Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.863585] ==================================================================
[   18.863688] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.863869] Write of size 1 at addr fff00000c78520da by task kunit_try_catch/163
[   18.863988] 
[   18.864065] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.864231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.864291] Hardware name: linux,dummy-virt (DT)
[   18.864374] Call trace:
[   18.864423]  show_stack+0x20/0x38 (C)
[   18.864527]  dump_stack_lvl+0x8c/0xd0
[   18.864630]  print_report+0x118/0x608
[   18.864726]  kasan_report+0xdc/0x128
[   18.864826]  __asan_report_store1_noabort+0x20/0x30
[   18.864932]  krealloc_less_oob_helper+0xa80/0xc50
[   18.865037]  krealloc_large_less_oob+0x20/0x38
[   18.865135]  kunit_try_run_case+0x170/0x3f0
[   18.865238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.865351]  kthread+0x328/0x630
[   18.865459]  ret_from_fork+0x10/0x20
[   18.865559] 
[   18.865601] The buggy address belongs to the physical page:
[   18.865666] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   18.865776] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.865873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.865978] page_type: f8(unknown)
[   18.867815] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.868058] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.868253] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.868435] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.868949] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   18.869386] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.869533] page dumped because: kasan: bad access detected
[   18.869606] 
[   18.869656] Memory state around the buggy address:
[   18.869790]  fff00000c7851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.869942]  fff00000c7852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.870036] >fff00000c7852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.870115]                                                     ^
[   18.870180]  fff00000c7852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.870262]  fff00000c7852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.870337] ==================================================================
[   18.877659] ==================================================================
[   18.877788] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.877909] Write of size 1 at addr fff00000c78520eb by task kunit_try_catch/163
[   18.878056] 
[   18.878116] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.878259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.878309] Hardware name: linux,dummy-virt (DT)
[   18.878388] Call trace:
[   18.878431]  show_stack+0x20/0x38 (C)
[   18.878775]  dump_stack_lvl+0x8c/0xd0
[   18.878903]  print_report+0x118/0x608
[   18.879000]  kasan_report+0xdc/0x128
[   18.879112]  __asan_report_store1_noabort+0x20/0x30
[   18.879281]  krealloc_less_oob_helper+0xa58/0xc50
[   18.879411]  krealloc_large_less_oob+0x20/0x38
[   18.879511]  kunit_try_run_case+0x170/0x3f0
[   18.879619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.879784]  kthread+0x328/0x630
[   18.879875]  ret_from_fork+0x10/0x20
[   18.879968] 
[   18.880009] The buggy address belongs to the physical page:
[   18.880480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   18.880648] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.880789] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.880943] page_type: f8(unknown)
[   18.881056] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.881166] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.881307] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.881426] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.881524] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   18.882088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.882265] page dumped because: kasan: bad access detected
[   18.882380] 
[   18.882504] Memory state around the buggy address:
[   18.882610]  fff00000c7851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.882707]  fff00000c7852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.882827] >fff00000c7852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.882898]                                                           ^
[   18.882978]  fff00000c7852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.883292]  fff00000c7852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.883389] ==================================================================
[   18.764366] ==================================================================
[   18.766037] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.766191] Write of size 1 at addr fff00000c091f8da by task kunit_try_catch/159
[   18.766286] 
[   18.766343] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.766528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.766586] Hardware name: linux,dummy-virt (DT)
[   18.766651] Call trace:
[   18.766992]  show_stack+0x20/0x38 (C)
[   18.767339]  dump_stack_lvl+0x8c/0xd0
[   18.767471]  print_report+0x118/0x608
[   18.767573]  kasan_report+0xdc/0x128
[   18.767669]  __asan_report_store1_noabort+0x20/0x30
[   18.767782]  krealloc_less_oob_helper+0xa80/0xc50
[   18.768534]  krealloc_less_oob+0x20/0x38
[   18.768980]  kunit_try_run_case+0x170/0x3f0
[   18.769525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.769661]  kthread+0x328/0x630
[   18.769765]  ret_from_fork+0x10/0x20
[   18.769869] 
[   18.769909] Allocated by task 159:
[   18.769965]  kasan_save_stack+0x3c/0x68
[   18.770047]  kasan_save_track+0x20/0x40
[   18.770584]  kasan_save_alloc_info+0x40/0x58
[   18.771060]  __kasan_krealloc+0x118/0x178
[   18.771205]  krealloc_noprof+0x128/0x360
[   18.771331]  krealloc_less_oob_helper+0x168/0xc50
[   18.771443]  krealloc_less_oob+0x20/0x38
[   18.771585]  kunit_try_run_case+0x170/0x3f0
[   18.771710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.771989]  kthread+0x328/0x630
[   18.772282]  ret_from_fork+0x10/0x20
[   18.772398] 
[   18.772489] The buggy address belongs to the object at fff00000c091f800
[   18.772489]  which belongs to the cache kmalloc-256 of size 256
[   18.772807] The buggy address is located 17 bytes to the right of
[   18.772807]  allocated 201-byte region [fff00000c091f800, fff00000c091f8c9)
[   18.773347] 
[   18.773432] The buggy address belongs to the physical page:
[   18.773506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   18.773624] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.773720] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.774477] page_type: f5(slab)
[   18.774659] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.774820] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.774972] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.775086] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.775411] head: 0bfffe0000000001 ffffc1ffc3024781 00000000ffffffff 00000000ffffffff
[   18.775504] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.775586] page dumped because: kasan: bad access detected
[   18.775649] 
[   18.775686] Memory state around the buggy address:
[   18.776311]  fff00000c091f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.776489]  fff00000c091f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.776580] >fff00000c091f880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.776673]                                                     ^
[   18.777133]  fff00000c091f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.777241]  fff00000c091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.777322] ==================================================================
[   18.795253] ==================================================================
[   18.795386] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.795513] Write of size 1 at addr fff00000c091f8eb by task kunit_try_catch/159
[   18.795625] 
[   18.795693] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.795879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.795941] Hardware name: linux,dummy-virt (DT)
[   18.796009] Call trace:
[   18.796064]  show_stack+0x20/0x38 (C)
[   18.796168]  dump_stack_lvl+0x8c/0xd0
[   18.796264]  print_report+0x118/0x608
[   18.796702]  kasan_report+0xdc/0x128
[   18.796852]  __asan_report_store1_noabort+0x20/0x30
