x10
[   17.149194]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.149226]  ? calculate_sigpending+0x7b/0xa0
[   17.149260]  ? __pfx_kthread+0x10/0x10
[   17.149289]  ret_from_fork+0x116/0x1d0
[   17.149313]  ? __pfx_kthread+0x10/0x10
[   17.149341]  ret_from_fork_asm+0x1a/0x30
[   17.149380]  </TASK>
[   17.149393] 
[   17.167964] Allocated by task 176:
[   17.168538]  kasan_save_stack+0x45/0x70
[   17.168856]  kasan_save_track+0x18/0x40
[   17.169490]  kasan_save_alloc_info+0x3b/0x50
[   17.169957]  __kasan_krealloc+0x190/0x1f0
[   17.170737]  krealloc_noprof+0xf3/0x340
[   17.171214]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.171642]  krealloc_less_oob+0x1c/0x30
[   17.172218]  kunit_try_run_case+0x1a5/0x480
[   17.172722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.173491]  kthread+0x337/0x6f0
[   17.174100]  ret_from_fork+0x116/0x1d0
[   17.174570]  ret_from_fork_asm+0x1a/0x30
[   17.174948] 
[   17.175192] The buggy address belongs to the object at ffff888100351800
[   17.175192]  which belongs to the cache kmalloc-256 of size 256
[   17.176686] The buggy address is located 7 bytes to the right of
[   17.176686]  allocated 201-byte region [ffff888100351800, ffff8881003518c9)
[   17.177810] 
[   17.178353] The buggy address belongs to the physical page:
[   17.178837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   17.179949] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.180893] flags: 0x200000000000040(head|node=0|zone=2)
[   17.181381] page_type: f5(slab)
[   17.181915] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.182680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.183318] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.184014] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.184614] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   17.185204] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.185831] page dumped because: kasan: bad access detected
[   17.186588] 
[   17.186803] Memory state around the buggy address:
[   17.187476]  ffff888100351780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.187984]  ffff888100351800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.188769] >ffff888100351880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.189606]                                                  ^
[   17.190110]  ffff888100351900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.191333]  ffff888100351980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.191823] ==================================================================
[   17.088854] ==================================================================
[   17.090166] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   17.091293] Write of size 1 at addr ffff8881003518c9 by task kunit_try_catch/176
[   17.092396] 
[   17.093235] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.093469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.093529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.093591] Call Trace:
[   17.093626]  <TASK>
[   17.093671]  dump_stack_lvl+0x73/0xb0
[   17.093755]  print_report+0xd1/0x650
[   17.093821]  ? __virt_addr_valid+0x1db/0x2d0
[   17.093900]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.093964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.094023]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.094083]  kasan_report+0x141/0x180
[   17.094163]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.094239]  __asan_report_store1_noabort+0x1b/0x30
[   17.094312]  krealloc_less_oob_helper+0xd70/0x11d0
[   17.094375]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.094441]  ? finish_task_switch.isra.0+0x153/0x700
[   17.094498]  ? __switch_to+0x47/0xf50
[   17.094565]  ? __schedule+0x10cc/0x2b60
[   17.094633]  ? __pfx_read_tsc+0x10/0x10
[   17.094703]  krealloc_less_oob+0x1c/0x30
[   17.094767]  kunit_try_run_case+0x1a5/0x480
[   17.094844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.094943]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.095010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.095071]  ? __kthread_parkme+0x82/0x180
[   17.095135]  ? preempt_count_sub+0x50/0x80
[   17.095216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.095276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.095340]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.095397]  kthread+0x337/0x6f0
[   17.095446]  ? trace_preempt_on+0x20/0xc0
[   17.095502]  ? __pfx_kthread+0x10/0x10
[   17.095550]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.095600]  ? calculate_sigpending+0x7b/0xa0
[   17.095655]  ? __pfx_kthread+0x10/0x10
[   17.095704]  ret_from_fork+0x116/0x1d0
[   17.095748]  ? __pfx_kthread+0x10/0x10
[   17.095795]  ret_from_fork_asm+0x1a/0x30
[   17.095866]  </TASK>
[   17.095911] 
[   17.120475] Allocated by task 176:
[   17.120770]  kasan_save_stack+0x45/0x70
[   17.121120]  kasan_save_track+0x18/0x40
[   17.121437]  kasan_save_alloc_info+0x3b/0x50
[   17.122901]  __kasan_krealloc+0x190/0x1f0
[   17.123467]  krealloc_noprof+0xf3/0x340
[   17.123642]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.123828]  krealloc_less_oob+0x1c/0x30
[   17.124133]  kunit_try_run_case+0x1a5/0x480
[   17.125089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.125739]  kthread+0x337/0x6f0
[   17.126249]  ret_from_fork+0x116/0x1d0
[   17.126763]  ret_from_fork_asm+0x1a/0x30
[   17.127485] 
[   17.127653] The buggy address belongs to the object at ffff888100351800
[   17.127653]  which belongs to the cache kmalloc-256 of size 256
[   17.129183] The buggy address is located 0 bytes to the right of
[   17.129183]  allocated 201-byte region [ffff888100351800, ffff8881003518c9)
