Hay
Date
July 3, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.519998] ==================================================================
[   19.520143] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.520282] Write of size 1 at addr fff00000c656e0c9 by task kunit_try_catch/162
[   19.520400] 
[   19.520531] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.520748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.520810] Hardware name: linux,dummy-virt (DT)
[   19.520882] Call trace:
[   19.520927]  show_stack+0x20/0x38 (C)
[   19.521017]  dump_stack_lvl+0x8c/0xd0
[   19.521131]  print_report+0x118/0x608
[   19.521230]  kasan_report+0xdc/0x128
[   19.521333]  __asan_report_store1_noabort+0x20/0x30
[   19.521440]  krealloc_less_oob_helper+0xa48/0xc50
[   19.521914]  krealloc_large_less_oob+0x20/0x38
[   19.522059]  kunit_try_run_case+0x170/0x3f0
[   19.522173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.522278]  kthread+0x328/0x630
[   19.522370]  ret_from_fork+0x10/0x20
[   19.522466] 
[   19.522510] The buggy address belongs to the physical page:
[   19.522578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656c
[   19.522772] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.522879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.523005] page_type: f8(unknown)
[   19.523181] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.523309] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.523424] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.523532] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.523632] head: 0bfffe0000000002 ffffc1ffc3195b01 00000000ffffffff 00000000ffffffff
[   19.524201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.524301] page dumped because: kasan: bad access detected
[   19.524413] 
[   19.524550] Memory state around the buggy address:
[   19.524645]  fff00000c656df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.524757]  fff00000c656e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.524848] >fff00000c656e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.525264]                                               ^
[   19.525666]  fff00000c656e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.525983]  fff00000c656e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.526091] ==================================================================
[   19.442641] ==================================================================
[   19.442798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.442935] Write of size 1 at addr fff00000c17b32ea by task kunit_try_catch/158
[   19.443068] 
[   19.443130] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.443282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.443675] Hardware name: linux,dummy-virt (DT)
[   19.443771] Call trace:
[   19.443818]  show_stack+0x20/0x38 (C)
[   19.443920]  dump_stack_lvl+0x8c/0xd0
[   19.444036]  print_report+0x118/0x608
[   19.444143]  kasan_report+0xdc/0x128
[   19.444243]  __asan_report_store1_noabort+0x20/0x30
[   19.444348]  krealloc_less_oob_helper+0xae4/0xc50
[   19.444455]  krealloc_less_oob+0x20/0x38
[   19.444570]  kunit_try_run_case+0x170/0x3f0
[   19.444683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.444804]  kthread+0x328/0x630
[   19.444894]  ret_from_fork+0x10/0x20
[   19.444995] 
[   19.445051] Allocated by task 158:
[   19.445123]  kasan_save_stack+0x3c/0x68
[   19.445204]  kasan_save_track+0x20/0x40
[   19.445402]  kasan_save_alloc_info+0x40/0x58
[   19.445745]  __kasan_krealloc+0x118/0x178
[   19.446003]  krealloc_noprof+0x128/0x360
[   19.446190]  krealloc_less_oob_helper+0x168/0xc50
[   19.446320]  krealloc_less_oob+0x20/0x38
[   19.446554]  kunit_try_run_case+0x170/0x3f0
[   19.446659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.446768]  kthread+0x328/0x630
[   19.446845]  ret_from_fork+0x10/0x20
[   19.446956] 
[   19.447046] The buggy address belongs to the object at fff00000c17b3200
[   19.447046]  which belongs to the cache kmalloc-256 of size 256
[   19.447224] The buggy address is located 33 bytes to the right of
[   19.447224]  allocated 201-byte region [fff00000c17b3200, fff00000c17b32c9)
[   19.447358] 
[   19.447403] The buggy address belongs to the physical page:
[   19.447469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b2
[   19.447586] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.447687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.447797] page_type: f5(slab)
[   19.447876] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.447992] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.448115] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.448232] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.448333] head: 0bfffe0000000001 ffffc1ffc305ec81 00000000ffffffff 00000000ffffffff
[   19.448840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.449101] page dumped because: kasan: bad access detected
[   19.449350] 
[   19.449445] Memory state around the buggy address:
[   19.449541]  fff00000c17b3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.449629]  fff00000c17b3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.449717] >fff00000c17b3280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.450061]                                                           ^
[   19.450158]  fff00000c17b3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.450235]  fff00000c17b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.450449] ==================================================================
[   19.565328] ==================================================================
[   19.565411] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.565514] Write of size 1 at addr fff00000c656e0eb by task kunit_try_catch/162
[   19.565630] 
[   19.565751] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.565910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.565960] Hardware name: linux,dummy-virt (DT)
[   19.566056] Call trace:
[   19.566101]  show_stack+0x20/0x38 (C)
[   19.566200]  dump_stack_lvl+0x8c/0xd0
[   19.566289]  print_report+0x118/0x608
[   19.566376]  kasan_report+0xdc/0x128
[   19.566470]  __asan_report_store1_noabort+0x20/0x30
[   19.566552]  krealloc_less_oob_helper+0xa58/0xc50
[   19.566624]  krealloc_large_less_oob+0x20/0x38
[   19.566717]  kunit_try_run_case+0x170/0x3f0
[   19.566831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.567011]  kthread+0x328/0x630
[   19.567158]  ret_from_fork+0x10/0x20
[   19.567306] 
[   19.567367] The buggy address belongs to the physical page:
[   19.567457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656c
[   19.567577] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.567716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.567826] page_type: f8(unknown)
[   19.567924] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.568098] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.568344] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.568763] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.568864] head: 0bfffe0000000002 ffffc1ffc3195b01 00000000ffffffff 00000000ffffffff
[   19.569184] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.569275] page dumped because: kasan: bad access detected
[   19.569350] 
[   19.569409] Memory state around the buggy address:
[   19.569563]  fff00000c656df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.569658]  fff00000c656e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.569764] >fff00000c656e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.569846]                                                           ^
[   19.569989]  fff00000c656e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.570153]  fff00000c656e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.570231] ==================================================================
[   19.413629] ==================================================================
[   19.413809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.413909] Write of size 1 at addr fff00000c17b32c9 by task kunit_try_catch/158
[   19.414046] 
[   19.414150] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.414391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.414466] Hardware name: linux,dummy-virt (DT)
[   19.414645] Call trace:
[   19.414712]  show_stack+0x20/0x38 (C)
[   19.414824]  dump_stack_lvl+0x8c/0xd0
[   19.414927]  print_report+0x118/0x608
[   19.415078]  kasan_report+0xdc/0x128