[   18.796962]  krealloc_less_oob_helper+0xa58/0xc50
[   18.797074]  krealloc_less_oob+0x20/0x38
[   18.797166]  kunit_try_run_case+0x170/0x3f0
[   18.797435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.797579]  kthread+0x328/0x630
[   18.797635]  ret_from_fork+0x10/0x20
[   18.797685] 
[   18.797705] Allocated by task 159:
[   18.797734]  kasan_save_stack+0x3c/0x68
[   18.797779]  kasan_save_track+0x20/0x40
[   18.797816]  kasan_save_alloc_info+0x40/0x58
[   18.797854]  __kasan_krealloc+0x118/0x178
[   18.797891]  krealloc_noprof+0x128/0x360
[   18.797927]  krealloc_less_oob_helper+0x168/0xc50
[   18.797965]  krealloc_less_oob+0x20/0x38
[   18.798092]  kunit_try_run_case+0x170/0x3f0
[   18.798219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.798476]  kthread+0x328/0x630
[   18.798593]  ret_from_fork+0x10/0x20
[   18.798960] 
[   18.799003] The buggy address belongs to the object at fff00000c091f800
[   18.799003]  which belongs to the cache kmalloc-256 of size 256
[   18.799119] The buggy address is located 34 bytes to the right of
[   18.799119]  allocated 201-byte region [fff00000c091f800, fff00000c091f8c9)
[   18.799335] 
[   18.799475] The buggy address belongs to the physical page:
[   18.799843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   18.800121] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.800335] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.800457] page_type: f5(slab)
[   18.800978] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.801086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.801939] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.802293] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.802404] head: 0bfffe0000000001 ffffc1ffc3024781 00000000ffffffff 00000000ffffffff
[   18.802510] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.803590] page dumped because: kasan: bad access detected
[   18.803931] 
[   18.804020] Memory state around the buggy address:
[   18.804089]  fff00000c091f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.804536]  fff00000c091f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.805125] >fff00000c091f880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.805545]                                                           ^
[   18.805656]  fff00000c091f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.805861]  fff00000c091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.806458] ==================================================================
[   18.858401] ==================================================================
[   18.858529] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.858640] Write of size 1 at addr fff00000c78520d0 by task kunit_try_catch/163
[   18.858741] 
[   18.858807] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.859007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.859057] Hardware name: linux,dummy-virt (DT)
[   18.859124] Call trace:
[   18.859167]  show_stack+0x20/0x38 (C)
[   18.859270]  dump_stack_lvl+0x8c/0xd0
[   18.859390]  print_report+0x118/0x608
[   18.859496]  kasan_report+0xdc/0x128
[   18.859596]  __asan_report_store1_noabort+0x20/0x30
[   18.859700]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.859808]  krealloc_large_less_oob+0x20/0x38
[   18.859925]  kunit_try_run_case+0x170/0x3f0
[   18.860031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.860146]  kthread+0x328/0x630
[   18.860240]  ret_from_fork+0x10/0x20
[   18.860347] 
[   18.860407] The buggy address belongs to the physical page:
[   18.860476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   18.860590] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.860690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.860798] page_type: f8(unknown)
[   18.860880] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.860987] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.861093] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.861195] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.861300] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   18.861413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.861497] page dumped because: kasan: bad access detected
[   18.861561] 
[   18.861602] Memory state around the buggy address:
[   18.861660]  fff00000c7851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.861738]  fff00000c7852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.861827] >fff00000c7852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.861912]                                                  ^
[   18.861982]  fff00000c7852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.862131]  fff00000c7852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.862207] ==================================================================
[   18.852508] ==================================================================
[   18.852633] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.852736] Write of size 1 at addr fff00000c78520c9 by task kunit_try_catch/163
[   18.852840] 
[   18.852905] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.853075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.853132] Hardware name: linux,dummy-virt (DT)
[   18.853199] Call trace:
[   18.853247]  show_stack+0x20/0x38 (C)
[   18.853367]  dump_stack_lvl+0x8c/0xd0
[   18.853478]  print_report+0x118/0x608
[   18.853581]  kasan_report+0xdc/0x128
[   18.853681]  __asan_report_store1_noabort+0x20/0x30
[   18.853799]  krealloc_less_oob_helper+0xa48/0xc50
[   18.853958]  krealloc_large_less_oob+0x20/0x38
[   18.854106]  kunit_try_run_case+0x170/0x3f0
[   18.854209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.854329]  kthread+0x328/0x630
[   18.854568]  ret_from_fork+0x10/0x20
[   18.854708] 
[   18.854754] The buggy address belongs to the physical page:
[   18.854819] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   18.854912] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.855000] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.855131] page_type: f8(unknown)
[   18.855220] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.855337] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.855520] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.855643] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.855825] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   18.855972] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.856105] page dumped because: kasan: bad access detected
[   18.856178] 
[   18.856217] Memory state around the buggy address:
[   18.856307]  fff00000c7851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.856458]  fff00000c7852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.856590] >fff00000c7852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.856708]                                               ^
[   18.856797]  fff00000c7852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.856909]  fff00000c7852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.857028] ==================================================================
[   18.781300] ==================================================================
[   18.781435] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.782169] Write of size 1 at addr fff00000c091f8ea by task kunit_try_catch/159
[   18.782305] 
[   18.782386] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.782986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.783059] Hardware name: linux,dummy-virt (DT)
[   18.783167] Call trace:
[   18.783215]  show_stack+0x20/0x38 (C)
[   18.783753]  dump_stack_lvl+0x8c/0xd0
[   18.783958]  print_report+0x118/0x608
[   18.784062]  kasan_report+0xdc/0x128
[   18.784178]  __asan_report_store1_noabort+0x20/0x30
[   18.784287]  krealloc_less_oob_helper+0xae4/0xc50
[   18.784411]  krealloc_less_oob+0x20/0x38
[   18.784547]  kunit_try_run_case+0x170/0x3f0
[   18.784691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.784809]  kthread+0x328/0x630
[   18.784911]  ret_from_fork+0x10/0x20
[   18.785025] 
[   18.785069] Allocated by task 159:
[   18.785134]  kasan_save_stack+0x3c/0x68
[   18.785227]  kasan_save_track+0x20/0x40
[   18.785311]  kasan_save_alloc_info+0x40/0x58
[   18.785423]  __kasan_krealloc+0x118/0x178
[   18.785508]  krealloc_noprof+0x128/0x360
[   18.785588]  krealloc_less_oob_helper+0x168/0xc50
[   18.785672]  krealloc_less_oob+0x20/0x38
