Hay
Date
July 1, 2025, 11:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.337277] ==================================================================
[   18.337336] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.337388] Write of size 1 at addr fff00000c64b60eb by task kunit_try_catch/163
[   18.337456] 
[   18.337489] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.337576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.337606] Hardware name: linux,dummy-virt (DT)
[   18.337639] Call trace:
[   18.337661]  show_stack+0x20/0x38 (C)
[   18.337709]  dump_stack_lvl+0x8c/0xd0
[   18.337757]  print_report+0x118/0x608
[   18.337824]  kasan_report+0xdc/0x128
[   18.337873]  __asan_report_store1_noabort+0x20/0x30
[   18.337933]  krealloc_less_oob_helper+0xa58/0xc50
[   18.337994]  krealloc_large_less_oob+0x20/0x38
[   18.338045]  kunit_try_run_case+0x170/0x3f0
[   18.338094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.338162]  kthread+0x328/0x630
[   18.338206]  ret_from_fork+0x10/0x20
[   18.338256] 
[   18.338287] The buggy address belongs to the physical page:
[   18.338321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4
[   18.338378] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.338439] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.338506] page_type: f8(unknown)
[   18.338547] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.338600] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.338660] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.338712] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.338764] head: 0bfffe0000000002 ffffc1ffc3192d01 00000000ffffffff 00000000ffffffff
[   18.338815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.338858] page dumped because: kasan: bad access detected
[   18.338891] 
[   18.338909] Memory state around the buggy address:
[   18.338950]  fff00000c64b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.338996]  fff00000c64b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.339051] >fff00000c64b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.339092]                                                           ^
[   18.339142]  fff00000c64b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.339186]  fff00000c64b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.339227] ==================================================================
[   18.321142] ==================================================================
[   18.321221] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.321476] Write of size 1 at addr fff00000c64b60c9 by task kunit_try_catch/163
[   18.321613] 
[   18.321659] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.321753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.321788] Hardware name: linux,dummy-virt (DT)
[   18.321831] Call trace:
[   18.321865]  show_stack+0x20/0x38 (C)
[   18.321922]  dump_stack_lvl+0x8c/0xd0
[   18.321984]  print_report+0x118/0x608
[   18.322035]  kasan_report+0xdc/0x128
[   18.322083]  __asan_report_store1_noabort+0x20/0x30
[   18.322146]  krealloc_less_oob_helper+0xa48/0xc50
[   18.322200]  krealloc_large_less_oob+0x20/0x38
[   18.322251]  kunit_try_run_case+0x170/0x3f0
[   18.322304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.322585]  kthread+0x328/0x630
[   18.322648]  ret_from_fork+0x10/0x20
[   18.322701] 
[   18.322725] The buggy address belongs to the physical page:
[   18.322762] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4
[   18.322845] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.322915] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.322978] page_type: f8(unknown)
[   18.323061] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.323282] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.323344] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.323397] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.323574] head: 0bfffe0000000002 ffffc1ffc3192d01 00000000ffffffff 00000000ffffffff
[   18.323756] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.323849] page dumped because: kasan: bad access detected
[   18.323953] 
[   18.324092] Memory state around the buggy address:
[   18.324245]  fff00000c64b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.324315]  fff00000c64b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.324390] >fff00000c64b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.324534]                                               ^
[   18.324574]  fff00000c64b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.324619]  fff00000c64b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.324661] ==================================================================
[   18.261569] ==================================================================
[   18.261661] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.261732] Write of size 1 at addr fff00000c0b9b8c9 by task kunit_try_catch/159
[   18.261788] 
[   18.261832] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.261924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.261953] Hardware name: linux,dummy-virt (DT)
[   18.261989] Call trace:
[   18.262013]  show_stack+0x20/0x38 (C)
[   18.262068]  dump_stack_lvl+0x8c/0xd0
[   18.262502]  print_report+0x118/0x608
[   18.262620]  kasan_report+0xdc/0x128
[   18.262672]  __asan_report_store1_noabort+0x20/0x30
[   18.262725]  krealloc_less_oob_helper+0xa48/0xc50
[   18.262777]  krealloc_less_oob+0x20/0x38
[   18.263042]  kunit_try_run_case+0x170/0x3f0
[   18.263162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.263225]  kthread+0x328/0x630
[   18.263432]  ret_from_fork+0x10/0x20
[   18.263539] 
[   18.263655] Allocated by task 159:
[   18.263718]  kasan_save_stack+0x3c/0x68
[   18.263852]  kasan_save_track+0x20/0x40
[   18.263937]  kasan_save_alloc_info+0x40/0x58
[   18.264064]  __kasan_krealloc+0x118/0x178
[   18.264199]  krealloc_noprof+0x128/0x360
[   18.264326]  krealloc_less_oob_helper+0x168/0xc50
[   18.264448]  krealloc_less_oob+0x20/0x38
[   18.264787]  kunit_try_run_case+0x170/0x3f0
[   18.264929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.265056]  kthread+0x328/0x630
[   18.265192]  ret_from_fork+0x10/0x20
[   18.265284] 
[   18.265326] The buggy address belongs to the object at fff00000c0b9b800
[   18.265326]  which belongs to the cache kmalloc-256 of size 256
[   18.265394] The buggy address is located 0 bytes to the right of
[   18.265394]  allocated 201-byte region [fff00000c0b9b800, fff00000c0b9b8c9)
[   18.265494] 
[   18.265519] The buggy address belongs to the physical page:
[   18.265556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a
[   18.265620] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.265674] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.266058] page_type: f5(slab)
[   18.266158] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.266359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.266499] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.266686] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.266742] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff
[   18.266807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.266857] page dumped because: kasan: bad access detected
[   18.266891] 
[   18.266911] Memory state around the buggy address:
[   18.266949]  fff00000c0b9b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.267012]  fff00000c0b9b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.267070] >fff00000c0b9b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.267160]                                               ^
[   18.267201]  fff00000c0b9b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.267479]  fff00000c0b9b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.267534] ==================================================================
[   18.332224] ==================================================================
[   18.332271] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.332318] Write of size 1 at addr fff00000c64b60ea by task kunit_try_catch/163
[   18.332844] 
[   18.332882] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.332968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.332996] Hardware name: linux,dummy-virt (DT)
[   18.333121] Call trace:
[   18.333195]  show_stack+0x20/0x38 (C)
[   18.333248]  dump_stack_lvl+0x8c/0xd0
[   18.333346]  print_report+0x118/0x608
[   18.333426]  kasan_report+0xdc/0x128
[   18.333504]  __asan_report_store1_noabort+0x20/0x30