[   17.130113] 
[   17.130359] The buggy address belongs to the physical page:
[   17.130737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   17.131570] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.132236] flags: 0x200000000000040(head|node=0|zone=2)
[   17.132726] page_type: f5(slab)
[   17.133204] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.133869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.134600] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.135240] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.135921] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   17.136636] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.137339] page dumped because: kasan: bad access detected
[   17.137814] 
[   17.138074] Memory state around the buggy address:
[   17.138575]  ffff888100351780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.139275]  ffff888100351800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.139827] >ffff888100351880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.140504]                                               ^
[   17.141016]  ffff888100351900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.141641]  ffff888100351980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.142336] ==================================================================
[   17.466128] ==================================================================
[   17.467087] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   17.467711] Write of size 1 at addr ffff88810397a0c9 by task kunit_try_catch/180
[   17.469084] 
[   17.469385] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.469958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.469995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.470050] Call Trace:
[   17.470083]  <TASK>
[   17.470170]  dump_stack_lvl+0x73/0xb0
[   17.470276]  print_report+0xd1/0x650
[   17.470368]  ? __virt_addr_valid+0x1db/0x2d0
[   17.470408]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.470444]  ? kasan_addr_to_slab+0x11/0xa0
[   17.470475]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.470524]  kasan_report+0x141/0x180
[   17.470604]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.470666]  __asan_report_store1_noabort+0x1b/0x30
[   17.470705]  krealloc_less_oob_helper+0xd70/0x11d0
[   17.470743]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.470778]  ? finish_task_switch.isra.0+0x153/0x700
[   17.470809]  ? __switch_to+0x47/0xf50
[   17.470845]  ? __schedule+0x10cc/0x2b60
[   17.470897]  ? __pfx_read_tsc+0x10/0x10
[   17.470936]  krealloc_large_less_oob+0x1c/0x30
[   17.470970]  kunit_try_run_case+0x1a5/0x480
[   17.471007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.471041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.471075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.471124]  ? __kthread_parkme+0x82/0x180
[   17.471167]  ? preempt_count_sub+0x50/0x80
[   17.471200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.471235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.471268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.471302]  kthread+0x337/0x6f0
[   17.471329]  ? trace_preempt_on+0x20/0xc0
[   17.471362]  ? __pfx_kthread+0x10/0x10
[   17.471390]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.471421]  ? calculate_sigpending+0x7b/0xa0
[   17.471456]  ? __pfx_kthread+0x10/0x10
[   17.471485]  ret_from_fork+0x116/0x1d0
[   17.471518]  ? __pfx_kthread+0x10/0x10
[   17.471608]  ret_from_fork_asm+0x1a/0x30
[   17.471672]  </TASK>
[   17.471688] 
[   17.494551] The buggy address belongs to the physical page:
[   17.495381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103978
[   17.496759] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.497622] flags: 0x200000000000040(head|node=0|zone=2)
[   17.498374] page_type: f8(unknown)
[   17.499051] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.500212] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.500982] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.501796] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.503025] head: 0200000000000002 ffffea00040e5e01 00000000ffffffff 00000000ffffffff
[   17.504010] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.504990] page dumped because: kasan: bad access detected
[   17.505452] 
[   17.506141] Memory state around the buggy address:
[   17.506514]  ffff888103979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.507714]  ffff88810397a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.508252] >ffff88810397a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.509101]                                               ^
[   17.509948]  ffff88810397a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.510985]  ffff88810397a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.512289] ==================================================================
[   17.647285] ==================================================================
[   17.648156] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   17.649012] Write of size 1 at addr ffff88810397a0eb by task kunit_try_catch/180
[   17.649712] 
[   17.649942] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.650061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.650321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.650381] Call Trace:
[   17.650421]  <TASK>
[   17.650461]  dump_stack_lvl+0x73/0xb0
[   17.650872]  print_report+0xd1/0x650
[   17.650971]  ? __virt_addr_valid+0x1db/0x2d0
[   17.651083]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.651201]  ? kasan_addr_to_slab+0x11/0xa0