[   19.415194]  __asan_report_store1_noabort+0x20/0x30
[   19.415378]  krealloc_less_oob_helper+0xa48/0xc50
[   19.415557]  krealloc_less_oob+0x20/0x38
[   19.415644]  kunit_try_run_case+0x170/0x3f0
[   19.415734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.415840]  kthread+0x328/0x630
[   19.415959]  ret_from_fork+0x10/0x20
[   19.416223] 
[   19.416265] Allocated by task 158:
[   19.416344]  kasan_save_stack+0x3c/0x68
[   19.416438]  kasan_save_track+0x20/0x40
[   19.416530]  kasan_save_alloc_info+0x40/0x58
[   19.416625]  __kasan_krealloc+0x118/0x178
[   19.416711]  krealloc_noprof+0x128/0x360
[   19.416790]  krealloc_less_oob_helper+0x168/0xc50
[   19.416876]  krealloc_less_oob+0x20/0x38
[   19.416947]  kunit_try_run_case+0x170/0x3f0
[   19.417042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.417139]  kthread+0x328/0x630
[   19.417210]  ret_from_fork+0x10/0x20
[   19.417286] 
[   19.417325] The buggy address belongs to the object at fff00000c17b3200
[   19.417325]  which belongs to the cache kmalloc-256 of size 256
[   19.417457] The buggy address is located 0 bytes to the right of
[   19.417457]  allocated 201-byte region [fff00000c17b3200, fff00000c17b32c9)
[   19.417656] 
[   19.418114] The buggy address belongs to the physical page:
[   19.418452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b2
[   19.418615] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.418730] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.418874] page_type: f5(slab)
[   19.418960] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.419069] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.419169] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.419464] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.419616] head: 0bfffe0000000001 ffffc1ffc305ec81 00000000ffffffff 00000000ffffffff
[   19.419793] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.419889] page dumped because: kasan: bad access detected
[   19.419978] 
[   19.420079] Memory state around the buggy address:
[   19.420202]  fff00000c17b3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420342]  fff00000c17b3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.420440] >fff00000c17b3280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.420527]                                               ^
[   19.420606]  fff00000c17b3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420709]  fff00000c17b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420811] ==================================================================
[   19.432735] ==================================================================
[   19.432889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.433036] Write of size 1 at addr fff00000c17b32da by task kunit_try_catch/158
[   19.433190] 
[   19.433272] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.433440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.433499] Hardware name: linux,dummy-virt (DT)
[   19.433568] Call trace:
[   19.433612]  show_stack+0x20/0x38 (C)
[   19.433714]  dump_stack_lvl+0x8c/0xd0
[   19.433802]  print_report+0x118/0x608
[   19.433897]  kasan_report+0xdc/0x128
[   19.434341]  __asan_report_store1_noabort+0x20/0x30
[   19.434450]  krealloc_less_oob_helper+0xa80/0xc50
[   19.434559]  krealloc_less_oob+0x20/0x38
[   19.434663]  kunit_try_run_case+0x170/0x3f0
[   19.435713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.435916]  kthread+0x328/0x630
[   19.436006]  ret_from_fork+0x10/0x20
[   19.436132] 
[   19.436199] Allocated by task 158:
[   19.436288]  kasan_save_stack+0x3c/0x68
[   19.436409]  kasan_save_track+0x20/0x40
[   19.436697]  kasan_save_alloc_info+0x40/0x58
[   19.436889]  __kasan_krealloc+0x118/0x178
[   19.437014]  krealloc_noprof+0x128/0x360
[   19.437142]  krealloc_less_oob_helper+0x168/0xc50
[   19.437230]  krealloc_less_oob+0x20/0x38
[   19.437301]  kunit_try_run_case+0x170/0x3f0
[   19.437378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.437473]  kthread+0x328/0x630
[   19.437542]  ret_from_fork+0x10/0x20
[   19.437618] 
[   19.437660] The buggy address belongs to the object at fff00000c17b3200
[   19.437660]  which belongs to the cache kmalloc-256 of size 256
[   19.437780] The buggy address is located 17 bytes to the right of
[   19.437780]  allocated 201-byte region [fff00000c17b3200, fff00000c17b32c9)
[   19.437922] 
[   19.437962] The buggy address belongs to the physical page:
[   19.438051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b2
[   19.438156] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.438825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.438993] page_type: f5(slab)
[   19.439078] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.439371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.439488] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.439630] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.439740] head: 0bfffe0000000001 ffffc1ffc305ec81 00000000ffffffff 00000000ffffffff
[   19.439849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.439937] page dumped because: kasan: bad access detected
[   19.440002] 
[   19.440052] Memory state around the buggy address:
[   19.440121]  fff00000c17b3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440219]  fff00000c17b3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.440316] >fff00000c17b3280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.440399]                                                     ^
[   19.440481]  fff00000c17b3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440591]  fff00000c17b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440683] ==================================================================
[   19.425208] ==================================================================
[   19.425452] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.425906] Write of size 1 at addr fff00000c17b32d0 by task kunit_try_catch/158
[   19.426222] 
[   19.426385] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.426660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.426935] Hardware name: linux,dummy-virt (DT)
[   19.427016] Call trace:
[   19.427091]  show_stack+0x20/0x38 (C)
[   19.427224]  dump_stack_lvl+0x8c/0xd0
[   19.427313]  print_report+0x118/0x608
[   19.427380]  kasan_report+0xdc/0x128
[   19.427433]  __asan_report_store1_noabort+0x20/0x30
[   19.427480]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.427528]  krealloc_less_oob+0x20/0x38
[   19.427572]  kunit_try_run_case+0x170/0x3f0
[   19.427620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.427671]  kthread+0x328/0x630
[   19.427712]  ret_from_fork+0x10/0x20
[   19.427759] 
[   19.427779] Allocated by task 158:
[   19.427809]  kasan_save_stack+0x3c/0x68
[   19.427853]  kasan_save_track+0x20/0x40
[   19.427890]  kasan_save_alloc_info+0x40/0x58
[   19.427928]  __kasan_krealloc+0x118/0x178
[   19.427964]  krealloc_noprof+0x128/0x360
[   19.428000]  krealloc_less_oob_helper+0x168/0xc50
[   19.428070]  krealloc_less_oob+0x20/0x38
[   19.428142]  kunit_try_run_case+0x170/0x3f0
[   19.428243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.428334]  kthread+0x328/0x630
[   19.428402]  ret_from_fork+0x10/0x20
[   19.428474] 
[   19.428522] The buggy address belongs to the object at fff00000c17b3200
[   19.428522]  which belongs to the cache kmalloc-256 of size 256
[   19.428669] The buggy address is located 7 bytes to the right of
[   19.428669]  allocated 201-byte region [fff00000c17b3200, fff00000c17b32c9)
[   19.428871] 
[   19.428929] The buggy address belongs to the physical page:
[   19.428990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b2
[   19.429139] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.429258] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.429417] page_type: f5(slab)
[   19.429528] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.429639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.429731] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.429829] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.430193] head: 0bfffe0000000001 ffffc1ffc305ec81 00000000ffffffff 00000000ffffffff
[   19.430289] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.430372] page dumped because: kasan: bad access detected
[   19.430432] 
[   19.430463] Memory state around the buggy address:
[   19.430835]  fff00000c17b3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.430993]  fff00000c17b3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.431143] >fff00000c17b3280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.431231]                                                  ^
[   19.431311]  fff00000c17b3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431404]  fff00000c17b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431486] ==================================================================
[   19.529695] ==================================================================
[   19.529820] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.529934] Write of size 1 at addr fff00000c656e0d0 by task kunit_try_catch/162
[   19.530055] 
[   19.530123] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.530306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.530371] Hardware name: linux,dummy-virt (DT)
[   19.530438] Call trace:
[   19.530497]  show_stack+0x20/0x38 (C)
[   19.530616]  dump_stack_lvl+0x8c/0xd0
[   19.532386]  print_report+0x118/0x608
[   19.533331]  kasan_report+0xdc/0x128
[   19.534491]  __asan_report_store1_noabort+0x20/0x30
[   19.534614]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.535633]  krealloc_large_less_oob+0x20/0x38
[   19.535790]  kunit_try_run_case+0x170/0x3f0
[   19.537879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.538002]  kthread+0x328/0x630
[   19.539984]  ret_from_fork+0x10/0x20
[   19.540940] 
[   19.541782] The buggy address belongs to the physical page:
[   19.541863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656c
[   19.541988] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.544051] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.545051] page_type: f8(unknown)
[   19.545572] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.545933] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.546203] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.546894] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.547513] head: 0bfffe0000000002 ffffc1ffc3195b01 00000000ffffffff 00000000ffffffff
[   19.547763] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.548242] page dumped because: kasan: bad access detected
[   19.548522] 
[   19.548578] Memory state around the buggy address:
[   19.548664]  fff00000c656df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.549712]  fff00000c656e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.549921] >fff00000c656e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.549990]                                                  ^
[   19.550101]  fff00000c656e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.551684]  fff00000c656e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.551806] ==================================================================
[   19.554598] ==================================================================
[   19.554805] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.554936] Write of size 1 at addr fff00000c656e0da by task kunit_try_catch/162
[   19.555446] 
[   19.555608] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.555880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.555940] Hardware name: linux,dummy-virt (DT)
[   19.556398] Call trace:
[   19.556522]  show_stack+0x20/0x38 (C)
[   19.556675]  dump_stack_lvl+0x8c/0xd0
[   19.556847]  print_report+0x118/0x608
[   19.556950]  kasan_report+0xdc/0x128
[   19.557056]  __asan_report_store1_noabort+0x20/0x30
[   19.557167]  krealloc_less_oob_helper+0xa80/0xc50
[   19.557305]  krealloc_large_less_oob+0x20/0x38
[   19.557451]  kunit_try_run_case+0x170/0x3f0
[   19.557596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.557758]  kthread+0x328/0x630
[   19.557844]  ret_from_fork+0x10/0x20
[   19.557946] 
[   19.558010] The buggy address belongs to the physical page:
[   19.558099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656c
[   19.558219] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.558324] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.558429] page_type: f8(unknown)
[   19.558497] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.558620] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.558718] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.558805] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.558896] head: 0bfffe0000000002 ffffc1ffc3195b01 00000000ffffffff 00000000ffffffff
[   19.558990] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.559147] page dumped because: kasan: bad access detected
[   19.559216] 
[   19.559256] Memory state around the buggy address:
[   19.559325]  fff00000c656df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.559419]  fff00000c656e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.559510] >fff00000c656e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.559599]                                                     ^
[   19.559712]  fff00000c656e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.559819]  fff00000c656e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.559909] ==================================================================
[   19.560903] ==================================================================
[   19.561038] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.561152] Write of size 1 at addr fff00000c656e0ea by task kunit_try_catch/162
[   19.561263] 
[   19.561338] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.561510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.561567] Hardware name: linux,dummy-virt (DT)
[   19.561633] Call trace:
[   19.561734]  show_stack+0x20/0x38 (C)
[   19.561832]  dump_stack_lvl+0x8c/0xd0
[   19.561916]  print_report+0x118/0x608
[   19.561999]  kasan_report+0xdc/0x128
[   19.562110]  __asan_report_store1_noabort+0x20/0x30
[   19.562241]  krealloc_less_oob_helper+0xae4/0xc50
[   19.562387]  krealloc_large_less_oob+0x20/0x38
[   19.562517]  kunit_try_run_case+0x170/0x3f0
[   19.562604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.562719]  kthread+0x328/0x630
[   19.562798]  ret_from_fork+0x10/0x20
[   19.562891] 
[   19.562928] The buggy address belongs to the physical page:
[   19.562981] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656c
[   19.563102] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.563187] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.563285] page_type: f8(unknown)
[   19.563399] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.563520] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.563648] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.563772] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.563918] head: 0bfffe0000000002 ffffc1ffc3195b01 00000000ffffffff 00000000ffffffff
[   19.564080] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.564200] page dumped because: kasan: bad access detected
[   19.564260] 
[   19.564296] Memory state around the buggy address:
[   19.564366]  fff00000c656df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.564509]  fff00000c656e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.564610] >fff00000c656e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.564729]                                                           ^
[   19.564850]  fff00000c656e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.564942]  fff00000c656e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.565036] ==================================================================
[   19.451862] ==================================================================
[   19.451968] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.452093] Write of size 1 at addr fff00000c17b32eb by task kunit_try_catch/158
[   19.452200] 
[   19.452261] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.452437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.452509] Hardware name: linux,dummy-virt (DT)
[   19.452586] Call trace:
[   19.452636]  show_stack+0x20/0x38 (C)
[   19.452745]  dump_stack_lvl+0x8c/0xd0
[   19.452861]  print_report+0x118/0x608
[   19.452974]  kasan_report+0xdc/0x128
[   19.453790]  __asan_report_store1_noabort+0x20/0x30
[   19.454115]  krealloc_less_oob_helper+0xa58/0xc50
[   19.454220]  krealloc_less_oob+0x20/0x38
[   19.454355]  kunit_try_run_case+0x170/0x3f0
[   19.454502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.454686]  kthread+0x328/0x630
[   19.454800]  ret_from_fork+0x10/0x20
[   19.454982] 
[   19.455042] Allocated by task 158:
[   19.455104]  kasan_save_stack+0x3c/0x68
[   19.455190]  kasan_save_track+0x20/0x40
[   19.455292]  kasan_save_alloc_info+0x40/0x58