[   18.333633]  krealloc_less_oob_helper+0xae4/0xc50
[   18.333723]  krealloc_large_less_oob+0x20/0x38
[   18.333774]  kunit_try_run_case+0x170/0x3f0
[   18.333992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.334109]  kthread+0x328/0x630
[   18.334185]  ret_from_fork+0x10/0x20
[   18.334235] 
[   18.334256] The buggy address belongs to the physical page:
[   18.334545] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4
[   18.334637] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.334742] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.334835] page_type: f8(unknown)
[   18.334877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.334977] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.335053] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.335117] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.335250] head: 0bfffe0000000002 ffffc1ffc3192d01 00000000ffffffff 00000000ffffffff
[   18.335389] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.335455] page dumped because: kasan: bad access detected
[   18.335489] 
[   18.335509] Memory state around the buggy address:
[   18.335742]  fff00000c64b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.335795]  fff00000c64b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.335840] >fff00000c64b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.336043]                                                           ^
[   18.336205]  fff00000c64b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.336288]  fff00000c64b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.336503] ==================================================================
[   18.325054] ==================================================================
[   18.325105] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.325250] Write of size 1 at addr fff00000c64b60d0 by task kunit_try_catch/163
[   18.325358] 
[   18.325444] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.325574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.325643] Hardware name: linux,dummy-virt (DT)
[   18.325710] Call trace:
[   18.325784]  show_stack+0x20/0x38 (C)
[   18.325843]  dump_stack_lvl+0x8c/0xd0
[   18.325896]  print_report+0x118/0x608
[   18.325974]  kasan_report+0xdc/0x128
[   18.326023]  __asan_report_store1_noabort+0x20/0x30
[   18.326104]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.326235]  krealloc_large_less_oob+0x20/0x38
[   18.326293]  kunit_try_run_case+0x170/0x3f0
[   18.326345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.326401]  kthread+0x328/0x630
[   18.326458]  ret_from_fork+0x10/0x20
[   18.326509] 
[   18.326536] The buggy address belongs to the physical page:
[   18.326571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4
[   18.326630] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.326681] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.326739] page_type: f8(unknown)
[   18.326787] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.326841] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.326894] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.326951] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.327005] head: 0bfffe0000000002 ffffc1ffc3192d01 00000000ffffffff 00000000ffffffff
[   18.327068] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.327151] page dumped because: kasan: bad access detected
[   18.327187] 
[   18.327206] Memory state around the buggy address:
[   18.327241]  fff00000c64b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.327315]  fff00000c64b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.327381] >fff00000c64b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.327422]                                                  ^
[   18.327460]  fff00000c64b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.327506]  fff00000c64b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.327547] ==================================================================
[   18.282398] ==================================================================
[   18.282457] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.282521] Write of size 1 at addr fff00000c0b9b8ea by task kunit_try_catch/159
[   18.282577] 
[   18.282625] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.282715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.282752] Hardware name: linux,dummy-virt (DT)
[   18.282788] Call trace:
[   18.282821]  show_stack+0x20/0x38 (C)
[   18.282881]  dump_stack_lvl+0x8c/0xd0
[   18.282933]  print_report+0x118/0x608
[   18.282983]  kasan_report+0xdc/0x128
[   18.283031]  __asan_report_store1_noabort+0x20/0x30
[   18.283083]  krealloc_less_oob_helper+0xae4/0xc50
[   18.283199]  krealloc_less_oob+0x20/0x38
[   18.283248]  kunit_try_run_case+0x170/0x3f0
[   18.283549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.283717]  kthread+0x328/0x630
[   18.283860]  ret_from_fork+0x10/0x20
[   18.284151] 
[   18.284216] Allocated by task 159:
[   18.284254]  kasan_save_stack+0x3c/0x68
[   18.284299]  kasan_save_track+0x20/0x40
[   18.284339]  kasan_save_alloc_info+0x40/0x58
[   18.284381]  __kasan_krealloc+0x118/0x178
[   18.284421]  krealloc_noprof+0x128/0x360
[   18.284660]  krealloc_less_oob_helper+0x168/0xc50
[   18.284711]  krealloc_less_oob+0x20/0x38
[   18.284750]  kunit_try_run_case+0x170/0x3f0
[   18.284790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.284837]  kthread+0x328/0x630
[   18.284871]  ret_from_fork+0x10/0x20
[   18.284910] 
[   18.285219] The buggy address belongs to the object at fff00000c0b9b800
[   18.285219]  which belongs to the cache kmalloc-256 of size 256
[   18.285358] The buggy address is located 33 bytes to the right of
[   18.285358]  allocated 201-byte region [fff00000c0b9b800, fff00000c0b9b8c9)
[   18.285431] 
[   18.285453] The buggy address belongs to the physical page:
[   18.285842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a
[   18.285944] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.286074] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.286221] page_type: f5(slab)
[   18.286328] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.286413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.286522] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.286633] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.286689] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff
[   18.286889] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.287186] page dumped because: kasan: bad access detected
[   18.287292] 
[   18.287758] Memory state around the buggy address:
[   18.287864]  fff00000c0b9b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.287945]  fff00000c0b9b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.288016] >fff00000c0b9b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.288058]                                                           ^
[   18.288101]  fff00000c0b9b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.288186]  fff00000c0b9b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.288229] ==================================================================
[   18.277223] ==================================================================
[   18.277332] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.277414] Write of size 1 at addr fff00000c0b9b8da by task kunit_try_catch/159
[   18.277478] 
[   18.277517] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.277607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.277639] Hardware name: linux,dummy-virt (DT)
[   18.277850] Call trace:
[   18.277905]  show_stack+0x20/0x38 (C)
[   18.277985]  dump_stack_lvl+0x8c/0xd0
[   18.278062]  print_report+0x118/0x608
[   18.278186]  kasan_report+0xdc/0x128
[   18.278238]  __asan_report_store1_noabort+0x20/0x30
[   18.278309]  krealloc_less_oob_helper+0xa80/0xc50
[   18.278369]  krealloc_less_oob+0x20/0x38
[   18.278457]  kunit_try_run_case+0x170/0x3f0
[   18.278528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.278585]  kthread+0x328/0x630
[   18.278657]  ret_from_fork+0x10/0x20
[   18.278731] 
[   18.278758] Allocated by task 159:
[   18.278790]  kasan_save_stack+0x3c/0x68
[   18.278834]  kasan_save_track+0x20/0x40
[   18.278873]  kasan_save_alloc_info+0x40/0x58
[   18.278915]  __kasan_krealloc+0x118/0x178
[   18.278954]  krealloc_noprof+0x128/0x360
[   18.278994]  krealloc_less_oob_helper+0x168/0xc50
[   18.279037]  krealloc_less_oob+0x20/0x38
[   18.279236]  kunit_try_run_case+0x170/0x3f0