[   17.651275]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.651351]  kasan_report+0x141/0x180
[   17.651427]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.651671]  __asan_report_store1_noabort+0x1b/0x30
[   17.651759]  krealloc_less_oob_helper+0xd47/0x11d0
[   17.651807]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.651844]  ? finish_task_switch.isra.0+0x153/0x700
[   17.651898]  ? __switch_to+0x47/0xf50
[   17.651941]  ? __schedule+0x10cc/0x2b60
[   17.651974]  ? __pfx_read_tsc+0x10/0x10
[   17.652007]  krealloc_large_less_oob+0x1c/0x30
[   17.652040]  kunit_try_run_case+0x1a5/0x480
[   17.652075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.652140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.652181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.652215]  ? __kthread_parkme+0x82/0x180
[   17.652243]  ? preempt_count_sub+0x50/0x80
[   17.652274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.652310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.652344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.652379]  kthread+0x337/0x6f0
[   17.652405]  ? trace_preempt_on+0x20/0xc0
[   17.652436]  ? __pfx_kthread+0x10/0x10
[   17.652464]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.652494]  ? calculate_sigpending+0x7b/0xa0
[   17.652584]  ? __pfx_kthread+0x10/0x10
[   17.652657]  ret_from_fork+0x116/0x1d0
[   17.652686]  ? __pfx_kthread+0x10/0x10
[   17.652718]  ret_from_fork_asm+0x1a/0x30
[   17.652759]  </TASK>
[   17.652772] 
[   17.673008] The buggy address belongs to the physical page:
[   17.673981] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103978
[   17.674970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.675863] flags: 0x200000000000040(head|node=0|zone=2)
[   17.676472] page_type: f8(unknown)
[   17.676976] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.677932] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.678589] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.679202] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.679774] head: 0200000000000002 ffffea00040e5e01 00000000ffffffff 00000000ffffffff
[   17.680339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.681212] page dumped because: kasan: bad access detected
[   17.682282] 
[   17.682634] Memory state around the buggy address:
[   17.683169]  ffff888103979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.683927]  ffff88810397a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.684732] >ffff88810397a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.685416]                                                           ^
[   17.686286]  ffff88810397a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.686998]  ffff88810397a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.687781] ==================================================================
[   17.513187] ==================================================================
[   17.513662] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   17.515228] Write of size 1 at addr ffff88810397a0d0 by task kunit_try_catch/180
[   17.516258] 
[   17.516522] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.516860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.516916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.516963] Call Trace:
[   17.516998]  <TASK>
[   17.517029]  dump_stack_lvl+0x73/0xb0
[   17.517105]  print_report+0xd1/0x650
[   17.517311]  ? __virt_addr_valid+0x1db/0x2d0
[   17.517350]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.517385]  ? kasan_addr_to_slab+0x11/0xa0
[   17.517413]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.517447]  kasan_report+0x141/0x180
[   17.517480]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.517534]  __asan_report_store1_noabort+0x1b/0x30
[   17.517631]  krealloc_less_oob_helper+0xe23/0x11d0
[   17.517679]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.517717]  ? finish_task_switch.isra.0+0x153/0x700
[   17.517749]  ? __switch_to+0x47/0xf50
[   17.517785]  ? __schedule+0x10cc/0x2b60
[   17.517816]  ? __pfx_read_tsc+0x10/0x10
[   17.517850]  krealloc_large_less_oob+0x1c/0x30
[   17.517908]  kunit_try_run_case+0x1a5/0x480
[   17.517948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.517982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.518016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.518049]  ? __kthread_parkme+0x82/0x180
[   17.518076]  ? preempt_count_sub+0x50/0x80
[   17.518120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.518172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.518207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.518241]  kthread+0x337/0x6f0
[   17.518283]  ? trace_preempt_on+0x20/0xc0
[   17.518317]  ? __pfx_kthread+0x10/0x10
[   17.518345]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.518376]  ? calculate_sigpending+0x7b/0xa0
[   17.518409]  ? __pfx_kthread+0x10/0x10
[   17.518439]  ret_from_fork+0x116/0x1d0
[   17.518464]  ? __pfx_kthread+0x10/0x10
[   17.518492]  ret_from_fork_asm+0x1a/0x30
[   17.518583]  </TASK>
[   17.518624] 
[   17.542674] The buggy address belongs to the physical page:
[   17.543366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103978
[   17.544168] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.545185] flags: 0x200000000000040(head|node=0|zone=2)
[   17.545978] page_type: f8(unknown)
[   17.546459] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.547460] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.548283] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.549116] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.549934] head: 0200000000000002 ffffea00040e5e01 00000000ffffffff 00000000ffffffff