[   19.455379]  __kasan_krealloc+0x118/0x178
[   19.455463]  krealloc_noprof+0x128/0x360
[   19.455574]  krealloc_less_oob_helper+0x168/0xc50
[   19.455656]  krealloc_less_oob+0x20/0x38
[   19.455730]  kunit_try_run_case+0x170/0x3f0
[   19.455811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.455925]  kthread+0x328/0x630
[   19.455999]  ret_from_fork+0x10/0x20
[   19.456129] 
[   19.456188] The buggy address belongs to the object at fff00000c17b3200
[   19.456188]  which belongs to the cache kmalloc-256 of size 256
[   19.456334] The buggy address is located 34 bytes to the right of
[   19.456334]  allocated 201-byte region [fff00000c17b3200, fff00000c17b32c9)
[   19.456510] 
[   19.456559] The buggy address belongs to the physical page:
[   19.456630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b2
[   19.456748] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.456850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.456957] page_type: f5(slab)
[   19.457048] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.457148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.457950] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.458142] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.458244] head: 0bfffe0000000001 ffffc1ffc305ec81 00000000ffffffff 00000000ffffffff
[   19.458556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.458672] page dumped because: kasan: bad access detected
[   19.458740] 
[   19.458777] Memory state around the buggy address:
[   19.458846]  fff00000c17b3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.458941]  fff00000c17b3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.459042] >fff00000c17b3280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.459137]                                                           ^
[   19.459217]  fff00000c17b3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459430]  fff00000c17b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459511] ==================================================================

[   11.244715] ==================================================================
[   11.245072] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.245439] Write of size 1 at addr ffff888100332eea by task kunit_try_catch/175
[   11.245819] 
[   11.245928] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.245979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.245990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.246008] Call Trace:
[   11.246024]  <TASK>
[   11.246039]  dump_stack_lvl+0x73/0xb0
[   11.246075]  print_report+0xd1/0x650
[   11.246097]  ? __virt_addr_valid+0x1db/0x2d0
[   11.246119]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.246152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.246172]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.246204]  kasan_report+0x141/0x180
[   11.246224]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.246251]  __asan_report_store1_noabort+0x1b/0x30
[   11.246281]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.246305]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.246366]  ? finish_task_switch.isra.0+0x153/0x700
[   11.246387]  ? __switch_to+0x47/0xf50
[   11.246410]  ? __schedule+0x10cc/0x2b60
[   11.246431]  ? __pfx_read_tsc+0x10/0x10
[   11.246454]  krealloc_less_oob+0x1c/0x30
[   11.246474]  kunit_try_run_case+0x1a5/0x480
[   11.246498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.246524]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.246546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.246567]  ? __kthread_parkme+0x82/0x180
[   11.246587]  ? preempt_count_sub+0x50/0x80
[   11.246608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.246630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.246651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.246673]  kthread+0x337/0x6f0
[   11.246691]  ? trace_preempt_on+0x20/0xc0
[   11.246713]  ? __pfx_kthread+0x10/0x10
[   11.246733]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.246752]  ? calculate_sigpending+0x7b/0xa0
[   11.246774]  ? __pfx_kthread+0x10/0x10
[   11.246794]  ret_from_fork+0x116/0x1d0
[   11.246812]  ? __pfx_kthread+0x10/0x10
[   11.246831]  ret_from_fork_asm+0x1a/0x30
[   11.246871]  </TASK>
[   11.246881] 
[   11.254938] Allocated by task 175:
[   11.255145]  kasan_save_stack+0x45/0x70
[   11.255535]  kasan_save_track+0x18/0x40
[   11.255753]  kasan_save_alloc_info+0x3b/0x50
[   11.255904]  __kasan_krealloc+0x190/0x1f0
[   11.256079]  krealloc_noprof+0xf3/0x340
[   11.256288]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.256598]  krealloc_less_oob+0x1c/0x30
[   11.256811]  kunit_try_run_case+0x1a5/0x480
[   11.257029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.257285]  kthread+0x337/0x6f0
[   11.257519]  ret_from_fork+0x116/0x1d0
[   11.257711]  ret_from_fork_asm+0x1a/0x30
[   11.257909] 
[   11.258008] The buggy address belongs to the object at ffff888100332e00
[   11.258008]  which belongs to the cache kmalloc-256 of size 256
[   11.258595] The buggy address is located 33 bytes to the right of
[   11.258595]  allocated 201-byte region [ffff888100332e00, ffff888100332ec9)
[   11.259039] 
[   11.259111] The buggy address belongs to the physical page:
[   11.259386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100332
[   11.259807] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.260101] flags: 0x200000000000040(head|node=0|zone=2)
[   11.260514] page_type: f5(slab)
[   11.260699] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.261065] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.261430] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.261752] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.262149] head: 0200000000000001 ffffea000400cc81 00000000ffffffff 00000000ffffffff
[   11.262459] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.262807] page dumped because: kasan: bad access detected
[   11.263082] 
[   11.263211] Memory state around the buggy address:
[   11.263501]  ffff888100332d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.263815]  ffff888100332e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.264114] >ffff888100332e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.264447]                                                           ^
[   11.264652]  ffff888100332f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.265024]  ffff888100332f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.265521] ==================================================================
[   11.342155] ==================================================================
[   11.342945] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.343531] Write of size 1 at addr ffff888102aa20c9 by task kunit_try_catch/179
[   11.344120] 
[   11.344227] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.344268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.344279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.344298] Call Trace:
[   11.344311]  <TASK>
[   11.344325]  dump_stack_lvl+0x73/0xb0
[   11.344353]  print_report+0xd1/0x650
[   11.344375]  ? __virt_addr_valid+0x1db/0x2d0
[   11.344398]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.344420]  ? kasan_addr_to_slab+0x11/0xa0
[   11.344439]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.344462]  kasan_report+0x141/0x180
[   11.344482]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.344509]  __asan_report_store1_noabort+0x1b/0x30
[   11.344528]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.344552]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.344575]  ? finish_task_switch.isra.0+0x153/0x700
[   11.344597]  ? __switch_to+0x47/0xf50
[   11.344622]  ? __schedule+0x10cc/0x2b60
[   11.344643]  ? __pfx_read_tsc+0x10/0x10
[   11.344666]  krealloc_large_less_oob+0x1c/0x30
[   11.344687]  kunit_try_run_case+0x1a5/0x480
[   11.344711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.344731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.344754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.344776]  ? __kthread_parkme+0x82/0x180
[   11.344796]  ? preempt_count_sub+0x50/0x80
[   11.344817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.344839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.344860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.344882]  kthread+0x337/0x6f0
[   11.344900]  ? trace_preempt_on+0x20/0xc0
[   11.344924]  ? __pfx_kthread+0x10/0x10