[   18.279429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.279489]  kthread+0x328/0x630
[   18.279524]  ret_from_fork+0x10/0x20
[   18.279593] 
[   18.279674] The buggy address belongs to the object at fff00000c0b9b800
[   18.279674]  which belongs to the cache kmalloc-256 of size 256
[   18.279774] The buggy address is located 17 bytes to the right of
[   18.279774]  allocated 201-byte region [fff00000c0b9b800, fff00000c0b9b8c9)
[   18.279864] 
[   18.279887] The buggy address belongs to the physical page:
[   18.279922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a
[   18.279992] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.280225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.280289] page_type: f5(slab)
[   18.280334] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.280389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.280443] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.280747] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.280899] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff
[   18.280992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.281066] page dumped because: kasan: bad access detected
[   18.281101] 
[   18.281191] Memory state around the buggy address:
[   18.281249]  fff00000c0b9b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.281303]  fff00000c0b9b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.281353] >fff00000c0b9b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.281395]                                                     ^
[   18.281558]  fff00000c0b9b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.281664]  fff00000c0b9b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.281814] ==================================================================
[   18.270486] ==================================================================
[   18.270569] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.270636] Write of size 1 at addr fff00000c0b9b8d0 by task kunit_try_catch/159
[   18.270776] 
[   18.270824] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.270917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.270946] Hardware name: linux,dummy-virt (DT)
[   18.271029] Call trace:
[   18.271055]  show_stack+0x20/0x38 (C)
[   18.271171]  dump_stack_lvl+0x8c/0xd0
[   18.271230]  print_report+0x118/0x608
[   18.271321]  kasan_report+0xdc/0x128
[   18.271370]  __asan_report_store1_noabort+0x20/0x30
[   18.271421]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.271473]  krealloc_less_oob+0x20/0x38
[   18.271521]  kunit_try_run_case+0x170/0x3f0
[   18.271574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.271808]  kthread+0x328/0x630
[   18.271932]  ret_from_fork+0x10/0x20
[   18.272009] 
[   18.272049] Allocated by task 159:
[   18.272511]  kasan_save_stack+0x3c/0x68
[   18.272577]  kasan_save_track+0x20/0x40
[   18.272617]  kasan_save_alloc_info+0x40/0x58
[   18.272660]  __kasan_krealloc+0x118/0x178
[   18.272700]  krealloc_noprof+0x128/0x360
[   18.272740]  krealloc_less_oob_helper+0x168/0xc50
[   18.272782]  krealloc_less_oob+0x20/0x38
[   18.272820]  kunit_try_run_case+0x170/0x3f0
[   18.272861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.272907]  kthread+0x328/0x630
[   18.272942]  ret_from_fork+0x10/0x20
[   18.272979] 
[   18.273001] The buggy address belongs to the object at fff00000c0b9b800
[   18.273001]  which belongs to the cache kmalloc-256 of size 256
[   18.273066] The buggy address is located 7 bytes to the right of
[   18.273066]  allocated 201-byte region [fff00000c0b9b800, fff00000c0b9b8c9)
[   18.273150] 
[   18.273194] The buggy address belongs to the physical page:
[   18.273239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a
[   18.273415] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.273563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.273705] page_type: f5(slab)
[   18.273752] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.273806] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.273862] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.273916] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.274069] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff
[   18.274376] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.274428] page dumped because: kasan: bad access detected
[   18.274561] 
[   18.274675] Memory state around the buggy address:
[   18.274815]  fff00000c0b9b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.274863]  fff00000c0b9b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.274930] >fff00000c0b9b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.274986]                                                  ^
[   18.275167]  fff00000c0b9b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.275213]  fff00000c0b9b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.275544] ==================================================================
[   18.290043] ==================================================================
[   18.290109] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.290247] Write of size 1 at addr fff00000c0b9b8eb by task kunit_try_catch/159
[   18.290302] 
[   18.290342] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.290434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.290463] Hardware name: linux,dummy-virt (DT)
[   18.290499] Call trace:
[   18.290522]  show_stack+0x20/0x38 (C)
[   18.290573]  dump_stack_lvl+0x8c/0xd0
[   18.290623]  print_report+0x118/0x608
[   18.290674]  kasan_report+0xdc/0x128
[   18.290732]  __asan_report_store1_noabort+0x20/0x30
[   18.291042]  krealloc_less_oob_helper+0xa58/0xc50
[   18.291222]  krealloc_less_oob+0x20/0x38
[   18.291644]  kunit_try_run_case+0x170/0x3f0
[   18.291980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.292213]  kthread+0x328/0x630
[   18.292262]  ret_from_fork+0x10/0x20
[   18.292315] 
[   18.292336] Allocated by task 159:
[   18.292367]  kasan_save_stack+0x3c/0x68
[   18.292898]  kasan_save_track+0x20/0x40
[   18.293192]  kasan_save_alloc_info+0x40/0x58
[   18.293284]  __kasan_krealloc+0x118/0x178
[   18.293330]  krealloc_noprof+0x128/0x360
[   18.293381]  krealloc_less_oob_helper+0x168/0xc50
[   18.293424]  krealloc_less_oob+0x20/0x38
[   18.293838]  kunit_try_run_case+0x170/0x3f0
[   18.293928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.294001]  kthread+0x328/0x630
[   18.294035]  ret_from_fork+0x10/0x20
[   18.294298] 
[   18.294361] The buggy address belongs to the object at fff00000c0b9b800
[   18.294361]  which belongs to the cache kmalloc-256 of size 256
[   18.294497] The buggy address is located 34 bytes to the right of
[   18.294497]  allocated 201-byte region [fff00000c0b9b800, fff00000c0b9b8c9)
[   18.294780] 
[   18.294827] The buggy address belongs to the physical page:
[   18.294979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b9a
[   18.295063] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.295162] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.295284] page_type: f5(slab)
[   18.295338] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.295395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.295563] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.295777] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.295923] head: 0bfffe0000000001 ffffc1ffc302e681 00000000ffffffff 00000000ffffffff
[   18.296007] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.296051] page dumped because: kasan: bad access detected
[   18.296323] 
[   18.296490] Memory state around the buggy address:
[   18.296570]  fff00000c0b9b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.296630]  fff00000c0b9b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.296689] >fff00000c0b9b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.296737]                                                           ^
[   18.296781]  fff00000c0b9b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.296835]  fff00000c0b9b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.296877] ==================================================================
[   18.328379] ==================================================================
[   18.328436] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.328513] Write of size 1 at addr fff00000c64b60da by task kunit_try_catch/163
[   18.328567] 
[   18.328599] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.328686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.328714] Hardware name: linux,dummy-virt (DT)
[   18.328747] Call trace:
[   18.328769]  show_stack+0x20/0x38 (C)
[   18.328853]  dump_stack_lvl+0x8c/0xd0
[   18.328902]  print_report+0x118/0x608
[   18.328951]  kasan_report+0xdc/0x128
[   18.328999]  __asan_report_store1_noabort+0x20/0x30
[   18.329049]  krealloc_less_oob_helper+0xa80/0xc50
[   18.329101]  krealloc_large_less_oob+0x20/0x38
[   18.329165]  kunit_try_run_case+0x170/0x3f0
[   18.329323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.329410]  kthread+0x328/0x630
[   18.329506]  ret_from_fork+0x10/0x20
[   18.329597] 
[   18.329638] The buggy address belongs to the physical page:
[   18.329672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4
[   18.329745] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.329825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.329910] page_type: f8(unknown)
[   18.329991] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.330078] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.330165] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.330267] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.330321] head: 0bfffe0000000002 ffffc1ffc3192d01 00000000ffffffff 00000000ffffffff
[   18.330448] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.330494] page dumped because: kasan: bad access detected
[   18.330535] 
[   18.330554] Memory state around the buggy address:
[   18.330586]  fff00000c64b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.330915]  fff00000c64b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.331062] >fff00000c64b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.331212]                                                     ^
[   18.331345]  fff00000c64b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.331491]  fff00000c64b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.331635] ==================================================================

[   11.304033] ==================================================================
[   11.304389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.304755] Write of size 1 at addr ffff888100ab6eeb by task kunit_try_catch/175
[   11.305311] 
[   11.305425] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.305468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.305479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.305499] Call Trace:
[   11.305518]  <TASK>
[   11.305539]  dump_stack_lvl+0x73/0xb0
[   11.305578]  print_report+0xd1/0x650
[   11.305602]  ? __virt_addr_valid+0x1db/0x2d0
[   11.305623]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.305645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.305665]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.305687]  kasan_report+0x141/0x180
[   11.305708]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.305735]  __asan_report_store1_noabort+0x1b/0x30
[   11.305754]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.305775]  ? __perf_event_task_sched_in+0x151/0x360
[   11.305801]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.305824]  ? finish_task_switch.isra.0+0x153/0x700
[   11.305845]  ? __switch_to+0x47/0xf50
[   11.305870]  ? __schedule+0x10cc/0x2b60
[   11.305891]  ? __pfx_read_tsc+0x10/0x10
[   11.305914]  krealloc_less_oob+0x1c/0x30
[   11.305934]  kunit_try_run_case+0x1a5/0x480
[   11.305958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.305978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.306000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.306021]  ? __kthread_parkme+0x82/0x180
[   11.306041]  ? preempt_count_sub+0x50/0x80
[   11.306062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.306084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.306105]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.306126]  kthread+0x337/0x6f0
[   11.306144]  ? trace_preempt_on+0x20/0xc0
[   11.306166]  ? __pfx_kthread+0x10/0x10
[   11.306185]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.306206]  ? calculate_sigpending+0x7b/0xa0
[   11.306229]  ? __pfx_kthread+0x10/0x10
[   11.306248]  ret_from_fork+0x116/0x1d0
[   11.306265]  ? __pfx_kthread+0x10/0x10
[   11.306284]  ret_from_fork_asm+0x1a/0x30
[   11.306314]  </TASK>
[   11.306324] 
[   11.315221] Allocated by task 175:
[   11.315485]  kasan_save_stack+0x45/0x70
[   11.315720]  kasan_save_track+0x18/0x40
[   11.315906]  kasan_save_alloc_info+0x3b/0x50
[   11.316120]  __kasan_krealloc+0x190/0x1f0
[   11.316311]  krealloc_noprof+0xf3/0x340
[   11.316516]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.316748]  krealloc_less_oob+0x1c/0x30
[   11.316882]  kunit_try_run_case+0x1a5/0x480
[   11.317022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.317228]  kthread+0x337/0x6f0
[   11.317571]  ret_from_fork+0x116/0x1d0
[   11.317785]  ret_from_fork_asm+0x1a/0x30
[   11.318285] 
[   11.318402] The buggy address belongs to the object at ffff888100ab6e00
[   11.318402]  which belongs to the cache kmalloc-256 of size 256
[   11.319086] The buggy address is located 34 bytes to the right of
[   11.319086]  allocated 201-byte region [ffff888100ab6e00, ffff888100ab6ec9)
[   11.319657] 
[   11.319747] The buggy address belongs to the physical page:
[   11.319922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab6
[   11.320310] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.320772] flags: 0x200000000000040(head|node=0|zone=2)
[   11.321230] page_type: f5(slab)
[   11.321453] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.321796] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.322129] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.322365] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.323120] head: 0200000000000001 ffffea000402ad81 00000000ffffffff 00000000ffffffff
[   11.323846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.324266] page dumped because: kasan: bad access detected
[   11.324478] 
[   11.324564] Memory state around the buggy address:
[   11.324828]  ffff888100ab6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.325305]  ffff888100ab6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.325596] >ffff888100ab6e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.326077]                                                           ^
[   11.326590]  ffff888100ab6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.327220]  ffff888100ab6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.327550] ==================================================================
[   11.259216] ==================================================================
[   11.259544] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.259922] Write of size 1 at addr ffff888100ab6eda by task kunit_try_catch/175
[   11.260249] 
[   11.260355] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.260414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.260425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.260446] Call Trace:
[   11.260465]  <TASK>
[   11.260485]  dump_stack_lvl+0x73/0xb0
[   11.260515]  print_report+0xd1/0x650
[   11.260539]  ? __virt_addr_valid+0x1db/0x2d0
[   11.260561]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.260583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.260604]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.260626]  kasan_report+0x141/0x180
[   11.260646]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.260673]  __asan_report_store1_noabort+0x1b/0x30
[   11.260692]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.260713]  ? __perf_event_task_sched_in+0x151/0x360
[   11.260739]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.260761]  ? finish_task_switch.isra.0+0x153/0x700
[   11.260782]  ? __switch_to+0x47/0xf50
[   11.260806]  ? __schedule+0x10cc/0x2b60
[   11.260827]  ? __pfx_read_tsc+0x10/0x10
[   11.260850]  krealloc_less_oob+0x1c/0x30
[   11.260870]  kunit_try_run_case+0x1a5/0x480
[   11.260893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.260914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.260936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.260957]  ? __kthread_parkme+0x82/0x180
[   11.260977]  ? preempt_count_sub+0x50/0x80
[   11.260998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.261020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.261041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.261062]  kthread+0x337/0x6f0
[   11.261080]  ? trace_preempt_on+0x20/0xc0
[   11.261102]  ? __pfx_kthread+0x10/0x10
[   11.261121]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.261140]  ? calculate_sigpending+0x7b/0xa0