[   17.550746] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.551464] page dumped because: kasan: bad access detected
[   17.552102] 
[   17.552341] Memory state around the buggy address:
[   17.553107]  ffff888103979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.553721]  ffff88810397a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.554652] >ffff88810397a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.555320]                                                  ^
[   17.555792]  ffff88810397a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.556846]  ffff88810397a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.557358] ==================================================================

[   20.181325] ==================================================================
[   20.181978] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   20.182666] Write of size 1 at addr ffff000001b868eb by task kunit_try_catch/211
[   20.183334] 
[   20.183483] CPU: 4 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.183514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.183522] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.183532] Call trace:
[   20.183538]  show_stack+0x20/0x38 (C)
[   20.183558]  dump_stack_lvl+0x8c/0xd0
[   20.183579]  print_report+0x118/0x608
[   20.183600]  kasan_report+0xdc/0x128
[   20.183621]  __asan_report_store1_noabort+0x20/0x30
[   20.183639]  krealloc_less_oob_helper+0xa58/0xc50
[   20.183659]  krealloc_less_oob+0x20/0x38
[   20.183678]  kunit_try_run_case+0x170/0x3f0
[   20.183698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.183722]  kthread+0x328/0x630
[   20.183737]  ret_from_fork+0x10/0x20
[   20.183756] 
[   20.189683] Allocated by task 211:
[   20.189996]  kasan_save_stack+0x3c/0x68
[   20.190357]  kasan_save_track+0x20/0x40
[   20.190718]  kasan_save_alloc_info+0x40/0x58
[   20.191120]  __kasan_krealloc+0x118/0x178
[   20.191496]  krealloc_noprof+0x128/0x360
[   20.191864]  krealloc_less_oob_helper+0x168/0xc50
[   20.192300]  krealloc_less_oob+0x20/0x38
[   20.192666]  kunit_try_run_case+0x170/0x3f0
[   20.193056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.193563]  kthread+0x328/0x630
[   20.193866]  ret_from_fork+0x10/0x20
[   20.194203] 
[   20.194348] The buggy address belongs to the object at ffff000001b86800
[   20.194348]  which belongs to the cache kmalloc-256 of size 256
[   20.195461] The buggy address is located 34 bytes to the right of
[   20.195461]  allocated 201-byte region [ffff000001b86800, ffff000001b868c9)
[   20.196624] 
[   20.196770] The buggy address belongs to the physical page:
[   20.197273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b86
[   20.197978] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.198668] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.199299] page_type: f5(slab)
[   20.199595] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.200294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.200992] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.201699] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.202405] head: 03fffe0000000001 fffffdffc006e181 00000000ffffffff 00000000ffffffff
[   20.203111] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.203812] page dumped because: kasan: bad access detected
[   20.204315] 
[   20.204460] Memory state around the buggy address:
[   20.204894]  ffff000001b86780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.205545]  ffff000001b86800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.206196] >ffff000001b86880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.206843]                                                           ^
[   20.207439]  ffff000001b86900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.208091]  ffff000001b86980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.208739] ==================================================================
[   20.124823] ==================================================================
[   20.125498] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   20.126197] Write of size 1 at addr ffff000001b868da by task kunit_try_catch/211
[   20.126867] 
[   20.127021] CPU: 4 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.127057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.127066] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.127077] Call trace:
[   20.127086]  show_stack+0x20/0x38 (C)
[   20.127110]  dump_stack_lvl+0x8c/0xd0
[   20.127133]  print_report+0x118/0x608
[   20.127155]  kasan_report+0xdc/0x128
[   20.127176]  __asan_report_store1_noabort+0x20/0x30
[   20.127195]  krealloc_less_oob_helper+0xa80/0xc50
[   20.127215]  krealloc_less_oob+0x20/0x38
[   20.127234]  kunit_try_run_case+0x170/0x3f0
[   20.127256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.127280]  kthread+0x328/0x630
[   20.127297]  ret_from_fork+0x10/0x20
[   20.127317] 
[   20.133246] Allocated by task 211:
[   20.133562]  kasan_save_stack+0x3c/0x68
[   20.133926]  kasan_save_track+0x20/0x40
[   20.134287]  kasan_save_alloc_info+0x40/0x58
[   20.134689]  __kasan_krealloc+0x118/0x178
[   20.135066]  krealloc_noprof+0x128/0x360
[   20.135435]  krealloc_less_oob_helper+0x168/0xc50
[   20.135870]  krealloc_less_oob+0x20/0x38
[   20.136237]  kunit_try_run_case+0x170/0x3f0
[   20.136627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.137135]  kthread+0x328/0x630
[   20.137437]  ret_from_fork+0x10/0x20
[   20.137773] 
[   20.137919] The buggy address belongs to the object at ffff000001b86800
[   20.137919]  which belongs to the cache kmalloc-256 of size 256
[   20.139034] The buggy address is located 17 bytes to the right of