[   18.785750]  kunit_try_run_case+0x170/0x3f0
[   18.785830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.785922]  kthread+0x328/0x630
[   18.785992]  ret_from_fork+0x10/0x20
[   18.787101] 
[   18.787159] The buggy address belongs to the object at fff00000c091f800
[   18.787159]  which belongs to the cache kmalloc-256 of size 256
[   18.787582] The buggy address is located 33 bytes to the right of
[   18.787582]  allocated 201-byte region [fff00000c091f800, fff00000c091f8c9)
[   18.787744] 
[   18.787791] The buggy address belongs to the physical page:
[   18.787862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   18.787979] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.788588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.788896] page_type: f5(slab)
[   18.789184] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.789647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.790394] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.790553] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.790670] head: 0bfffe0000000001 ffffc1ffc3024781 00000000ffffffff 00000000ffffffff
[   18.790778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.791021] page dumped because: kasan: bad access detected
[   18.791085] 
[   18.791118] Memory state around the buggy address:
[   18.791509]  fff00000c091f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.791626]  fff00000c091f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.791723] >fff00000c091f880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.791833]                                                           ^
[   18.792002]  fff00000c091f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.792118]  fff00000c091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.792558] ==================================================================
[   18.753870] ==================================================================
[   18.753977] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.754339] Write of size 1 at addr fff00000c091f8d0 by task kunit_try_catch/159
[   18.754588] 
[   18.754859] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.755056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.755107] Hardware name: linux,dummy-virt (DT)
[   18.755168] Call trace:
[   18.755210]  show_stack+0x20/0x38 (C)
[   18.755469]  dump_stack_lvl+0x8c/0xd0
[   18.755697]  print_report+0x118/0x608
[   18.755878]  kasan_report+0xdc/0x128
[   18.756001]  __asan_report_store1_noabort+0x20/0x30
[   18.756108]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.756208]  krealloc_less_oob+0x20/0x38
[   18.756310]  kunit_try_run_case+0x170/0x3f0
[   18.756430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.756546]  kthread+0x328/0x630
[   18.756640]  ret_from_fork+0x10/0x20
[   18.756742] 
[   18.756782] Allocated by task 159:
[   18.756842]  kasan_save_stack+0x3c/0x68
[   18.756927]  kasan_save_track+0x20/0x40
[   18.757006]  kasan_save_alloc_info+0x40/0x58
[   18.757095]  __kasan_krealloc+0x118/0x178
[   18.757612]  krealloc_noprof+0x128/0x360
[   18.757888]  krealloc_less_oob_helper+0x168/0xc50
[   18.758145]  krealloc_less_oob+0x20/0x38
[   18.758253]  kunit_try_run_case+0x170/0x3f0
[   18.758451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.758585]  kthread+0x328/0x630
[   18.758663]  ret_from_fork+0x10/0x20
[   18.758887] 
[   18.758951] The buggy address belongs to the object at fff00000c091f800
[   18.758951]  which belongs to the cache kmalloc-256 of size 256
[   18.759338] The buggy address is located 7 bytes to the right of
[   18.759338]  allocated 201-byte region [fff00000c091f800, fff00000c091f8c9)
[   18.759862] 
[   18.759897] The buggy address belongs to the physical page:
[   18.759932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   18.759989] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.760033] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.760085] page_type: f5(slab)
[   18.760124] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.760173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.760219] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.760265] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.760311] head: 0bfffe0000000001 ffffc1ffc3024781 00000000ffffffff 00000000ffffffff
[   18.760378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.760453] page dumped because: kasan: bad access detected
[   18.760509] 
[   18.760539] Memory state around the buggy address:
[   18.760597]  fff00000c091f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.760676]  fff00000c091f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.760763] >fff00000c091f880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.760890]                                                  ^
[   18.760982]  fff00000c091f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.761092]  fff00000c091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.761179] ==================================================================
[   18.741654] ==================================================================
[   18.742034] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.742241] Write of size 1 at addr fff00000c091f8c9 by task kunit_try_catch/159
[   18.742517] 
[   18.742649] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.743048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.743231] Hardware name: linux,dummy-virt (DT)
[   18.743489] Call trace:
[   18.743536]  show_stack+0x20/0x38 (C)
[   18.743825]  dump_stack_lvl+0x8c/0xd0
[   18.744047]  print_report+0x118/0x608
[   18.744317]  kasan_report+0xdc/0x128
[   18.744448]  __asan_report_store1_noabort+0x20/0x30
[   18.744572]  krealloc_less_oob_helper+0xa48/0xc50
[   18.744664]  krealloc_less_oob+0x20/0x38
[   18.744895]  kunit_try_run_case+0x170/0x3f0
[   18.745243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.745402]  kthread+0x328/0x630
[   18.745500]  ret_from_fork+0x10/0x20
[   18.745814] 
[   18.745860] Allocated by task 159:
[   18.745928]  kasan_save_stack+0x3c/0x68
[   18.746184]  kasan_save_track+0x20/0x40
[   18.746263]  kasan_save_alloc_info+0x40/0x58
[   18.746427]  __kasan_krealloc+0x118/0x178
[   18.746654]  krealloc_noprof+0x128/0x360
[   18.746757]  krealloc_less_oob_helper+0x168/0xc50
[   18.746981]  krealloc_less_oob+0x20/0x38
[   18.747188]  kunit_try_run_case+0x170/0x3f0
[   18.747331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.747605]  kthread+0x328/0x630
[   18.747688]  ret_from_fork+0x10/0x20
[   18.747819] 
[   18.747866] The buggy address belongs to the object at fff00000c091f800
[   18.747866]  which belongs to the cache kmalloc-256 of size 256
[   18.748029] The buggy address is located 0 bytes to the right of
[   18.748029]  allocated 201-byte region [fff00000c091f800, fff00000c091f8c9)
[   18.748314] 
[   18.748430] The buggy address belongs to the physical page:
[   18.748551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10091e
[   18.748698] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.748793] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.748907] page_type: f5(slab)
[   18.748989] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.749099] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.749519] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.749844] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.750054] head: 0bfffe0000000001 ffffc1ffc3024781 00000000ffffffff 00000000ffffffff
[   18.750175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.750495] page dumped because: kasan: bad access detected
[   18.750621] 
[   18.750674] Memory state around the buggy address:
[   18.750925]  fff00000c091f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.751022]  fff00000c091f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.751128] >fff00000c091f880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.751205]                                               ^
[   18.751448]  fff00000c091f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.751676]  fff00000c091f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.751815] ==================================================================
[   18.871503] ==================================================================
[   18.871608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.871714] Write of size 1 at addr fff00000c78520ea by task kunit_try_catch/163
[   18.871810] 