[   11.261163]  ? __pfx_kthread+0x10/0x10
[   11.261182]  ret_from_fork+0x116/0x1d0
[   11.261199]  ? __pfx_kthread+0x10/0x10
[   11.261218]  ret_from_fork_asm+0x1a/0x30
[   11.261247]  </TASK>
[   11.261258] 
[   11.269833] Allocated by task 175:
[   11.269990]  kasan_save_stack+0x45/0x70
[   11.270172]  kasan_save_track+0x18/0x40
[   11.270367]  kasan_save_alloc_info+0x3b/0x50
[   11.270649]  __kasan_krealloc+0x190/0x1f0
[   11.270954]  krealloc_noprof+0xf3/0x340
[   11.271131]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.271290]  krealloc_less_oob+0x1c/0x30
[   11.271535]  kunit_try_run_case+0x1a5/0x480
[   11.271755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.272289]  kthread+0x337/0x6f0
[   11.272496]  ret_from_fork+0x116/0x1d0
[   11.272712]  ret_from_fork_asm+0x1a/0x30
[   11.272853] 
[   11.272974] The buggy address belongs to the object at ffff888100ab6e00
[   11.272974]  which belongs to the cache kmalloc-256 of size 256
[   11.273539] The buggy address is located 17 bytes to the right of
[   11.273539]  allocated 201-byte region [ffff888100ab6e00, ffff888100ab6ec9)
[   11.274082] 
[   11.274159] The buggy address belongs to the physical page:
[   11.274350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab6
[   11.274912] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.275213] flags: 0x200000000000040(head|node=0|zone=2)
[   11.275424] page_type: f5(slab)
[   11.275629] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.276233] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.276495] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.276725] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.277033] head: 0200000000000001 ffffea000402ad81 00000000ffffffff 00000000ffffffff
[   11.277648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.278068] page dumped because: kasan: bad access detected
[   11.278240] 
[   11.278310] Memory state around the buggy address:
[   11.278525]  ffff888100ab6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.279183]  ffff888100ab6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.279487] >ffff888100ab6e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.279811]                                                     ^
[   11.280431]  ffff888100ab6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.280675]  ffff888100ab6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.280895] ==================================================================
[   11.281536] ==================================================================
[   11.281900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.282356] Write of size 1 at addr ffff888100ab6eea by task kunit_try_catch/175
[   11.282599] 
[   11.282690] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.282733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.282744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.282764] Call Trace:
[   11.282783]  <TASK>
[   11.282803]  dump_stack_lvl+0x73/0xb0
[   11.282831]  print_report+0xd1/0x650
[   11.282854]  ? __virt_addr_valid+0x1db/0x2d0
[   11.282876]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.282898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.282919]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.282941]  kasan_report+0x141/0x180
[   11.282962]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.282988]  __asan_report_store1_noabort+0x1b/0x30
[   11.283007]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.283028]  ? __perf_event_task_sched_in+0x151/0x360
[   11.283055]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.283077]  ? finish_task_switch.isra.0+0x153/0x700
[   11.283097]  ? __switch_to+0x47/0xf50
[   11.283122]  ? __schedule+0x10cc/0x2b60
[   11.283143]  ? __pfx_read_tsc+0x10/0x10
[   11.283166]  krealloc_less_oob+0x1c/0x30
[   11.283186]  kunit_try_run_case+0x1a5/0x480
[   11.283210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.283231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.283253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.283274]  ? __kthread_parkme+0x82/0x180
[   11.283294]  ? preempt_count_sub+0x50/0x80
[   11.283315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.283337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.283358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.283389]  kthread+0x337/0x6f0
[   11.283407]  ? trace_preempt_on+0x20/0xc0
[   11.283429]  ? __pfx_kthread+0x10/0x10
[   11.283448]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.283468]  ? calculate_sigpending+0x7b/0xa0
[   11.283490]  ? __pfx_kthread+0x10/0x10
[   11.283510]  ret_from_fork+0x116/0x1d0
[   11.283528]  ? __pfx_kthread+0x10/0x10
[   11.283546]  ret_from_fork_asm+0x1a/0x30
[   11.283576]  </TASK>
[   11.283587] 
[   11.292361] Allocated by task 175:
[   11.292537]  kasan_save_stack+0x45/0x70
[   11.292754]  kasan_save_track+0x18/0x40
[   11.292943]  kasan_save_alloc_info+0x3b/0x50
[   11.293147]  __kasan_krealloc+0x190/0x1f0
[   11.293338]  krealloc_noprof+0xf3/0x340
[   11.293560]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.293721]  krealloc_less_oob+0x1c/0x30
[   11.293858]  kunit_try_run_case+0x1a5/0x480
[   11.294442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.294894]  kthread+0x337/0x6f0
[   11.295105]  ret_from_fork+0x116/0x1d0
[   11.295298]  ret_from_fork_asm+0x1a/0x30
[   11.295511] 
[   11.295621] The buggy address belongs to the object at ffff888100ab6e00
[   11.295621]  which belongs to the cache kmalloc-256 of size 256
[   11.296277] The buggy address is located 33 bytes to the right of
[   11.296277]  allocated 201-byte region [ffff888100ab6e00, ffff888100ab6ec9)
[   11.296683] 
[   11.296758] The buggy address belongs to the physical page:
[   11.297180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab6
[   11.297557] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.298179] flags: 0x200000000000040(head|node=0|zone=2)
[   11.298421] page_type: f5(slab)
[   11.298547] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.299177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.299512] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.299745] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.299975] head: 0200000000000001 ffffea000402ad81 00000000ffffffff 00000000ffffffff
[   11.300408] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.300752] page dumped because: kasan: bad access detected
[   11.300981] 
[   11.301051] Memory state around the buggy address:
[   11.301270]  ffff888100ab6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.301573]  ffff888100ab6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.302301] >ffff888100ab6e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.302565]                                                           ^
[   11.302912]  ffff888100ab6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.303263]  ffff888100ab6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.303601] ==================================================================
[   11.213270] ==================================================================
[   11.213735] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.214558] Write of size 1 at addr ffff888100ab6ec9 by task kunit_try_catch/175
[   11.214859] 
[   11.215286] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.215338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.215350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.215387] Call Trace:
[   11.215400]  <TASK>
[   11.215420]  dump_stack_lvl+0x73/0xb0
[   11.215453]  print_report+0xd1/0x650
[   11.215477]  ? __virt_addr_valid+0x1db/0x2d0
[   11.215501]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.215523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.215544]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.215566]  kasan_report+0x141/0x180
[   11.215586]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.215613]  __asan_report_store1_noabort+0x1b/0x30
[   11.215632]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.215653]  ? __perf_event_task_sched_in+0x151/0x360
[   11.215681]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.215703]  ? finish_task_switch.isra.0+0x153/0x700
[   11.215725]  ? __switch_to+0x47/0xf50
[   11.215751]  ? __schedule+0x10cc/0x2b60
[   11.215772]  ? __pfx_read_tsc+0x10/0x10
[   11.215796]  krealloc_less_oob+0x1c/0x30
[   11.215818]  kunit_try_run_case+0x1a5/0x480
