Hay
Date
July 10, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.792538] ==================================================================
[   15.792613] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.792685] Write of size 1 at addr fff00000c17b6cc9 by task kunit_try_catch/158
[   15.792733] 
[   15.792766] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.792850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.792877] Hardware name: linux,dummy-virt (DT)
[   15.792912] Call trace:
[   15.792934]  show_stack+0x20/0x38 (C)
[   15.792988]  dump_stack_lvl+0x8c/0xd0
[   15.793038]  print_report+0x118/0x608
[   15.793107]  kasan_report+0xdc/0x128
[   15.793154]  __asan_report_store1_noabort+0x20/0x30
[   15.793205]  krealloc_less_oob_helper+0xa48/0xc50
[   15.793263]  krealloc_less_oob+0x20/0x38
[   15.793310]  kunit_try_run_case+0x170/0x3f0
[   15.793358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.793411]  kthread+0x328/0x630
[   15.793454]  ret_from_fork+0x10/0x20
[   15.793511] 
[   15.793530] Allocated by task 158:
[   15.793565]  kasan_save_stack+0x3c/0x68
[   15.793605]  kasan_save_track+0x20/0x40
[   15.793642]  kasan_save_alloc_info+0x40/0x58
[   15.793681]  __kasan_krealloc+0x118/0x178
[   15.793723]  krealloc_noprof+0x128/0x360
[   15.793797]  krealloc_less_oob_helper+0x168/0xc50
[   15.793843]  krealloc_less_oob+0x20/0x38
[   15.793880]  kunit_try_run_case+0x170/0x3f0
[   15.793918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.793961]  kthread+0x328/0x630
[   15.793993]  ret_from_fork+0x10/0x20
[   15.794028] 
[   15.794047] The buggy address belongs to the object at fff00000c17b6c00
[   15.794047]  which belongs to the cache kmalloc-256 of size 256
[   15.794444] The buggy address is located 0 bytes to the right of
[   15.794444]  allocated 201-byte region [fff00000c17b6c00, fff00000c17b6cc9)
[   15.794512] 
[   15.794532] The buggy address belongs to the physical page:
[   15.794562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b6
[   15.794613] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.794671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.794757] page_type: f5(slab)
[   15.794795] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.794937] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.795006] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.795065] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.795151] head: 0bfffe0000000001 ffffc1ffc305ed81 00000000ffffffff 00000000ffffffff
[   15.795259] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.795341] page dumped because: kasan: bad access detected
[   15.795372] 
[   15.795389] Memory state around the buggy address:
[   15.795460]  fff00000c17b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.795505]  fff00000c17b6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.795789] >fff00000c17b6c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.795857]                                               ^
[   15.795925]  fff00000c17b6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.796013]  fff00000c17b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.796062] ==================================================================
[   15.867644] ==================================================================
[   15.867821] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.867883] Write of size 1 at addr fff00000c663e0eb by task kunit_try_catch/162
[   15.867932] 
[   15.868275] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.868399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.868447] Hardware name: linux,dummy-virt (DT)
[   15.868481] Call trace:
[   15.868511]  show_stack+0x20/0x38 (C)
[   15.868657]  dump_stack_lvl+0x8c/0xd0
[   15.868717]  print_report+0x118/0x608
[   15.868765]  kasan_report+0xdc/0x128
[   15.868837]  __asan_report_store1_noabort+0x20/0x30
[   15.868890]  krealloc_less_oob_helper+0xa58/0xc50
[   15.868939]  krealloc_large_less_oob+0x20/0x38
[   15.868987]  kunit_try_run_case+0x170/0x3f0
[   15.869045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.869125]  kthread+0x328/0x630
[   15.869169]  ret_from_fork+0x10/0x20
[   15.869217] 
[   15.869237] The buggy address belongs to the physical page:
[   15.869275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c
[   15.869326] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.869378] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.869442] page_type: f8(unknown)
[   15.869480] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.869542] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.869590] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.869637] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.869684] head: 0bfffe0000000002 ffffc1ffc3198f01 00000000ffffffff 00000000ffffffff
[   15.869730] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.869767] page dumped because: kasan: bad access detected
[   15.870102] 
[   15.870286] Memory state around the buggy address:
[   15.870354]  fff00000c663df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.870398]  fff00000c663e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.870438] >fff00000c663e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.870797]                                                           ^
[   15.871002]  fff00000c663e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.871451]  fff00000c663e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.871568] ==================================================================
[   15.860574] ==================================================================
[   15.860644] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.860796] Write of size 1 at addr fff00000c663e0ea by task kunit_try_catch/162
[   15.860850] 
[   15.860878] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.860981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.861007] Hardware name: linux,dummy-virt (DT)
[   15.861035] Call trace:
[   15.861065]  show_stack+0x20/0x38 (C)
[   15.861129]  dump_stack_lvl+0x8c/0xd0
[   15.861366]  print_report+0x118/0x608
[   15.861423]  kasan_report+0xdc/0x128
[   15.861469]  __asan_report_store1_noabort+0x20/0x30
[   15.861521]  krealloc_less_oob_helper+0xae4/0xc50
[   15.861569]  krealloc_large_less_oob+0x20/0x38
[   15.861616]  kunit_try_run_case+0x170/0x3f0
[   15.861662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.861715]  kthread+0x328/0x630
[   15.861756]  ret_from_fork+0x10/0x20
[   15.861803] 
[   15.861828] The buggy address belongs to the physical page:
[   15.861866] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c