[   18.871867] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.872260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.872342] Hardware name: linux,dummy-virt (DT)
[   18.872428] Call trace:
[   18.872484]  show_stack+0x20/0x38 (C)
[   18.872592]  dump_stack_lvl+0x8c/0xd0
[   18.872694]  print_report+0x118/0x608
[   18.872792]  kasan_report+0xdc/0x128
[   18.872921]  __asan_report_store1_noabort+0x20/0x30
[   18.873029]  krealloc_less_oob_helper+0xae4/0xc50
[   18.873158]  krealloc_large_less_oob+0x20/0x38
[   18.873261]  kunit_try_run_case+0x170/0x3f0
[   18.873365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.873768]  kthread+0x328/0x630
[   18.873887]  ret_from_fork+0x10/0x20
[   18.874048] 
[   18.874118] The buggy address belongs to the physical page:
[   18.874194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   18.874311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.874422] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.874555] page_type: f8(unknown)
[   18.874650] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.874767] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.874925] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.875016] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.875099] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   18.875559] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.875654] page dumped because: kasan: bad access detected
[   18.875723] 
[   18.875763] Memory state around the buggy address:
[   18.875832]  fff00000c7851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.875927]  fff00000c7852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.876019] >fff00000c7852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.876101]                                                           ^
[   18.876224]  fff00000c7852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.876347]  fff00000c7852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.876452] ==================================================================

[   13.254362] ==================================================================
[   13.254789] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.255328] Write of size 1 at addr ffff8881003416da by task kunit_try_catch/175
[   13.256122] 
[   13.256422] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.256574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.256591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.256618] Call Trace:
[   13.256634]  <TASK>
[   13.256676]  dump_stack_lvl+0x73/0xb0
[   13.256715]  print_report+0xd1/0x650
[   13.256742]  ? __virt_addr_valid+0x1db/0x2d0
[   13.256771]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.256798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.256823]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.256850]  kasan_report+0x141/0x180
[   13.256876]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.256909]  __asan_report_store1_noabort+0x1b/0x30
[   13.256932]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.256962]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.256989]  ? irqentry_exit+0x2a/0x60
[   13.257015]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.257048]  ? __pfx_krealloc_less_oob+0x10/0x10
[   13.257078]  krealloc_less_oob+0x1c/0x30
[   13.257102]  kunit_try_run_case+0x1a5/0x480
[   13.257132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.257157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.257185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.257211]  ? __kthread_parkme+0x82/0x180
[   13.257235]  ? preempt_count_sub+0x50/0x80
[   13.257265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.257291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.257317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.257343]  kthread+0x337/0x6f0
[   13.257365]  ? trace_preempt_on+0x20/0xc0
[   13.257393]  ? __pfx_kthread+0x10/0x10
[   13.257416]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.257441]  ? calculate_sigpending+0x7b/0xa0
[   13.257469]  ? __pfx_kthread+0x10/0x10
[   13.257494]  ret_from_fork+0x116/0x1d0
[   13.257517]  ? __pfx_kthread+0x10/0x10
[   13.257541]  ret_from_fork_asm+0x1a/0x30
[   13.257578]  </TASK>
[   13.257591] 
[   13.267639] Allocated by task 175:
[   13.267818]  kasan_save_stack+0x45/0x70
[   13.267992]  kasan_save_track+0x18/0x40
[   13.268213]  kasan_save_alloc_info+0x3b/0x50
[   13.268963]  __kasan_krealloc+0x190/0x1f0
[   13.269147]  krealloc_noprof+0xf3/0x340
[   13.269380]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.269691]  krealloc_less_oob+0x1c/0x30
[   13.269987]  kunit_try_run_case+0x1a5/0x480
[   13.270242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.270569]  kthread+0x337/0x6f0
[   13.270823]  ret_from_fork+0x116/0x1d0
[   13.271014]  ret_from_fork_asm+0x1a/0x30
[   13.271232] 
[   13.271425] The buggy address belongs to the object at ffff888100341600
[   13.271425]  which belongs to the cache kmalloc-256 of size 256
[   13.272323] The buggy address is located 17 bytes to the right of
[   13.272323]  allocated 201-byte region [ffff888100341600, ffff8881003416c9)
[   13.273055] 
[   13.273183] The buggy address belongs to the physical page:
[   13.273581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.274239] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.274600] flags: 0x200000000000040(head|node=0|zone=2)
[   13.274933] page_type: f5(slab)
[   13.275236] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.275606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.276271] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.276749] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.277195] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.277556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.278082] page dumped because: kasan: bad access detected
[   13.278396] 
[   13.278516] Memory state around the buggy address:
[   13.278737]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.278987]  ffff888100341600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.279374] >ffff888100341680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.279769]                                                     ^
[   13.279991]  ffff888100341700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.280561]  ffff888100341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.281052] ==================================================================
[   13.415821] ==================================================================
[   13.416533] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.417337] Write of size 1 at addr ffff8881026f20d0 by task kunit_try_catch/179
[   13.417919] 
[   13.418323] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.418507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.418526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.418552] Call Trace:
[   13.418569]  <TASK>
[   13.418591]  dump_stack_lvl+0x73/0xb0
[   13.418630]  print_report+0xd1/0x650
[   13.418673]  ? __virt_addr_valid+0x1db/0x2d0
[   13.418701]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.418729]  ? kasan_addr_to_slab+0x11/0xa0
[   13.418752]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.418789]  kasan_report+0x141/0x180
[   13.418824]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.418858]  __asan_report_store1_noabort+0x1b/0x30
[   13.418882]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.418911]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.418940]  ? __schedule+0x207f/0x2b60
[   13.418964]  ? schedule+0x7c/0x2e0
[   13.418986]  ? trace_hardirqs_on+0x37/0xe0
[   13.419014]  ? __schedule+0x207f/0x2b60
[   13.419038]  ? __pfx_read_tsc+0x10/0x10
[   13.419066]  krealloc_large_less_oob+0x1c/0x30
[   13.419092]  kunit_try_run_case+0x1a5/0x480
[   13.419121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.419146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.419172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.419198]  ? __kthread_parkme+0x82/0x180
[   13.419222]  ? preempt_count_sub+0x50/0x80
[   13.419250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.419277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.419303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.419329]  kthread+0x337/0x6f0
[   13.419351]  ? trace_preempt_on+0x20/0xc0
[   13.419376]  ? __pfx_kthread+0x10/0x10