[   11.344943]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.344962]  ? calculate_sigpending+0x7b/0xa0
[   11.344985]  ? __pfx_kthread+0x10/0x10
[   11.345005]  ret_from_fork+0x116/0x1d0
[   11.345023]  ? __pfx_kthread+0x10/0x10
[   11.345042]  ret_from_fork_asm+0x1a/0x30
[   11.345071]  </TASK>
[   11.345081] 
[   11.361007] The buggy address belongs to the physical page:
[   11.362024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   11.363292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.364539] flags: 0x200000000000040(head|node=0|zone=2)
[   11.364736] page_type: f8(unknown)
[   11.364866] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.365099] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.366705] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.367765] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.368677] head: 0200000000000002 ffffea00040aa801 00000000ffffffff 00000000ffffffff
[   11.368912] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.369147] page dumped because: kasan: bad access detected
[   11.369609] 
[   11.369711] Memory state around the buggy address:
[   11.369934]  ffff888102aa1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.370248]  ffff888102aa2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.370588] >ffff888102aa2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.370963]                                               ^
[   11.371185]  ffff888102aa2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.372018]  ffff888102aa2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.372747] ==================================================================
[   11.265985] ==================================================================
[   11.266413] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.266710] Write of size 1 at addr ffff888100332eeb by task kunit_try_catch/175
[   11.267011] 
[   11.267098] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.267164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.267176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.267195] Call Trace:
[   11.267206]  <TASK>
[   11.267219]  dump_stack_lvl+0x73/0xb0
[   11.267244]  print_report+0xd1/0x650
[   11.267272]  ? __virt_addr_valid+0x1db/0x2d0
[   11.267361]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.267388]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.267410]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.267433]  kasan_report+0x141/0x180
[   11.267454]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.267481]  __asan_report_store1_noabort+0x1b/0x30
[   11.267500]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.267525]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.267547]  ? finish_task_switch.isra.0+0x153/0x700
[   11.267568]  ? __switch_to+0x47/0xf50
[   11.267603]  ? __schedule+0x10cc/0x2b60
[   11.267626]  ? __pfx_read_tsc+0x10/0x10
[   11.267648]  krealloc_less_oob+0x1c/0x30
[   11.267681]  kunit_try_run_case+0x1a5/0x480
[   11.267704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.267725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.267746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.267768]  ? __kthread_parkme+0x82/0x180
[   11.267795]  ? preempt_count_sub+0x50/0x80
[   11.267816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.267838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.267870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.267891]  kthread+0x337/0x6f0
[   11.267910]  ? trace_preempt_on+0x20/0xc0
[   11.267933]  ? __pfx_kthread+0x10/0x10
[   11.267952]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.267972]  ? calculate_sigpending+0x7b/0xa0
[   11.267994]  ? __pfx_kthread+0x10/0x10
[   11.268016]  ret_from_fork+0x116/0x1d0
[   11.268033]  ? __pfx_kthread+0x10/0x10
[   11.268052]  ret_from_fork_asm+0x1a/0x30
[   11.268081]  </TASK>
[   11.268091] 
[   11.276670] Allocated by task 175:
[   11.276826]  kasan_save_stack+0x45/0x70
[   11.277071]  kasan_save_track+0x18/0x40
[   11.277390]  kasan_save_alloc_info+0x3b/0x50
[   11.277601]  __kasan_krealloc+0x190/0x1f0
[   11.277743]  krealloc_noprof+0xf3/0x340
[   11.277911]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.278194]  krealloc_less_oob+0x1c/0x30
[   11.278407]  kunit_try_run_case+0x1a5/0x480
[   11.278606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.278871]  kthread+0x337/0x6f0
[   11.279053]  ret_from_fork+0x116/0x1d0
[   11.279279]  ret_from_fork_asm+0x1a/0x30
[   11.279523] 
[   11.279617] The buggy address belongs to the object at ffff888100332e00
[   11.279617]  which belongs to the cache kmalloc-256 of size 256
[   11.280149] The buggy address is located 34 bytes to the right of
[   11.280149]  allocated 201-byte region [ffff888100332e00, ffff888100332ec9)
[   11.280830] 
[   11.280933] The buggy address belongs to the physical page:
[   11.281236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100332
[   11.281592] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.281901] flags: 0x200000000000040(head|node=0|zone=2)
[   11.282194] page_type: f5(slab)
[   11.282339] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.282644] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.283056] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.283466] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.283800] head: 0200000000000001 ffffea000400cc81 00000000ffffffff 00000000ffffffff
[   11.284160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.284539] page dumped because: kasan: bad access detected
[   11.284790] 
[   11.284860] Memory state around the buggy address:
[   11.285081]  ffff888100332d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.285623]  ffff888100332e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.285941] >ffff888100332e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.286250]                                                           ^
[   11.286617]  ffff888100332f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.286939]  ffff888100332f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.287280] ==================================================================
[   11.400251] ==================================================================
[   11.400907] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.401667] Write of size 1 at addr ffff888102aa20da by task kunit_try_catch/179
[   11.402375] 
[   11.402464] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.402504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.402522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.402541] Call Trace:
[   11.402555]  <TASK>
[   11.402570]  dump_stack_lvl+0x73/0xb0
[   11.402595]  print_report+0xd1/0x650
[   11.402616]  ? __virt_addr_valid+0x1db/0x2d0
[   11.402638]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.402660]  ? kasan_addr_to_slab+0x11/0xa0
[   11.402679]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.402701]  kasan_report+0x141/0x180
[   11.402722]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.402748]  __asan_report_store1_noabort+0x1b/0x30
[   11.402767]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.402791]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.402813]  ? finish_task_switch.isra.0+0x153/0x700
[   11.402833]  ? __switch_to+0x47/0xf50
[   11.402857]  ? __schedule+0x10cc/0x2b60
[   11.402877]  ? __pfx_read_tsc+0x10/0x10
[   11.402899]  krealloc_large_less_oob+0x1c/0x30
[   11.402920]  kunit_try_run_case+0x1a5/0x480
[   11.402942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.402963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.402984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.403005]  ? __kthread_parkme+0x82/0x180
[   11.403024]  ? preempt_count_sub+0x50/0x80
[   11.403045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.403067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.403087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.403109]  kthread+0x337/0x6f0
[   11.403139]  ? trace_preempt_on+0x20/0xc0
[   11.403162]  ? __pfx_kthread+0x10/0x10
[   11.403181]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.403200]  ? calculate_sigpending+0x7b/0xa0
[   11.403222]  ? __pfx_kthread+0x10/0x10
[   11.403242]  ret_from_fork+0x116/0x1d0
[   11.403259]  ? __pfx_kthread+0x10/0x10
[   11.403278]  ret_from_fork_asm+0x1a/0x30
[   11.403308]  </TASK>
[   11.403319] 
[   11.410948] The buggy address belongs to the physical page:
[   11.411270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   11.411768] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.411996] flags: 0x200000000000040(head|node=0|zone=2)
[   11.412214] page_type: f8(unknown)
[   11.412371] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.412689] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.412972] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.413424] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.413699] head: 0200000000000002 ffffea00040aa801 00000000ffffffff 00000000ffffffff
[   11.413921] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.414229] page dumped because: kasan: bad access detected
[   11.414474] 
[   11.414573] Memory state around the buggy address:
[   11.414880]  ffff888102aa1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.415112]  ffff888102aa2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.415835] >ffff888102aa2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.416115]                                                     ^
[   11.416833]  ffff888102aa2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.417312]  ffff888102aa2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.417816] ==================================================================
[   11.148170] ==================================================================
[   11.149080] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.149934] Write of size 1 at addr ffff888100332ec9 by task kunit_try_catch/175
[   11.150880] 
[   11.150990] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.151081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.151094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.151114] Call Trace:
[   11.151322]  <TASK>
[   11.151343]  dump_stack_lvl+0x73/0xb0
[   11.151375]  print_report+0xd1/0x650
[   11.151396]  ? __virt_addr_valid+0x1db/0x2d0
[   11.151419]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.151441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.151462]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.151485]  kasan_report+0x141/0x180
[   11.151505]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.151532]  __asan_report_store1_noabort+0x1b/0x30
[   11.151551]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.151576]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.151598]  ? finish_task_switch.isra.0+0x153/0x700
[   11.151620]  ? __switch_to+0x47/0xf50
[   11.151648]  ? __schedule+0x10cc/0x2b60
[   11.151670]  ? __pfx_read_tsc+0x10/0x10
[   11.151694]  krealloc_less_oob+0x1c/0x30
[   11.151715]  kunit_try_run_case+0x1a5/0x480
[   11.151738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.151759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.151781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.151803]  ? __kthread_parkme+0x82/0x180
[   11.151823]  ? preempt_count_sub+0x50/0x80
[   11.151844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.151866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.151887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.151909]  kthread+0x337/0x6f0
[   11.151927]  ? trace_preempt_on+0x20/0xc0
[   11.151949]  ? __pfx_kthread+0x10/0x10
[   11.151968]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.151988]  ? calculate_sigpending+0x7b/0xa0
[   11.152010]  ? __pfx_kthread+0x10/0x10
[   11.152031]  ret_from_fork+0x116/0x1d0
[   11.152048]  ? __pfx_kthread+0x10/0x10
[   11.152068]  ret_from_fork_asm+0x1a/0x30
[   11.152097]  </TASK>
[   11.152108] 
[   11.167370] Allocated by task 175:
[   11.167511]  kasan_save_stack+0x45/0x70
[   11.167719]  kasan_save_track+0x18/0x40
[   11.167867]  kasan_save_alloc_info+0x3b/0x50
[   11.168079]  __kasan_krealloc+0x190/0x1f0
[   11.168230]  krealloc_noprof+0xf3/0x340
[   11.168933]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.169188]  krealloc_less_oob+0x1c/0x30
[   11.169554]  kunit_try_run_case+0x1a5/0x480
[   11.169983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.170529]  kthread+0x337/0x6f0
[   11.170917]  ret_from_fork+0x116/0x1d0
[   11.171147]  ret_from_fork_asm+0x1a/0x30
[   11.171495] 
[   11.171596] The buggy address belongs to the object at ffff888100332e00
[   11.171596]  which belongs to the cache kmalloc-256 of size 256
[   11.172487] The buggy address is located 0 bytes to the right of
[   11.172487]  allocated 201-byte region [ffff888100332e00, ffff888100332ec9)
[   11.173107] 
[   11.173228] The buggy address belongs to the physical page:
[   11.173820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100332
[   11.174346] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.175058] flags: 0x200000000000040(head|node=0|zone=2)
[   11.175592] page_type: f5(slab)
[   11.175729] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.176281] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.176929] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.177828] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.178785] head: 0200000000000001 ffffea000400cc81 00000000ffffffff 00000000ffffffff
[   11.179376] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.180020] page dumped because: kasan: bad access detected
[   11.180607] 
[   11.180754] Memory state around the buggy address:
[   11.181291]  ffff888100332d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.181604]  ffff888100332e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.182670] >ffff888100332e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.183589]                                               ^
[   11.184189]  ffff888100332f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.184882]  ffff888100332f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.185620] ==================================================================
[   11.186175] ==================================================================
[   11.186425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.187873] Write of size 1 at addr ffff888100332ed0 by task kunit_try_catch/175
[   11.189292] 
[   11.189767] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.189815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.189827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.189846] Call Trace:
[   11.189862]  <TASK>
[   11.189877]  dump_stack_lvl+0x73/0xb0
[   11.189906]  print_report+0xd1/0x650
[   11.189928]  ? __virt_addr_valid+0x1db/0x2d0
[   11.189951]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.189973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.189994]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.190019]  kasan_report+0x141/0x180
[   11.190041]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.190069]  __asan_report_store1_noabort+0x1b/0x30
[   11.190089]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.190114]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.190148]  ? finish_task_switch.isra.0+0x153/0x700
[   11.190170]  ? __switch_to+0x47/0xf50
[   11.190194]  ? __schedule+0x10cc/0x2b60
[   11.190217]  ? __pfx_read_tsc+0x10/0x10
[   11.190241]  krealloc_less_oob+0x1c/0x30
[   11.190261]  kunit_try_run_case+0x1a5/0x480
[   11.190284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.190314]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.190336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.190358]  ? __kthread_parkme+0x82/0x180
[   11.190377]  ? preempt_count_sub+0x50/0x80
[   11.190398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.190422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.190443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.190464]  kthread+0x337/0x6f0
[   11.190483]  ? trace_preempt_on+0x20/0xc0
[   11.190505]  ? __pfx_kthread+0x10/0x10
[   11.190528]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.190548]  ? calculate_sigpending+0x7b/0xa0
[   11.190571]  ? __pfx_kthread+0x10/0x10
[   11.190591]  ret_from_fork+0x116/0x1d0
[   11.190609]  ? __pfx_kthread+0x10/0x10
[   11.190629]  ret_from_fork_asm+0x1a/0x30
[   11.190658]  </TASK>
[   11.190669] 
[   11.205674] Allocated by task 175:
[   11.205987]  kasan_save_stack+0x45/0x70
[   11.206156]  kasan_save_track+0x18/0x40
[   11.206661]  kasan_save_alloc_info+0x3b/0x50
[   11.207084]  __kasan_krealloc+0x190/0x1f0
[   11.207392]  krealloc_noprof+0xf3/0x340
[   11.207750]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.207912]  krealloc_less_oob+0x1c/0x30
[   11.208046]  kunit_try_run_case+0x1a5/0x480
[   11.208224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.208771]  kthread+0x337/0x6f0