[   20.139034]  allocated 201-byte region [ffff000001b86800, ffff000001b868c9)
[   20.140198] 
[   20.140344] The buggy address belongs to the physical page:
[   20.140848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b86
[   20.141557] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.142248] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.142884] page_type: f5(slab)
[   20.143182] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.143882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.144581] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.145286] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.145992] head: 03fffe0000000001 fffffdffc006e181 00000000ffffffff 00000000ffffffff
[   20.146698] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.147399] page dumped because: kasan: bad access detected
[   20.147902] 
[   20.148047] Memory state around the buggy address:
[   20.148484]  ffff000001b86780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.149137]  ffff000001b86800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.149788] >ffff000001b86880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.150436]                                                     ^
[   20.150988]  ffff000001b86900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.151639]  ffff000001b86980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.152288] ==================================================================
[   20.306902] ==================================================================
[   20.307592] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   20.308311] Write of size 1 at addr ffff00000dafa0da by task kunit_try_catch/215
[   20.308983] 
[   20.309140] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.309176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.309186] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.309199] Call trace:
[   20.309207]  show_stack+0x20/0x38 (C)
[   20.309232]  dump_stack_lvl+0x8c/0xd0
[   20.309258]  print_report+0x118/0x608
[   20.309282]  kasan_report+0xdc/0x128
[   20.309304]  __asan_report_store1_noabort+0x20/0x30
[   20.309326]  krealloc_less_oob_helper+0xa80/0xc50
[   20.309349]  krealloc_large_less_oob+0x20/0x38
[   20.309370]  kunit_try_run_case+0x170/0x3f0
[   20.309395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.309421]  kthread+0x328/0x630
[   20.309441]  ret_from_fork+0x10/0x20
[   20.309463] 
[   20.315447] The buggy address belongs to the physical page:
[   20.315952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8
[   20.316662] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.317354] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.317992] page_type: f8(unknown)
[   20.318316] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.319017] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.319719] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.320428] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.321137] head: 03fffe0000000002 fffffdffc036be01 00000000ffffffff 00000000ffffffff
[   20.321845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.322549] page dumped because: kasan: bad access detected
[   20.323053] 
[   20.323198] Memory state around the buggy address:
[   20.323636]  ffff00000daf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.324289]  ffff00000dafa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.324943] >ffff00000dafa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.325594]                                                     ^
[   20.326147]  ffff00000dafa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.326800]  ffff00000dafa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.327451] ==================================================================
[   20.067308] ==================================================================
[   20.068340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   20.069046] Write of size 1 at addr ffff000001b868c9 by task kunit_try_catch/211
[   20.069718] 
[   20.069873] CPU: 2 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.069909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.069919] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.069932] Call trace:
[   20.069940]  show_stack+0x20/0x38 (C)
[   20.069965]  dump_stack_lvl+0x8c/0xd0
[   20.069991]  print_report+0x118/0x608
[   20.070016]  kasan_report+0xdc/0x128
[   20.070038]  __asan_report_store1_noabort+0x20/0x30
[   20.070059]  krealloc_less_oob_helper+0xa48/0xc50
[   20.070082]  krealloc_less_oob+0x20/0x38
[   20.070103]  kunit_try_run_case+0x170/0x3f0
[   20.070128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.070155]  kthread+0x328/0x630
[   20.070174]  ret_from_fork+0x10/0x20
[   20.070197] 
[   20.076131] Allocated by task 211:
[   20.076448]  kasan_save_stack+0x3c/0x68
[   20.076811]  kasan_save_track+0x20/0x40
[   20.077173]  kasan_save_alloc_info+0x40/0x58
[   20.077576]  __kasan_krealloc+0x118/0x178
[   20.077954]  krealloc_noprof+0x128/0x360
[   20.078325]  krealloc_less_oob_helper+0x168/0xc50
[   20.078763]  krealloc_less_oob+0x20/0x38
[   20.079131]  kunit_try_run_case+0x170/0x3f0
[   20.079523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.080032]  kthread+0x328/0x630
[   20.080337]  ret_from_fork+0x10/0x20
[   20.080676] 
[   20.080822] The buggy address belongs to the object at ffff000001b86800
[   20.080822]  which belongs to the cache kmalloc-256 of size 256
[   20.081940] The buggy address is located 0 bytes to the right of
[   20.081940]  allocated 201-byte region [ffff000001b86800, ffff000001b868c9)
[   20.083097] 
[   20.083245] The buggy address belongs to the physical page:
[   20.083750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b86
[   20.084461] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.085153] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.085791] page_type: f5(slab)
[   20.086093] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.086795] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.087497] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.088206] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.088916] head: 03fffe0000000001 fffffdffc006e181 00000000ffffffff 00000000ffffffff
[   20.089625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.090328] page dumped because: kasan: bad access detected
[   20.090832] 
[   20.090976] Memory state around the buggy address:
[   20.091415]  ffff000001b86780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.092069]  ffff000001b86800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.092722] >ffff000001b86880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.093373]                                               ^
[   20.093879]  ffff000001b86900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.094533]  ffff000001b86980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.095183] ==================================================================
[   20.153124] ==================================================================
[   20.153779] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   20.154465] Write of size 1 at addr ffff000001b868ea by task kunit_try_catch/211
[   20.155133] 
[   20.155282] CPU: 4 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.155313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.155322] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.155332] Call trace:
[   20.155338]  show_stack+0x20/0x38 (C)
[   20.155359]  dump_stack_lvl+0x8c/0xd0
[   20.155380]  print_report+0x118/0x608
[   20.155401]  kasan_report+0xdc/0x128
[   20.155422]  __asan_report_store1_noabort+0x20/0x30
[   20.155440]  krealloc_less_oob_helper+0xae4/0xc50
[   20.155460]  krealloc_less_oob+0x20/0x38
[   20.155479]  kunit_try_run_case+0x170/0x3f0
[   20.155499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.155523]  kthread+0x328/0x630
[   20.155538]  ret_from_fork+0x10/0x20
[   20.155557] 
[   20.161485] Allocated by task 211:
[   20.161799]  kasan_save_stack+0x3c/0x68
[   20.162159]  kasan_save_track+0x20/0x40
[   20.162520]  kasan_save_alloc_info+0x40/0x58
[   20.162920]  __kasan_krealloc+0x118/0x178
[   20.163297]  krealloc_noprof+0x128/0x360
[   20.163664]  krealloc_less_oob_helper+0x168/0xc50
[   20.164099]  krealloc_less_oob+0x20/0x38
[   20.164465]  kunit_try_run_case+0x170/0x3f0
[   20.164856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.165363]  kthread+0x328/0x630
[   20.165667]  ret_from_fork+0x10/0x20
[   20.166003] 
[   20.166147] The buggy address belongs to the object at ffff000001b86800
[   20.166147]  which belongs to the cache kmalloc-256 of size 256
[   20.167261] The buggy address is located 33 bytes to the right of
[   20.167261]  allocated 201-byte region [ffff000001b86800, ffff000001b868c9)
[   20.168423] 
[   20.168568] The buggy address belongs to the physical page:
[   20.169072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b86
[   20.169778] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.170467] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.171098] page_type: f5(slab)
[   20.171394] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.172092] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.172790] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.173497] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.174203] head: 03fffe0000000001 fffffdffc006e181 00000000ffffffff 00000000ffffffff
[   20.174909] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.175609] page dumped because: kasan: bad access detected
[   20.176112] 
[   20.176256] Memory state around the buggy address:
[   20.176693]  ffff000001b86780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.177344]  ffff000001b86800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.177994] >ffff000001b86880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.178643]                                                           ^
[   20.179239]  ffff000001b86900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179889]  ffff000001b86980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.180538] ==================================================================
[   20.261344] ==================================================================
[   20.262484] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   20.263234] Write of size 1 at addr ffff00000dafa0c9 by task kunit_try_catch/215
[   20.263947] 
[   20.264130] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.264208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.264230] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.264257] Call trace:
[   20.264274]  show_stack+0x20/0x38 (C)
[   20.264330]  dump_stack_lvl+0x8c/0xd0
[   20.264386]  print_report+0x118/0x608
[   20.264442]  kasan_report+0xdc/0x128
[   20.264494]  __asan_report_store1_noabort+0x20/0x30
[   20.264544]  krealloc_less_oob_helper+0xa48/0xc50
[   20.264596]  krealloc_large_less_oob+0x20/0x38
[   20.264647]  kunit_try_run_case+0x170/0x3f0
[   20.264703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.264764]  kthread+0x328/0x630
[   20.264807]  ret_from_fork+0x10/0x20
[   20.264858] 
[   20.270993] The buggy address belongs to the physical page:
[   20.271528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8