[   13.419401]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.419425]  ? calculate_sigpending+0x7b/0xa0
[   13.419453]  ? __pfx_kthread+0x10/0x10
[   13.419477]  ret_from_fork+0x116/0x1d0
[   13.419498]  ? __pfx_kthread+0x10/0x10
[   13.419522]  ret_from_fork_asm+0x1a/0x30
[   13.419559]  </TASK>
[   13.419573] 
[   13.433248] The buggy address belongs to the physical page:
[   13.433600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f0
[   13.434529] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.435052] flags: 0x200000000000040(head|node=0|zone=2)
[   13.435347] page_type: f8(unknown)
[   13.435556] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.436044] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.436821] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.437176] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.437590] head: 0200000000000002 ffffea000409bc01 00000000ffffffff 00000000ffffffff
[   13.438298] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.438697] page dumped because: kasan: bad access detected
[   13.438968] 
[   13.439126] Memory state around the buggy address:
[   13.439452]  ffff8881026f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.439980]  ffff8881026f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.440354] >ffff8881026f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.440734]                                                  ^
[   13.440993]  ffff8881026f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.441410]  ffff8881026f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.441831] ==================================================================
[   13.465869] ==================================================================
[   13.466339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   13.466753] Write of size 1 at addr ffff8881026f20ea by task kunit_try_catch/179
[   13.467091] 
[   13.467201] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.467253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.467267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.467293] Call Trace:
[   13.467314]  <TASK>
[   13.467335]  dump_stack_lvl+0x73/0xb0
[   13.467367]  print_report+0xd1/0x650
[   13.467393]  ? __virt_addr_valid+0x1db/0x2d0
[   13.467421]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.467505]  ? kasan_addr_to_slab+0x11/0xa0
[   13.467545]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.467573]  kasan_report+0x141/0x180
[   13.467599]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.467633]  __asan_report_store1_noabort+0x1b/0x30
[   13.467667]  krealloc_less_oob_helper+0xe90/0x11d0
[   13.467697]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.467726]  ? __schedule+0x207f/0x2b60
[   13.467750]  ? schedule+0x7c/0x2e0
[   13.467772]  ? trace_hardirqs_on+0x37/0xe0
[   13.467838]  ? __schedule+0x207f/0x2b60
[   13.467863]  ? __pfx_read_tsc+0x10/0x10
[   13.467905]  krealloc_large_less_oob+0x1c/0x30
[   13.467932]  kunit_try_run_case+0x1a5/0x480
[   13.467974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.468001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.468028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.468055]  ? __kthread_parkme+0x82/0x180
[   13.468089]  ? preempt_count_sub+0x50/0x80
[   13.468118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.468145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.468183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.468210]  kthread+0x337/0x6f0
[   13.468232]  ? trace_preempt_on+0x20/0xc0
[   13.468257]  ? __pfx_kthread+0x10/0x10
[   13.468281]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.468305]  ? calculate_sigpending+0x7b/0xa0
[   13.468333]  ? __pfx_kthread+0x10/0x10
[   13.468358]  ret_from_fork+0x116/0x1d0
[   13.468380]  ? __pfx_kthread+0x10/0x10
[   13.468404]  ret_from_fork_asm+0x1a/0x30
[   13.468441]  </TASK>
[   13.468454] 
[   13.478553] The buggy address belongs to the physical page:
[   13.478879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f0
[   13.479337] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.479721] flags: 0x200000000000040(head|node=0|zone=2)
[   13.479976] page_type: f8(unknown)
[   13.480207] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.480867] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.481389] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.481780] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.482323] head: 0200000000000002 ffffea000409bc01 00000000ffffffff 00000000ffffffff
[   13.482735] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.483248] page dumped because: kasan: bad access detected
[   13.483562] 
[   13.483661] Memory state around the buggy address:
[   13.483851]  ffff8881026f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.484260]  ffff8881026f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.484643] >ffff8881026f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.485029]                                                           ^
[   13.485355]  ffff8881026f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.486012]  ffff8881026f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.486482] ==================================================================
[   13.183347] ==================================================================
[   13.183941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.184248] Write of size 1 at addr ffff8881003416c9 by task kunit_try_catch/175
[   13.184518] 
[   13.184627] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.185159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.185179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.185206] Call Trace:
[   13.185221]  <TASK>
[   13.185254]  dump_stack_lvl+0x73/0xb0
[   13.185292]  print_report+0xd1/0x650
[   13.185318]  ? __virt_addr_valid+0x1db/0x2d0
[   13.185346]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.185373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.185399]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.185427]  kasan_report+0x141/0x180
[   13.185452]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.185486]  __asan_report_store1_noabort+0x1b/0x30
[   13.185510]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.185540]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.185566]  ? irqentry_exit+0x2a/0x60
[   13.185591]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.185625]  ? __pfx_krealloc_less_oob+0x10/0x10
[   13.185665]  krealloc_less_oob+0x1c/0x30
[   13.185690]  kunit_try_run_case+0x1a5/0x480
[   13.185719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.185744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.185813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.185839]  ? __kthread_parkme+0x82/0x180
[   13.185863]  ? preempt_count_sub+0x50/0x80
[   13.185892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.185919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.185945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.185971]  kthread+0x337/0x6f0
[   13.185993]  ? trace_preempt_on+0x20/0xc0
[   13.186021]  ? __pfx_kthread+0x10/0x10
[   13.186044]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.186068]  ? calculate_sigpending+0x7b/0xa0
[   13.186096]  ? __pfx_kthread+0x10/0x10
[   13.186120]  ret_from_fork+0x116/0x1d0
[   13.186142]  ? __pfx_kthread+0x10/0x10
[   13.186166]  ret_from_fork_asm+0x1a/0x30
[   13.186202]  </TASK>
[   13.186214] 
[   13.200097] Allocated by task 175:
[   13.200331]  kasan_save_stack+0x45/0x70
[   13.200580]  kasan_save_track+0x18/0x40
[   13.200929]  kasan_save_alloc_info+0x3b/0x50
[   13.201132]  __kasan_krealloc+0x190/0x1f0
[   13.201293]  krealloc_noprof+0xf3/0x340
[   13.201511]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.201878]  krealloc_less_oob+0x1c/0x30
[   13.202147]  kunit_try_run_case+0x1a5/0x480
[   13.202412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.202741]  kthread+0x337/0x6f0
[   13.202940]  ret_from_fork+0x116/0x1d0
[   13.203236]  ret_from_fork_asm+0x1a/0x30
[   13.203419] 
[   13.203504] The buggy address belongs to the object at ffff888100341600
[   13.203504]  which belongs to the cache kmalloc-256 of size 256
[   13.204402] The buggy address is located 0 bytes to the right of
[   13.204402]  allocated 201-byte region [ffff888100341600, ffff8881003416c9)
[   13.205515] 
[   13.206160] The buggy address belongs to the physical page:
[   13.206456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.207311] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.207679] flags: 0x200000000000040(head|node=0|zone=2)
[   13.208185] page_type: f5(slab)
[   13.208607] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.209246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.209800] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.210458] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.211152] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.211511] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.212227] page dumped because: kasan: bad access detected
[   13.212507] 
[   13.212630] Memory state around the buggy address:
[   13.213303]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.213861]  ffff888100341600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.214240] >ffff888100341680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.214994]                                               ^
[   13.215316]  ffff888100341700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.215793]  ffff888100341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.216256] ==================================================================
[   13.442496] ==================================================================
[   13.442992] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.443722] Write of size 1 at addr ffff8881026f20da by task kunit_try_catch/179
[   13.444148] 
[   13.444271] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.444437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.444454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.444480] Call Trace:
[   13.444502]  <TASK>
[   13.444523]  dump_stack_lvl+0x73/0xb0
[   13.444559]  print_report+0xd1/0x650
[   13.444586]  ? __virt_addr_valid+0x1db/0x2d0
[   13.444614]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.444662]  ? kasan_addr_to_slab+0x11/0xa0
[   13.444686]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.444713]  kasan_report+0x141/0x180
[   13.444752]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.444854]  __asan_report_store1_noabort+0x1b/0x30
[   13.444883]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.444913]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.444941]  ? __schedule+0x207f/0x2b60
[   13.444978]  ? schedule+0x7c/0x2e0
[   13.445001]  ? trace_hardirqs_on+0x37/0xe0
[   13.445043]  ? __schedule+0x207f/0x2b60
[   13.445068]  ? __pfx_read_tsc+0x10/0x10
[   13.445097]  krealloc_large_less_oob+0x1c/0x30
[   13.445125]  kunit_try_run_case+0x1a5/0x480
[   13.445154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.445179]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.445207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.445233]  ? __kthread_parkme+0x82/0x180
[   13.445257]  ? preempt_count_sub+0x50/0x80
[   13.445297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.445324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.445363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.445389]  kthread+0x337/0x6f0
[   13.445412]  ? trace_preempt_on+0x20/0xc0
[   13.445437]  ? __pfx_kthread+0x10/0x10
[   13.445460]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.445484]  ? calculate_sigpending+0x7b/0xa0
[   13.445512]  ? __pfx_kthread+0x10/0x10
[   13.445537]  ret_from_fork+0x116/0x1d0
[   13.445558]  ? __pfx_kthread+0x10/0x10
[   13.445582]  ret_from_fork_asm+0x1a/0x30
[   13.445618]  </TASK>
[   13.445631] 
[   13.455729] The buggy address belongs to the physical page:
[   13.456106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f0
[   13.456510] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.457279] flags: 0x200000000000040(head|node=0|zone=2)
[   13.458076] page_type: f8(unknown)
[   13.458744] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.459401] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.460262] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.460550] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.460883] head: 0200000000000002 ffffea000409bc01 00000000ffffffff 00000000ffffffff
[   13.461271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.461885] page dumped because: kasan: bad access detected
[   13.462185] 
[   13.462325] Memory state around the buggy address:
[   13.462565]  ffff8881026f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.463254]  ffff8881026f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.463661] >ffff8881026f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.464014]                                                     ^
[   13.464518]  ffff8881026f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.465036]  ffff8881026f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.465391] ==================================================================
[   13.306999] ==================================================================
[   13.307419] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   13.309172] Write of size 1 at addr ffff8881003416eb by task kunit_try_catch/175
[   13.309481] 
[   13.309623] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.309694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.309709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.309735] Call Trace:
[   13.309757]  <TASK>
[   13.309813]  dump_stack_lvl+0x73/0xb0
[   13.309852]  print_report+0xd1/0x650
[   13.309878]  ? __virt_addr_valid+0x1db/0x2d0
[   13.309905]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.309933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.309958]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.309986]  kasan_report+0x141/0x180
[   13.310012]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.310045]  __asan_report_store1_noabort+0x1b/0x30
[   13.310069]  krealloc_less_oob_helper+0xd47/0x11d0
[   13.310100]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.310127]  ? irqentry_exit+0x2a/0x60
[   13.310152]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.310186]  ? __pfx_krealloc_less_oob+0x10/0x10
[   13.310216]  krealloc_less_oob+0x1c/0x30
[   13.310241]  kunit_try_run_case+0x1a5/0x480
[   13.310270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.310296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.310323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.310349]  ? __kthread_parkme+0x82/0x180
[   13.310373]  ? preempt_count_sub+0x50/0x80
[   13.310401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.310435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.310461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.310487]  kthread+0x337/0x6f0
[   13.310510]  ? trace_preempt_on+0x20/0xc0
[   13.310538]  ? __pfx_kthread+0x10/0x10
[   13.310562]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.310586]  ? calculate_sigpending+0x7b/0xa0
[   13.310614]  ? __pfx_kthread+0x10/0x10
[   13.310639]  ret_from_fork+0x116/0x1d0
[   13.310674]  ? __pfx_kthread+0x10/0x10
[   13.310698]  ret_from_fork_asm+0x1a/0x30
[   13.310735]  </TASK>
[   13.310749] 
[   13.320591] Allocated by task 175:
[   13.320791]  kasan_save_stack+0x45/0x70
[   13.321040]  kasan_save_track+0x18/0x40
[   13.321668]  kasan_save_alloc_info+0x3b/0x50
[   13.322015]  __kasan_krealloc+0x190/0x1f0
[   13.322189]  krealloc_noprof+0xf3/0x340
[   13.322388]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.322683]  krealloc_less_oob+0x1c/0x30
[   13.322942]  kunit_try_run_case+0x1a5/0x480
[   13.323149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.323359]  kthread+0x337/0x6f0
[   13.323563]  ret_from_fork+0x116/0x1d0
[   13.323950]  ret_from_fork_asm+0x1a/0x30
[   13.324196] 
[   13.324284] The buggy address belongs to the object at ffff888100341600
[   13.324284]  which belongs to the cache kmalloc-256 of size 256
[   13.325106] The buggy address is located 34 bytes to the right of
[   13.325106]  allocated 201-byte region [ffff888100341600, ffff8881003416c9)
[   13.325638] 
[   13.325773] The buggy address belongs to the physical page:
[   13.326145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.326556] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.327113] flags: 0x200000000000040(head|node=0|zone=2)
[   13.327444] page_type: f5(slab)
[   13.327619] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.328106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.328482] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.328905] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.329521] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.329866] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.330389] page dumped because: kasan: bad access detected