[   11.215843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.215863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.215886]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.215907]  ? __kthread_parkme+0x82/0x180
[   11.215946]  ? preempt_count_sub+0x50/0x80
[   11.215968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.215990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.216011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.216032]  kthread+0x337/0x6f0
[   11.216050]  ? trace_preempt_on+0x20/0xc0
[   11.216072]  ? __pfx_kthread+0x10/0x10
[   11.216091]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.216111]  ? calculate_sigpending+0x7b/0xa0
[   11.216133]  ? __pfx_kthread+0x10/0x10
[   11.216153]  ret_from_fork+0x116/0x1d0
[   11.216170]  ? __pfx_kthread+0x10/0x10
[   11.216189]  ret_from_fork_asm+0x1a/0x30
[   11.216219]  </TASK>
[   11.216230] 
[   11.224687] Allocated by task 175:
[   11.224899]  kasan_save_stack+0x45/0x70
[   11.225195]  kasan_save_track+0x18/0x40
[   11.225675]  kasan_save_alloc_info+0x3b/0x50
[   11.225852]  __kasan_krealloc+0x190/0x1f0
[   11.225991]  krealloc_noprof+0xf3/0x340
[   11.226126]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.226358]  krealloc_less_oob+0x1c/0x30
[   11.226566]  kunit_try_run_case+0x1a5/0x480
[   11.226778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.227133]  kthread+0x337/0x6f0
[   11.227275]  ret_from_fork+0x116/0x1d0
[   11.227467]  ret_from_fork_asm+0x1a/0x30
[   11.227688] 
[   11.227788] The buggy address belongs to the object at ffff888100ab6e00
[   11.227788]  which belongs to the cache kmalloc-256 of size 256
[   11.228250] The buggy address is located 0 bytes to the right of
[   11.228250]  allocated 201-byte region [ffff888100ab6e00, ffff888100ab6ec9)
[   11.229248] 
[   11.229367] The buggy address belongs to the physical page:
[   11.229684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab6
[   11.230009] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.230239] flags: 0x200000000000040(head|node=0|zone=2)
[   11.230495] page_type: f5(slab)
[   11.230665] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.231061] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.231591] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.231895] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.232164] head: 0200000000000001 ffffea000402ad81 00000000ffffffff 00000000ffffffff
[   11.232407] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.232862] page dumped because: kasan: bad access detected
[   11.233525] 
[   11.233634] Memory state around the buggy address:
[   11.233808]  ffff888100ab6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.234082]  ffff888100ab6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.234415] >ffff888100ab6e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.234729]                                               ^
[   11.235066]  ffff888100ab6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.235365]  ffff888100ab6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.235697] ==================================================================
[   11.400818] ==================================================================
[   11.401311] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.401735] Write of size 1 at addr ffff888102bea0d0 by task kunit_try_catch/179
[   11.402092] 
[   11.402207] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.402250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.402262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.402282] Call Trace:
[   11.402301]  <TASK>
[   11.402319]  dump_stack_lvl+0x73/0xb0
[   11.402349]  print_report+0xd1/0x650
[   11.402383]  ? __virt_addr_valid+0x1db/0x2d0
[   11.402405]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.402427]  ? kasan_addr_to_slab+0x11/0xa0
[   11.402447]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.402470]  kasan_report+0x141/0x180
[   11.402490]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.402517]  __asan_report_store1_noabort+0x1b/0x30
[   11.402537]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.402561]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.402584]  ? finish_task_switch.isra.0+0x153/0x700
[   11.402606]  ? __switch_to+0x47/0xf50
[   11.402632]  ? __schedule+0x10cc/0x2b60
[   11.402653]  ? __pfx_read_tsc+0x10/0x10
[   11.402676]  krealloc_large_less_oob+0x1c/0x30
[   11.402697]  kunit_try_run_case+0x1a5/0x480
[   11.402722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.402743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.402766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.402787]  ? __kthread_parkme+0x82/0x180
[   11.402807]  ? preempt_count_sub+0x50/0x80
[   11.402829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.402851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.402872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.402894]  kthread+0x337/0x6f0
[   11.402912]  ? trace_preempt_on+0x20/0xc0
[   11.402935]  ? __pfx_kthread+0x10/0x10
[   11.402954]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.402973]  ? calculate_sigpending+0x7b/0xa0
[   11.402997]  ? __pfx_kthread+0x10/0x10
[   11.403017]  ret_from_fork+0x116/0x1d0
[   11.403034]  ? __pfx_kthread+0x10/0x10
[   11.403053]  ret_from_fork_asm+0x1a/0x30
[   11.403083]  </TASK>
[   11.403093] 
[   11.411602] The buggy address belongs to the physical page:
[   11.411832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be8
[   11.412220] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.412752] flags: 0x200000000000040(head|node=0|zone=2)
[   11.412948] page_type: f8(unknown)
[   11.413176] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.413465] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.413711] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.414341] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.414661] head: 0200000000000002 ffffea00040afa01 00000000ffffffff 00000000ffffffff
[   11.414958] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.415337] page dumped because: kasan: bad access detected
[   11.415532] 
[   11.415602] Memory state around the buggy address:
[   11.415758]  ffff888102be9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.416072]  ffff888102bea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.416417] >ffff888102bea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.416676]                                                  ^
[   11.416855]  ffff888102bea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.417451]  ffff888102bea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.417757] ==================================================================
[   11.436040] ==================================================================
[   11.436433] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.437129] Write of size 1 at addr ffff888102bea0ea by task kunit_try_catch/179
[   11.437391] 
[   11.437507] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.437550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.437561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.437580] Call Trace:
[   11.437598]  <TASK>
[   11.437617]  dump_stack_lvl+0x73/0xb0
[   11.437645]  print_report+0xd1/0x650
[   11.437668]  ? __virt_addr_valid+0x1db/0x2d0
[   11.437691]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.437730]  ? kasan_addr_to_slab+0x11/0xa0
[   11.437750]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.437773]  kasan_report+0x141/0x180
[   11.437793]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.437820]  __asan_report_store1_noabort+0x1b/0x30
[   11.437839]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.437864]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.437886]  ? finish_task_switch.isra.0+0x153/0x700
[   11.437908]  ? __switch_to+0x47/0xf50
[   11.437975]  ? __schedule+0x10cc/0x2b60
[   11.437998]  ? __pfx_read_tsc+0x10/0x10
[   11.438022]  krealloc_large_less_oob+0x1c/0x30
[   11.438043]  kunit_try_run_case+0x1a5/0x480
[   11.438068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.438089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.438112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.438134]  ? __kthread_parkme+0x82/0x180
[   11.438154]  ? preempt_count_sub+0x50/0x80
[   11.438176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.438198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.438219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.438241]  kthread+0x337/0x6f0
[   11.438259]  ? trace_preempt_on+0x20/0xc0