[   20.272281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.273013] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.273694] page_type: f8(unknown)
[   20.274055] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.274800] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.275545] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.276297] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.277050] head: 03fffe0000000002 fffffdffc036be01 00000000ffffffff 00000000ffffffff
[   20.277803] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.278542] page dumped because: kasan: bad access detected
[   20.279076] 
[   20.279243] Memory state around the buggy address:
[   20.279711]  ffff00000daf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.280404]  ffff00000dafa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.281095] >ffff00000dafa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.281778]                                               ^
[   20.282318]  ffff00000dafa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.283009]  ffff00000dafa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.283693] ==================================================================
[   20.284821] ==================================================================
[   20.285521] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   20.286251] Write of size 1 at addr ffff00000dafa0d0 by task kunit_try_catch/215
[   20.286935] 
[   20.287098] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.287146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.287160] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.287176] Call trace:
[   20.287187]  show_stack+0x20/0x38 (C)
[   20.287220]  dump_stack_lvl+0x8c/0xd0
[   20.287255]  print_report+0x118/0x608
[   20.287288]  kasan_report+0xdc/0x128
[   20.287319]  __asan_report_store1_noabort+0x20/0x30
[   20.287348]  krealloc_less_oob_helper+0xb9c/0xc50
[   20.287380]  krealloc_large_less_oob+0x20/0x38
[   20.287411]  kunit_try_run_case+0x170/0x3f0
[   20.287444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.287481]  kthread+0x328/0x630
[   20.287507]  ret_from_fork+0x10/0x20
[   20.287538] 
[   20.293565] The buggy address belongs to the physical page:
[   20.294080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8
[   20.294801] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.295506] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.296156] page_type: f8(unknown)
[   20.296490] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.297204] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.297919] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.298640] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.299362] head: 03fffe0000000002 fffffdffc036be01 00000000ffffffff 00000000ffffffff
[   20.300083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.300797] page dumped because: kasan: bad access detected
[   20.301311] 
[   20.301463] Memory state around the buggy address:
[   20.301910]  ffff00000daf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.302574]  ffff00000dafa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.303238] >ffff00000dafa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.303898]                                                  ^
[   20.304439]  ffff00000dafa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.305103]  ffff00000dafa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.305763] ==================================================================
[   20.328197] ==================================================================
[   20.328853] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   20.329545] Write of size 1 at addr ffff00000dafa0ea by task kunit_try_catch/215
[   20.330215] 
[   20.330370] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.330403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.330413] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.330424] Call trace:
[   20.330432]  show_stack+0x20/0x38 (C)
[   20.330455]  dump_stack_lvl+0x8c/0xd0
[   20.330480]  print_report+0x118/0x608
[   20.330503]  kasan_report+0xdc/0x128
[   20.330525]  __asan_report_store1_noabort+0x20/0x30
[   20.330546]  krealloc_less_oob_helper+0xae4/0xc50
[   20.330568]  krealloc_large_less_oob+0x20/0x38
[   20.330590]  kunit_try_run_case+0x170/0x3f0
[   20.330613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.330640]  kthread+0x328/0x630
[   20.330658]  ret_from_fork+0x10/0x20
[   20.330680] 
[   20.336662] The buggy address belongs to the physical page:
[   20.337166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8
[   20.337876] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.338567] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.339202] page_type: f8(unknown)
[   20.339524] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.340226] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.340928] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.341636] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.342345] head: 03fffe0000000002 fffffdffc036be01 00000000ffffffff 00000000ffffffff
[   20.343054] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.343757] page dumped because: kasan: bad access detected
[   20.344261] 
[   20.344406] Memory state around the buggy address:
[   20.344843]  ffff00000daf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.345497]  ffff00000dafa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.346150] >ffff00000dafa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.346800]                                                           ^