[   13.330637] 
[   13.330766] Memory state around the buggy address:
[   13.331113]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.331379]  ffff888100341600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.331725] >ffff888100341680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.332118]                                                           ^
[   13.332555]  ffff888100341700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.332831]  ffff888100341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.333318] ==================================================================
[   13.281536] ==================================================================
[   13.282158] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   13.282576] Write of size 1 at addr ffff8881003416ea by task kunit_try_catch/175
[   13.283100] 
[   13.283224] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.283276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.283290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.283315] Call Trace:
[   13.283337]  <TASK>
[   13.283360]  dump_stack_lvl+0x73/0xb0
[   13.283392]  print_report+0xd1/0x650
[   13.283417]  ? __virt_addr_valid+0x1db/0x2d0
[   13.283444]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.283471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.283497]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.283524]  kasan_report+0x141/0x180
[   13.283550]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.283583]  __asan_report_store1_noabort+0x1b/0x30
[   13.283606]  krealloc_less_oob_helper+0xe90/0x11d0
[   13.283636]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.283676]  ? irqentry_exit+0x2a/0x60
[   13.283701]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.283735]  ? __pfx_krealloc_less_oob+0x10/0x10
[   13.283765]  krealloc_less_oob+0x1c/0x30
[   13.283790]  kunit_try_run_case+0x1a5/0x480
[   13.283818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.283843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.283870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.283896]  ? __kthread_parkme+0x82/0x180
[   13.283920]  ? preempt_count_sub+0x50/0x80
[   13.283948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.283975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.284002]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.284028]  kthread+0x337/0x6f0
[   13.284051]  ? trace_preempt_on+0x20/0xc0
[   13.284078]  ? __pfx_kthread+0x10/0x10
[   13.284102]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.284126]  ? calculate_sigpending+0x7b/0xa0
[   13.284154]  ? __pfx_kthread+0x10/0x10
[   13.284178]  ret_from_fork+0x116/0x1d0
[   13.284200]  ? __pfx_kthread+0x10/0x10
[   13.284224]  ret_from_fork_asm+0x1a/0x30
[   13.284259]  </TASK>
[   13.284271] 
[   13.293476] Allocated by task 175:
[   13.293736]  kasan_save_stack+0x45/0x70
[   13.294143]  kasan_save_track+0x18/0x40
[   13.294316]  kasan_save_alloc_info+0x3b/0x50
[   13.294495]  __kasan_krealloc+0x190/0x1f0
[   13.294723]  krealloc_noprof+0xf3/0x340
[   13.295208]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.295493]  krealloc_less_oob+0x1c/0x30
[   13.295747]  kunit_try_run_case+0x1a5/0x480
[   13.296383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.296626]  kthread+0x337/0x6f0
[   13.296835]  ret_from_fork+0x116/0x1d0
[   13.297061]  ret_from_fork_asm+0x1a/0x30
[   13.297285] 
[   13.297396] The buggy address belongs to the object at ffff888100341600
[   13.297396]  which belongs to the cache kmalloc-256 of size 256
[   13.298074] The buggy address is located 33 bytes to the right of
[   13.298074]  allocated 201-byte region [ffff888100341600, ffff8881003416c9)
[   13.298639] 
[   13.298769] The buggy address belongs to the physical page:
[   13.298971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.299253] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.299521] flags: 0x200000000000040(head|node=0|zone=2)
[   13.300191] page_type: f5(slab)
[   13.300410] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.300901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.301179] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.301446] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.301854] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.302262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.302681] page dumped because: kasan: bad access detected
[   13.303273] 
[   13.303394] Memory state around the buggy address:
[   13.303618]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.304198]  ffff888100341600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.304543] >ffff888100341680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.304953]                                                           ^
[   13.305256]  ffff888100341700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.305608]  ffff888100341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.306350] ==================================================================
[   13.384160] ==================================================================
[   13.384741] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.385255] Write of size 1 at addr ffff8881026f20c9 by task kunit_try_catch/179
[   13.385603] 
[   13.385764] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.385819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.385833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.385859] Call Trace:
[   13.385874]  <TASK>
[   13.385896]  dump_stack_lvl+0x73/0xb0
[   13.385931]  print_report+0xd1/0x650
[   13.385958]  ? __virt_addr_valid+0x1db/0x2d0
[   13.385986]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.386014]  ? kasan_addr_to_slab+0x11/0xa0
[   13.386037]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.386066]  kasan_report+0x141/0x180
[   13.386092]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.386125]  __asan_report_store1_noabort+0x1b/0x30
[   13.386149]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.386179]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.386207]  ? __schedule+0x207f/0x2b60
[   13.386232]  ? schedule+0x7c/0x2e0
[   13.386255]  ? trace_hardirqs_on+0x37/0xe0
[   13.386284]  ? __schedule+0x207f/0x2b60
[   13.386309]  ? __pfx_read_tsc+0x10/0x10
[   13.386338]  krealloc_large_less_oob+0x1c/0x30
[   13.386364]  kunit_try_run_case+0x1a5/0x480
[   13.386395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.386425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.386454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.386481]  ? __kthread_parkme+0x82/0x180
[   13.386506]  ? preempt_count_sub+0x50/0x80
[   13.386535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.386561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.386588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.386614]  kthread+0x337/0x6f0
[   13.386636]  ? trace_preempt_on+0x20/0xc0
[   13.386722]  ? __pfx_kthread+0x10/0x10
[   13.386748]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.386773]  ? calculate_sigpending+0x7b/0xa0
[   13.386838]  ? __pfx_kthread+0x10/0x10
[   13.386864]  ret_from_fork+0x116/0x1d0
[   13.386887]  ? __pfx_kthread+0x10/0x10
[   13.386911]  ret_from_fork_asm+0x1a/0x30
[   13.386949]  </TASK>
[   13.386962] 
[   13.401049] The buggy address belongs to the physical page:
[   13.401401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f0
[   13.401925] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.402409] flags: 0x200000000000040(head|node=0|zone=2)
[   13.405251] page_type: f8(unknown)
[   13.406208] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.407406] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.407721] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.408675] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.409182] head: 0200000000000002 ffffea000409bc01 00000000ffffffff 00000000ffffffff
[   13.409577] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.410082] page dumped because: kasan: bad access detected
[   13.410359] 
[   13.410481] Memory state around the buggy address:
[   13.410794]  ffff8881026f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.411482]  ffff8881026f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.412538] >ffff8881026f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.413140]                                               ^
[   13.413558]  ffff8881026f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.414194]  ffff8881026f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.414726] ==================================================================
[   13.487059] ==================================================================
[   13.487457] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   13.487915] Write of size 1 at addr ffff8881026f20eb by task kunit_try_catch/179
[   13.488304] 
[   13.488495] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.488576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.488591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.488627] Call Trace:
[   13.488656]  <TASK>
[   13.488676]  dump_stack_lvl+0x73/0xb0
[   13.488709]  print_report+0xd1/0x650
[   13.488735]  ? __virt_addr_valid+0x1db/0x2d0
[   13.488761]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.488824]  ? kasan_addr_to_slab+0x11/0xa0
[   13.488850]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.488877]  kasan_report+0x141/0x180
[   13.488903]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.488948]  __asan_report_store1_noabort+0x1b/0x30
[   13.488972]  krealloc_less_oob_helper+0xd47/0x11d0
[   13.489015]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.489043]  ? __schedule+0x207f/0x2b60
[   13.489067]  ? schedule+0x7c/0x2e0
[   13.489090]  ? trace_hardirqs_on+0x37/0xe0
[   13.489118]  ? __schedule+0x207f/0x2b60
[   13.489153]  ? __pfx_read_tsc+0x10/0x10
[   13.489182]  krealloc_large_less_oob+0x1c/0x30
[   13.489222]  kunit_try_run_case+0x1a5/0x480
[   13.489251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.489277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.489304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.489330]  ? __kthread_parkme+0x82/0x180
[   13.489354]  ? preempt_count_sub+0x50/0x80
[   13.489382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.489409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.489436]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.489464]  kthread+0x337/0x6f0
[   13.489488]  ? trace_preempt_on+0x20/0xc0
[   13.489523]  ? __pfx_kthread+0x10/0x10
[   13.489547]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.489570]  ? calculate_sigpending+0x7b/0xa0
[   13.489610]  ? __pfx_kthread+0x10/0x10
[   13.489635]  ret_from_fork+0x116/0x1d0
[   13.489665]  ? __pfx_kthread+0x10/0x10
[   13.489688]  ret_from_fork_asm+0x1a/0x30
[   13.489724]  </TASK>
[   13.489738] 
[   13.500153] The buggy address belongs to the physical page:
[   13.500416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f0
[   13.500741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.501147] flags: 0x200000000000040(head|node=0|zone=2)
[   13.501457] page_type: f8(unknown)
[   13.502106] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.502536] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.502832] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.503133] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.503779] head: 0200000000000002 ffffea000409bc01 00000000ffffffff 00000000ffffffff
[   13.504216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.504598] page dumped because: kasan: bad access detected
[   13.505031] 
[   13.505148] Memory state around the buggy address:
[   13.505477]  ffff8881026f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.506121]  ffff8881026f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.506519] >ffff8881026f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.507002]                                                           ^
[   13.507358]  ffff8881026f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.507760]  ffff8881026f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.508069] ==================================================================
[   13.217036] ==================================================================
[   13.217383] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.218334] Write of size 1 at addr ffff8881003416d0 by task kunit_try_catch/175
[   13.219173] 
[   13.219368] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.219426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.219465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.219490] Call Trace:
[   13.219513]  <TASK>
[   13.219555]  dump_stack_lvl+0x73/0xb0
[   13.219592]  print_report+0xd1/0x650
[   13.219617]  ? __virt_addr_valid+0x1db/0x2d0
[   13.219645]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.219688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.219714]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.219741]  kasan_report+0x141/0x180
[   13.219767]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.219813]  __asan_report_store1_noabort+0x1b/0x30
[   13.219837]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.219867]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.219894]  ? irqentry_exit+0x2a/0x60
[   13.219919]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.219953]  ? __pfx_krealloc_less_oob+0x10/0x10
[   13.219983]  krealloc_less_oob+0x1c/0x30
[   13.220008]  kunit_try_run_case+0x1a5/0x480
[   13.220036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.220062]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.220089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.220116]  ? __kthread_parkme+0x82/0x180
[   13.220140]  ? preempt_count_sub+0x50/0x80
[   13.220168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.220195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.220221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.220248]  kthread+0x337/0x6f0
[   13.220273]  ? trace_preempt_on+0x20/0xc0
[   13.220300]  ? __pfx_kthread+0x10/0x10
[   13.220325]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.220349]  ? calculate_sigpending+0x7b/0xa0
[   13.220377]  ? __pfx_kthread+0x10/0x10
[   13.220401]  ret_from_fork+0x116/0x1d0
[   13.220424]  ? __pfx_kthread+0x10/0x10
[   13.220448]  ret_from_fork_asm+0x1a/0x30
[   13.220484]  </TASK>
[   13.220497] 
[   13.232667] Allocated by task 175:
[   13.233628]  kasan_save_stack+0x45/0x70
[   13.233891]  kasan_save_track+0x18/0x40
[   13.234061]  kasan_save_alloc_info+0x3b/0x50
[   13.234520]  __kasan_krealloc+0x190/0x1f0
[   13.234761]  krealloc_noprof+0xf3/0x340
[   13.234975]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.235242]  krealloc_less_oob+0x1c/0x30
[   13.235463]  kunit_try_run_case+0x1a5/0x480
[   13.236420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.237147]  kthread+0x337/0x6f0
[   13.237526]  ret_from_fork+0x116/0x1d0
[   13.238127]  ret_from_fork_asm+0x1a/0x30
[   13.238365] 
[   13.238482] The buggy address belongs to the object at ffff888100341600
[   13.238482]  which belongs to the cache kmalloc-256 of size 256
[   13.239591] The buggy address is located 7 bytes to the right of
[   13.239591]  allocated 201-byte region [ffff888100341600, ffff8881003416c9)
[   13.241386] 
[   13.241702] The buggy address belongs to the physical page:
[   13.242441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.243135] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.243532] flags: 0x200000000000040(head|node=0|zone=2)
[   13.244218] page_type: f5(slab)
[   13.244424] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.245039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.245431] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.246066] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.246470] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.246833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.247507] page dumped because: kasan: bad access detected
[   13.248027] 
[   13.248123] Memory state around the buggy address:
[   13.248418]  ffff888100341580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.249675]  ffff888100341600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.250221] >ffff888100341680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.250573]                                                  ^
[   13.251177]  ffff888100341700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.251714]  ffff888100341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.252223] ==================================================================