[   11.438282]  ? __pfx_kthread+0x10/0x10
[   11.438302]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.438322]  ? calculate_sigpending+0x7b/0xa0
[   11.438345]  ? __pfx_kthread+0x10/0x10
[   11.438365]  ret_from_fork+0x116/0x1d0
[   11.438395]  ? __pfx_kthread+0x10/0x10
[   11.438414]  ret_from_fork_asm+0x1a/0x30
[   11.438445]  </TASK>
[   11.438455] 
[   11.446464] The buggy address belongs to the physical page:
[   11.446749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be8
[   11.446997] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.447306] flags: 0x200000000000040(head|node=0|zone=2)
[   11.447576] page_type: f8(unknown)
[   11.447915] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.448177] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.448459] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.448992] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.449311] head: 0200000000000002 ffffea00040afa01 00000000ffffffff 00000000ffffffff
[   11.449554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.449933] page dumped because: kasan: bad access detected
[   11.450178] 
[   11.450271] Memory state around the buggy address:
[   11.450700]  ffff888102be9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.451184]  ffff888102bea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.451537] >ffff888102bea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.452022]                                                           ^
[   11.452279]  ffff888102bea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.452533]  ffff888102bea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.452777] ==================================================================
[   11.236223] ==================================================================
[   11.236599] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.236885] Write of size 1 at addr ffff888100ab6ed0 by task kunit_try_catch/175
[   11.237582] 
[   11.237709] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.237754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.237766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.237785] Call Trace:
[   11.237804]  <TASK>
[   11.237823]  dump_stack_lvl+0x73/0xb0
[   11.237855]  print_report+0xd1/0x650
[   11.237878]  ? __virt_addr_valid+0x1db/0x2d0
[   11.237900]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.237922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.237942]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.237964]  kasan_report+0x141/0x180
[   11.237985]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.238012]  __asan_report_store1_noabort+0x1b/0x30
[   11.238031]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.238052]  ? __perf_event_task_sched_in+0x151/0x360
[   11.238079]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.238102]  ? finish_task_switch.isra.0+0x153/0x700
[   11.238126]  ? __switch_to+0x47/0xf50
[   11.238152]  ? __schedule+0x10cc/0x2b60
[   11.238175]  ? __pfx_read_tsc+0x10/0x10
[   11.238199]  krealloc_less_oob+0x1c/0x30
[   11.238219]  kunit_try_run_case+0x1a5/0x480
[   11.238242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.238262]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.238285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.238307]  ? __kthread_parkme+0x82/0x180
[   11.238328]  ? preempt_count_sub+0x50/0x80
[   11.238349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.238384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.238406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.238428]  kthread+0x337/0x6f0
[   11.238446]  ? trace_preempt_on+0x20/0xc0
[   11.238469]  ? __pfx_kthread+0x10/0x10
[   11.238488]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.238508]  ? calculate_sigpending+0x7b/0xa0
[   11.238531]  ? __pfx_kthread+0x10/0x10
[   11.238551]  ret_from_fork+0x116/0x1d0
[   11.238568]  ? __pfx_kthread+0x10/0x10
[   11.238587]  ret_from_fork_asm+0x1a/0x30
[   11.238618]  </TASK>
[   11.238629] 
[   11.247228] Allocated by task 175:
[   11.247448]  kasan_save_stack+0x45/0x70
[   11.247718]  kasan_save_track+0x18/0x40
[   11.247855]  kasan_save_alloc_info+0x3b/0x50
[   11.248125]  __kasan_krealloc+0x190/0x1f0
[   11.248285]  krealloc_noprof+0xf3/0x340
[   11.248436]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.248750]  krealloc_less_oob+0x1c/0x30
[   11.248957]  kunit_try_run_case+0x1a5/0x480
[   11.249462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.249710]  kthread+0x337/0x6f0
[   11.249855]  ret_from_fork+0x116/0x1d0
[   11.249986]  ret_from_fork_asm+0x1a/0x30
[   11.250124] 
[   11.250194] The buggy address belongs to the object at ffff888100ab6e00
[   11.250194]  which belongs to the cache kmalloc-256 of size 256
[   11.250971] The buggy address is located 7 bytes to the right of
[   11.250971]  allocated 201-byte region [ffff888100ab6e00, ffff888100ab6ec9)
[   11.251530] 
[   11.251604] The buggy address belongs to the physical page:
[   11.251778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab6
[   11.252039] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.252445] flags: 0x200000000000040(head|node=0|zone=2)
[   11.252882] page_type: f5(slab)
[   11.253437] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.253822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.254051] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.254282] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.254774] head: 0200000000000001 ffffea000402ad81 00000000ffffffff 00000000ffffffff
[   11.255314] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.255669] page dumped because: kasan: bad access detected
[   11.255877] 
[   11.255947] Memory state around the buggy address:
[   11.256213]  ffff888100ab6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.256520]  ffff888100ab6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.256770] >ffff888100ab6e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.257742]                                                  ^
[   11.258063]  ffff888100ab6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.258359]  ffff888100ab6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.258673] ==================================================================
[   11.418172] ==================================================================
[   11.418468] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.418767] Write of size 1 at addr ffff888102bea0da by task kunit_try_catch/179
[   11.419227] 
[   11.419363] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.419420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.419431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.419451] Call Trace:
[   11.419468]  <TASK>
[   11.419485]  dump_stack_lvl+0x73/0xb0
[   11.419515]  print_report+0xd1/0x650
[   11.419537]  ? __virt_addr_valid+0x1db/0x2d0
[   11.419560]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.419582]  ? kasan_addr_to_slab+0x11/0xa0
[   11.419601]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.419623]  kasan_report+0x141/0x180
[   11.419644]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.419671]  __asan_report_store1_noabort+0x1b/0x30
[   11.419691]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.419715]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.419737]  ? finish_task_switch.isra.0+0x153/0x700
[   11.419758]  ? __switch_to+0x47/0xf50
[   11.419783]  ? __schedule+0x10cc/0x2b60
[   11.419804]  ? __pfx_read_tsc+0x10/0x10
[   11.419828]  krealloc_large_less_oob+0x1c/0x30
[   11.419849]  kunit_try_run_case+0x1a5/0x480
[   11.419873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.419894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.419917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.419938]  ? __kthread_parkme+0x82/0x180
[   11.419958]  ? preempt_count_sub+0x50/0x80
[   11.420034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.420059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.420081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.420103]  kthread+0x337/0x6f0
[   11.420122]  ? trace_preempt_on+0x20/0xc0
[   11.420146]  ? __pfx_kthread+0x10/0x10
[   11.420165]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.420185]  ? calculate_sigpending+0x7b/0xa0
[   11.420208]  ? __pfx_kthread+0x10/0x10
[   11.420228]  ret_from_fork+0x116/0x1d0
[   11.420245]  ? __pfx_kthread+0x10/0x10
[   11.420265]  ret_from_fork_asm+0x1a/0x30
[   11.420294]  </TASK>
[   11.420304] 