[   11.209092]  ret_from_fork+0x116/0x1d0
[   11.209650]  ret_from_fork_asm+0x1a/0x30
[   11.210037] 
[   11.210227] The buggy address belongs to the object at ffff888100332e00
[   11.210227]  which belongs to the cache kmalloc-256 of size 256
[   11.211352] The buggy address is located 7 bytes to the right of
[   11.211352]  allocated 201-byte region [ffff888100332e00, ffff888100332ec9)
[   11.211897] 
[   11.211971] The buggy address belongs to the physical page:
[   11.212175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100332
[   11.212985] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.213725] flags: 0x200000000000040(head|node=0|zone=2)
[   11.214240] page_type: f5(slab)
[   11.214603] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.215361] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.215919] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.216209] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.216905] head: 0200000000000001 ffffea000400cc81 00000000ffffffff 00000000ffffffff
[   11.217659] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.218225] page dumped because: kasan: bad access detected
[   11.218643] 
[   11.218713] Memory state around the buggy address:
[   11.218863]  ffff888100332d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.219071]  ffff888100332e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.219316] >ffff888100332e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.219739]                                                  ^
[   11.219919]  ffff888100332f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.220496]  ffff888100332f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.220854] ==================================================================
[   11.418569] ==================================================================
[   11.419289] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.419758] Write of size 1 at addr ffff888102aa20ea by task kunit_try_catch/179
[   11.420080] 
[   11.420515] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.420558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.420569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.420588] Call Trace:
[   11.420601]  <TASK>
[   11.420614]  dump_stack_lvl+0x73/0xb0
[   11.420684]  print_report+0xd1/0x650
[   11.420705]  ? __virt_addr_valid+0x1db/0x2d0
[   11.420729]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.420750]  ? kasan_addr_to_slab+0x11/0xa0
[   11.420769]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.420792]  kasan_report+0x141/0x180
[   11.420812]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.420839]  __asan_report_store1_noabort+0x1b/0x30
[   11.420858]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.420882]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.420904]  ? finish_task_switch.isra.0+0x153/0x700
[   11.420925]  ? __switch_to+0x47/0xf50
[   11.420948]  ? __schedule+0x10cc/0x2b60
[   11.420969]  ? __pfx_read_tsc+0x10/0x10
[   11.420992]  krealloc_large_less_oob+0x1c/0x30
[   11.421014]  kunit_try_run_case+0x1a5/0x480
[   11.421036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.421057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.421079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.421100]  ? __kthread_parkme+0x82/0x180
[   11.421119]  ? preempt_count_sub+0x50/0x80
[   11.421151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.421173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.421194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.421215]  kthread+0x337/0x6f0
[   11.421233]  ? trace_preempt_on+0x20/0xc0
[   11.421256]  ? __pfx_kthread+0x10/0x10
[   11.421275]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.421294]  ? calculate_sigpending+0x7b/0xa0
[   11.421318]  ? __pfx_kthread+0x10/0x10
[   11.421340]  ret_from_fork+0x116/0x1d0
[   11.421358]  ? __pfx_kthread+0x10/0x10
[   11.421377]  ret_from_fork_asm+0x1a/0x30
[   11.421406]  </TASK>
[   11.421416] 
[   11.432832] The buggy address belongs to the physical page:
[   11.433069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   11.433856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.434354] flags: 0x200000000000040(head|node=0|zone=2)
[   11.434764] page_type: f8(unknown)
[   11.435046] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.435526] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.435847] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.436612] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.437057] head: 0200000000000002 ffffea00040aa801 00000000ffffffff 00000000ffffffff
[   11.437702] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.438219] page dumped because: kasan: bad access detected
[   11.438644] 
[   11.438738] Memory state around the buggy address:
[   11.438947]  ffff888102aa1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.439715]  ffff888102aa2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.440166] >ffff888102aa2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.440867]                                                           ^
[   11.441544]  ffff888102aa2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.441861]  ffff888102aa2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.442597] ==================================================================
[   11.443105] ==================================================================
[   11.443935] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.444609] Write of size 1 at addr ffff888102aa20eb by task kunit_try_catch/179
[   11.445069] 
[   11.445399] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.445444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.445455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.445474] Call Trace:
[   11.445488]  <TASK>
[   11.445501]  dump_stack_lvl+0x73/0xb0
[   11.445527]  print_report+0xd1/0x650
[   11.445548]  ? __virt_addr_valid+0x1db/0x2d0
[   11.445571]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.445592]  ? kasan_addr_to_slab+0x11/0xa0
[   11.445611]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.445634]  kasan_report+0x141/0x180
[   11.445654]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.445681]  __asan_report_store1_noabort+0x1b/0x30
[   11.445700]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.445724]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.445746]  ? finish_task_switch.isra.0+0x153/0x700
[   11.445766]  ? __switch_to+0x47/0xf50
[   11.445789]  ? __schedule+0x10cc/0x2b60
[   11.445809]  ? __pfx_read_tsc+0x10/0x10
[   11.445831]  krealloc_large_less_oob+0x1c/0x30
[   11.445852]  kunit_try_run_case+0x1a5/0x480
[   11.445874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.445894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.445916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.445937]  ? __kthread_parkme+0x82/0x180
[   11.445955]  ? preempt_count_sub+0x50/0x80
[   11.445976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.445998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.446019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.446040]  kthread+0x337/0x6f0
[   11.446058]  ? trace_preempt_on+0x20/0xc0
[   11.446080]  ? __pfx_kthread+0x10/0x10
[   11.446100]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.446119]  ? calculate_sigpending+0x7b/0xa0
[   11.446158]  ? __pfx_kthread+0x10/0x10
[   11.446178]  ret_from_fork+0x116/0x1d0
[   11.446195]  ? __pfx_kthread+0x10/0x10
[   11.446214]  ret_from_fork_asm+0x1a/0x30
[   11.446242]  </TASK>
[   11.446252] 
[   11.454304] The buggy address belongs to the physical page:
[   11.454566] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   11.454884] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.455112] flags: 0x200000000000040(head|node=0|zone=2)
[   11.455372] page_type: f8(unknown)
[   11.455551] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.455820] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.456112] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.456704] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.457014] head: 0200000000000002 ffffea00040aa801 00000000ffffffff 00000000ffffffff
[   11.457419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.457663] page dumped because: kasan: bad access detected
[   11.457867] 
[   11.457960] Memory state around the buggy address:
[   11.458240]  ffff888102aa1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.458496]  ffff888102aa2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.458863] >ffff888102aa2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.459265]                                                           ^
[   11.459670]  ffff888102aa2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.459890]  ffff888102aa2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.460217] ==================================================================
[   11.221662] ==================================================================
[   11.221949] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.222403] Write of size 1 at addr ffff888100332eda by task kunit_try_catch/175
[   11.222753] 
[   11.222866] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.222908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.222930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.222950] Call Trace:
[   11.222961]  <TASK>
[   11.222976]  dump_stack_lvl+0x73/0xb0
[   11.223014]  print_report+0xd1/0x650
[   11.223035]  ? __virt_addr_valid+0x1db/0x2d0
[   11.223056]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.223078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.223106]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.223156]  kasan_report+0x141/0x180
[   11.223177]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.223203]  __asan_report_store1_noabort+0x1b/0x30
[   11.223223]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.223247]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.223269]  ? finish_task_switch.isra.0+0x153/0x700
[   11.223290]  ? __switch_to+0x47/0xf50
[   11.223609]  ? __schedule+0x10cc/0x2b60
[   11.223631]  ? __pfx_read_tsc+0x10/0x10
[   11.223654]  krealloc_less_oob+0x1c/0x30
[   11.223674]  kunit_try_run_case+0x1a5/0x480
[   11.223742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.223763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.223784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.223805]  ? __kthread_parkme+0x82/0x180
[   11.223825]  ? preempt_count_sub+0x50/0x80
[   11.223846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.223868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.223890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.223911]  kthread+0x337/0x6f0
[   11.223929]  ? trace_preempt_on+0x20/0xc0
[   11.223951]  ? __pfx_kthread+0x10/0x10
[   11.223970]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.223989]  ? calculate_sigpending+0x7b/0xa0
[   11.224012]  ? __pfx_kthread+0x10/0x10
[   11.224032]  ret_from_fork+0x116/0x1d0
[   11.224048]  ? __pfx_kthread+0x10/0x10
[   11.224067]  ret_from_fork_asm+0x1a/0x30
[   11.224096]  </TASK>
[   11.224107] 
[   11.232395] Allocated by task 175:
[   11.232532]  kasan_save_stack+0x45/0x70
[   11.232742]  kasan_save_track+0x18/0x40
[   11.232962]  kasan_save_alloc_info+0x3b/0x50
[   11.233499]  __kasan_krealloc+0x190/0x1f0
[   11.233705]  krealloc_noprof+0xf3/0x340
[   11.233900]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.234149]  krealloc_less_oob+0x1c/0x30
[   11.234448]  kunit_try_run_case+0x1a5/0x480
[   11.234636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.234814]  kthread+0x337/0x6f0
[   11.234951]  ret_from_fork+0x116/0x1d0
[   11.235146]  ret_from_fork_asm+0x1a/0x30
[   11.235427] 
[   11.235525] The buggy address belongs to the object at ffff888100332e00
[   11.235525]  which belongs to the cache kmalloc-256 of size 256
[   11.235906] The buggy address is located 17 bytes to the right of
[   11.235906]  allocated 201-byte region [ffff888100332e00, ffff888100332ec9)
[   11.236936] 
[   11.237047] The buggy address belongs to the physical page:
[   11.237323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100332
[   11.237793] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.238138] flags: 0x200000000000040(head|node=0|zone=2)
[   11.238558] page_type: f5(slab)
[   11.238725] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.238955] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.239304] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.239579] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.240075] head: 0200000000000001 ffffea000400cc81 00000000ffffffff 00000000ffffffff
[   11.240862] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.241158] page dumped because: kasan: bad access detected
[   11.241444] 
[   11.241623] Memory state around the buggy address:
[   11.241943]  ffff888100332d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.242254]  ffff888100332e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.242674] >ffff888100332e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.242989]                                                     ^
[   11.243219]  ffff888100332f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.243564]  ffff888100332f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.243929] ==================================================================
[   11.373560] ==================================================================
[   11.375085] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.375544] Write of size 1 at addr ffff888102aa20d0 by task kunit_try_catch/179
[   11.376093] 
[   11.376192] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.376234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.376245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.376264] Call Trace:
[   11.376276]  <TASK>
[   11.376290]  dump_stack_lvl+0x73/0xb0
[   11.376318]  print_report+0xd1/0x650
[   11.376340]  ? __virt_addr_valid+0x1db/0x2d0
[   11.376362]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.376384]  ? kasan_addr_to_slab+0x11/0xa0
[   11.376403]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.376425]  kasan_report+0x141/0x180
[   11.376446]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.376472]  __asan_report_store1_noabort+0x1b/0x30
[   11.376931]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.376958]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.376981]  ? finish_task_switch.isra.0+0x153/0x700
[   11.377003]  ? __switch_to+0x47/0xf50
[   11.377027]  ? __schedule+0x10cc/0x2b60
[   11.377048]  ? __pfx_read_tsc+0x10/0x10
[   11.377071]  krealloc_large_less_oob+0x1c/0x30
[   11.377092]  kunit_try_run_case+0x1a5/0x480
[   11.377116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.377152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.377173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.377194]  ? __kthread_parkme+0x82/0x180
[   11.377214]  ? preempt_count_sub+0x50/0x80
[   11.377236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.377258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.377279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.377300]  kthread+0x337/0x6f0
[   11.377318]  ? trace_preempt_on+0x20/0xc0
[   11.377340]  ? __pfx_kthread+0x10/0x10
[   11.377359]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.377378]  ? calculate_sigpending+0x7b/0xa0
[   11.377401]  ? __pfx_kthread+0x10/0x10
[   11.377420]  ret_from_fork+0x116/0x1d0
[   11.377438]  ? __pfx_kthread+0x10/0x10
[   11.377457]  ret_from_fork_asm+0x1a/0x30
[   11.377486]  </TASK>
[   11.377497] 
[   11.389730] The buggy address belongs to the physical page:
[   11.390048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   11.390314] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.390622] flags: 0x200000000000040(head|node=0|zone=2)
[   11.391079] page_type: f8(unknown)
[   11.391446] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.392302] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.393153] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.393510] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.394260] head: 0200000000000002 ffffea00040aa801 00000000ffffffff 00000000ffffffff
[   11.395024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.395560] page dumped because: kasan: bad access detected
[   11.396070] 
[   11.396152] Memory state around the buggy address:
[   11.396494]  ffff888102aa1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.397097]  ffff888102aa2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.397913] >ffff888102aa2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.398523]                                                  ^
[   11.398870]  ffff888102aa2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.399082]  ffff888102aa2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.399539] ==================================================================