[   20.347399]  ffff00000dafa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.348052]  ffff00000dafa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.348702] ==================================================================
[   20.095991] ==================================================================
[   20.096651] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   20.097365] Write of size 1 at addr ffff000001b868d0 by task kunit_try_catch/211
[   20.098038] 
[   20.098194] CPU: 2 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.098231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.098241] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.098253] Call trace:
[   20.098261]  show_stack+0x20/0x38 (C)
[   20.098285]  dump_stack_lvl+0x8c/0xd0
[   20.098311]  print_report+0x118/0x608
[   20.098335]  kasan_report+0xdc/0x128
[   20.098358]  __asan_report_store1_noabort+0x20/0x30
[   20.098379]  krealloc_less_oob_helper+0xb9c/0xc50
[   20.098401]  krealloc_less_oob+0x20/0x38
[   20.098422]  kunit_try_run_case+0x170/0x3f0
[   20.098447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.098473]  kthread+0x328/0x630
[   20.098492]  ret_from_fork+0x10/0x20
[   20.098515] 
[   20.104453] Allocated by task 211:
[   20.104771]  kasan_save_stack+0x3c/0x68
[   20.105137]  kasan_save_track+0x20/0x40
[   20.105500]  kasan_save_alloc_info+0x40/0x58
[   20.105902]  __kasan_krealloc+0x118/0x178
[   20.106280]  krealloc_noprof+0x128/0x360
[   20.106652]  krealloc_less_oob_helper+0x168/0xc50
[   20.107090]  krealloc_less_oob+0x20/0x38
[   20.107459]  kunit_try_run_case+0x170/0x3f0
[   20.107851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.108360]  kthread+0x328/0x630
[   20.108666]  ret_from_fork+0x10/0x20
[   20.109006] 
[   20.109153] The buggy address belongs to the object at ffff000001b86800
[   20.109153]  which belongs to the cache kmalloc-256 of size 256
[   20.110271] The buggy address is located 7 bytes to the right of
[   20.110271]  allocated 201-byte region [ffff000001b86800, ffff000001b868c9)
[   20.111429] 
[   20.111576] The buggy address belongs to the physical page:
[   20.112082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b86
[   20.112792] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.113484] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.114121] page_type: f5(slab)
[   20.114423] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.115124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.115826] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.116535] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.117245] head: 03fffe0000000001 fffffdffc006e181 00000000ffffffff 00000000ffffffff
[   20.117955] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.118658] page dumped because: kasan: bad access detected
[   20.119163] 
[   20.119310] Memory state around the buggy address:
[   20.119748]  ffff000001b86780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.120402]  ffff000001b86800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.121056] >ffff000001b86880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.121705]                                                  ^
[   20.122235]  ffff000001b86900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.122888]  ffff000001b86980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.123538] ==================================================================
[   20.350025] ==================================================================
[   20.350700] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   20.351398] Write of size 1 at addr ffff00000dafa0eb by task kunit_try_catch/215
[   20.352070] 
[   20.352223] CPU: 4 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.352258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.352268] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.352279] Call trace:
[   20.352287]  show_stack+0x20/0x38 (C)
[   20.352312]  dump_stack_lvl+0x8c/0xd0
[   20.352335]  print_report+0x118/0x608
[   20.352357]  kasan_report+0xdc/0x128
[   20.352378]  __asan_report_store1_noabort+0x20/0x30
[   20.352396]  krealloc_less_oob_helper+0xa58/0xc50
[   20.352417]  krealloc_large_less_oob+0x20/0x38
[   20.352436]  kunit_try_run_case+0x170/0x3f0
[   20.352459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.352483]  kthread+0x328/0x630
[   20.352500]  ret_from_fork+0x10/0x20
[   20.352520] 
[   20.358496] The buggy address belongs to the physical page:
[   20.359000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8
[   20.359709] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.360400] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.361035] page_type: f8(unknown)
[   20.361357] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.362056] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.362756] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.363462] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.364169] head: 03fffe0000000002 fffffdffc036be01 00000000ffffffff 00000000ffffffff
[   20.364874] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.365576] page dumped because: kasan: bad access detected
[   20.366078] 
[   20.366222] Memory state around the buggy address:
[   20.366659]  ffff00000daf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.367311]  ffff00000dafa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.367961] >ffff00000dafa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.368610]                                                           ^
[   20.369207]  ffff00000dafa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.369858]  ffff00000dafa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.370506] ==================================================================