[   11.428135] The buggy address belongs to the physical page:
[   11.428420] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be8
[   11.428808] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.429165] flags: 0x200000000000040(head|node=0|zone=2)
[   11.429396] page_type: f8(unknown)
[   11.429578] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.429875] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.430410] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.430747] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.431184] head: 0200000000000002 ffffea00040afa01 00000000ffffffff 00000000ffffffff
[   11.431488] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.431717] page dumped because: kasan: bad access detected
[   11.431887] 
[   11.431957] Memory state around the buggy address:
[   11.432154]  ffff888102be9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.432549]  ffff888102bea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.432843] >ffff888102bea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.433055]                                                     ^
[   11.433242]  ffff888102bea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.433467]  ffff888102bea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.434085] ==================================================================
[   11.378273] ==================================================================
[   11.378794] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.379148] Write of size 1 at addr ffff888102bea0c9 by task kunit_try_catch/179
[   11.379587] 
[   11.379691] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.379739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.379751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.379773] Call Trace:
[   11.379879]  <TASK>
[   11.379899]  dump_stack_lvl+0x73/0xb0
[   11.379931]  print_report+0xd1/0x650
[   11.379954]  ? __virt_addr_valid+0x1db/0x2d0
[   11.379978]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.380000]  ? kasan_addr_to_slab+0x11/0xa0
[   11.380019]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.380087]  kasan_report+0x141/0x180
[   11.380109]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.380159]  __asan_report_store1_noabort+0x1b/0x30
[   11.380183]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.380208]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.380231]  ? finish_task_switch.isra.0+0x153/0x700
[   11.380255]  ? __switch_to+0x47/0xf50
[   11.380281]  ? __schedule+0x10cc/0x2b60
[   11.380304]  ? __pfx_read_tsc+0x10/0x10
[   11.380346]  krealloc_large_less_oob+0x1c/0x30
[   11.380368]  kunit_try_run_case+0x1a5/0x480
[   11.380413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.380434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.380459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.380480]  ? __kthread_parkme+0x82/0x180
[   11.380501]  ? preempt_count_sub+0x50/0x80
[   11.380523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.380545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.380568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.380590]  kthread+0x337/0x6f0
[   11.380608]  ? trace_preempt_on+0x20/0xc0
[   11.380631]  ? __pfx_kthread+0x10/0x10
[   11.380650]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.380671]  ? calculate_sigpending+0x7b/0xa0
[   11.380694]  ? __pfx_kthread+0x10/0x10
[   11.380714]  ret_from_fork+0x116/0x1d0
[   11.380731]  ? __pfx_kthread+0x10/0x10
[   11.380750]  ret_from_fork_asm+0x1a/0x30
[   11.380781]  </TASK>
[   11.380792] 
[   11.393425] The buggy address belongs to the physical page:
[   11.393706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be8
[   11.394049] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.394474] flags: 0x200000000000040(head|node=0|zone=2)
[   11.394773] page_type: f8(unknown)
[   11.395028] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.395415] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.395692] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.396117] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.396521] head: 0200000000000002 ffffea00040afa01 00000000ffffffff 00000000ffffffff
[   11.396890] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.397320] page dumped because: kasan: bad access detected
[   11.397601] 
[   11.397681] Memory state around the buggy address:
[   11.398027]  ffff888102be9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.398646]  ffff888102bea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.398952] >ffff888102bea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.399421]                                               ^
[   11.399697]  ffff888102bea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.400054]  ffff888102bea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.400366] ==================================================================
[   11.453334] ==================================================================
[   11.453720] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.454073] Write of size 1 at addr ffff888102bea0eb by task kunit_try_catch/179
[   11.454339] 
[   11.454458] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.454500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.454512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.454532] Call Trace:
[   11.454550]  <TASK>
[   11.454567]  dump_stack_lvl+0x73/0xb0
[   11.454594]  print_report+0xd1/0x650
[   11.454617]  ? __virt_addr_valid+0x1db/0x2d0
[   11.454639]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.454661]  ? kasan_addr_to_slab+0x11/0xa0
[   11.454680]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.454703]  kasan_report+0x141/0x180
[   11.454723]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.454815]  __asan_report_store1_noabort+0x1b/0x30
[   11.454838]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.454862]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.454885]  ? finish_task_switch.isra.0+0x153/0x700
[   11.454906]  ? __switch_to+0x47/0xf50
[   11.454960]  ? __schedule+0x10cc/0x2b60
[   11.454984]  ? __pfx_read_tsc+0x10/0x10
[   11.455007]  krealloc_large_less_oob+0x1c/0x30
[   11.455029]  kunit_try_run_case+0x1a5/0x480
[   11.455053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.455074]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.455097]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.455118]  ? __kthread_parkme+0x82/0x180
[   11.455138]  ? preempt_count_sub+0x50/0x80
[   11.455160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.455182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.455204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.455226]  kthread+0x337/0x6f0
[   11.455244]  ? trace_preempt_on+0x20/0xc0
[   11.455268]  ? __pfx_kthread+0x10/0x10
[   11.455287]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.455307]  ? calculate_sigpending+0x7b/0xa0
[   11.455330]  ? __pfx_kthread+0x10/0x10
[   11.455350]  ret_from_fork+0x116/0x1d0
[   11.455367]  ? __pfx_kthread+0x10/0x10
[   11.455397]  ret_from_fork_asm+0x1a/0x30
[   11.455427]  </TASK>
[   11.455438] 
[   11.463737] The buggy address belongs to the physical page:
[   11.464072] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be8
[   11.464764] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.465019] flags: 0x200000000000040(head|node=0|zone=2)
[   11.465391] page_type: f8(unknown)
[   11.465578] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.465959] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.466223] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.466520] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.467010] head: 0200000000000002 ffffea00040afa01 00000000ffffffff 00000000ffffffff
[   11.467400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.467629] page dumped because: kasan: bad access detected
[   11.467800] 
[   11.467898] Memory state around the buggy address:
[   11.468120]  ffff888102be9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.468716]  ffff888102bea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.469073] >ffff888102bea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.469287]                                                           ^
[   11.469501]  ffff888102bea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.470033]  ffff888102bea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.470350] ==================================================================