[   15.861917] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.861961] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.862009] page_type: f8(unknown)
[   15.863921] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.864606] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.864693] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.864778] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.864851] head: 0bfffe0000000002 ffffc1ffc3198f01 00000000ffffffff 00000000ffffffff
[   15.865102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.865269] page dumped because: kasan: bad access detected
[   15.865767] 
[   15.865866] Memory state around the buggy address:
[   15.865924]  fff00000c663df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.865990]  fff00000c663e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.866140] >fff00000c663e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.866222]                                                           ^
[   15.866279]  fff00000c663e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.866337]  fff00000c663e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.866576] ==================================================================
[   15.816233] ==================================================================
[   15.816277] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.816324] Write of size 1 at addr fff00000c17b6ceb by task kunit_try_catch/158
[   15.816371] 
[   15.816399] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.816502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.816528] Hardware name: linux,dummy-virt (DT)
[   15.816564] Call trace:
[   15.816594]  show_stack+0x20/0x38 (C)
[   15.816641]  dump_stack_lvl+0x8c/0xd0
[   15.816688]  print_report+0x118/0x608
[   15.816734]  kasan_report+0xdc/0x128
[   15.816779]  __asan_report_store1_noabort+0x20/0x30
[   15.816831]  krealloc_less_oob_helper+0xa58/0xc50
[   15.816888]  krealloc_less_oob+0x20/0x38
[   15.816934]  kunit_try_run_case+0x170/0x3f0
[   15.816982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.817037]  kthread+0x328/0x630
[   15.817095]  ret_from_fork+0x10/0x20
[   15.817143] 
[   15.817160] Allocated by task 158:
[   15.817195]  kasan_save_stack+0x3c/0x68
[   15.817235]  kasan_save_track+0x20/0x40
[   15.817271]  kasan_save_alloc_info+0x40/0x58
[   15.817311]  __kasan_krealloc+0x118/0x178
[   15.817348]  krealloc_noprof+0x128/0x360
[   15.817384]  krealloc_less_oob_helper+0x168/0xc50
[   15.817422]  krealloc_less_oob+0x20/0x38
[   15.817463]  kunit_try_run_case+0x170/0x3f0
[   15.817500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.817542]  kthread+0x328/0x630
[   15.817574]  ret_from_fork+0x10/0x20
[   15.817609] 
[   15.817627] The buggy address belongs to the object at fff00000c17b6c00
[   15.817627]  which belongs to the cache kmalloc-256 of size 256
[   15.817690] The buggy address is located 34 bytes to the right of
[   15.817690]  allocated 201-byte region [fff00000c17b6c00, fff00000c17b6cc9)
[   15.817782] 
[   15.817801] The buggy address belongs to the physical page:
[   15.817833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b6
[   15.817883] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.817927] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.817976] page_type: f5(slab)
[   15.818012] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.818445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.818518] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.818577] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.818637] head: 0bfffe0000000001 ffffc1ffc305ed81 00000000ffffffff 00000000ffffffff
[   15.818703] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.818818] page dumped because: kasan: bad access detected
[   15.818899] 
[   15.818949] Memory state around the buggy address:
[   15.818981]  fff00000c17b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819027]  fff00000c17b6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.819100] >fff00000c17b6c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.819148]                                                           ^
[   15.819185]  fff00000c17b6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819239]  fff00000c17b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819275] ==================================================================
[   15.796973] ==================================================================
[   15.797049] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.797114] Write of size 1 at addr fff00000c17b6cd0 by task kunit_try_catch/158
[   15.797187] 
[   15.797217] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.797491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.797527] Hardware name: linux,dummy-virt (DT)
[   15.797577] Call trace:
[   15.797604]  show_stack+0x20/0x38 (C)
[   15.797678]  dump_stack_lvl+0x8c/0xd0
[   15.797775]  print_report+0x118/0x608
[   15.797829]  kasan_report+0xdc/0x128
[   15.797894]  __asan_report_store1_noabort+0x20/0x30
[   15.797947]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.798004]  krealloc_less_oob+0x20/0x38
[   15.798090]  kunit_try_run_case+0x170/0x3f0
[   15.798141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.798221]  kthread+0x328/0x630
[   15.798263]  ret_from_fork+0x10/0x20
[   15.798310] 
[   15.798328] Allocated by task 158:
[   15.798364]  kasan_save_stack+0x3c/0x68
[   15.798404]  kasan_save_track+0x20/0x40
[   15.798533]  kasan_save_alloc_info+0x40/0x58
[   15.798618]  __kasan_krealloc+0x118/0x178
[   15.798755]  krealloc_noprof+0x128/0x360
[   15.798853]  krealloc_less_oob_helper+0x168/0xc50
[   15.798930]  krealloc_less_oob+0x20/0x38
[   15.799024]  kunit_try_run_case+0x170/0x3f0
[   15.799063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.799375]  kthread+0x328/0x630
[   15.799483]  ret_from_fork+0x10/0x20
[   15.799563] 
[   15.799665] The buggy address belongs to the object at fff00000c17b6c00
[   15.799665]  which belongs to the cache kmalloc-256 of size 256
[   15.799861] The buggy address is located 7 bytes to the right of
[   15.799861]  allocated 201-byte region [fff00000c17b6c00, fff00000c17b6cc9)
[   15.799955] 
[   15.799974] The buggy address belongs to the physical page:
[   15.800003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b6
[   15.800156] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.800374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.800466] page_type: f5(slab)
[   15.800521] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.800602] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.800650] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.800898] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.800985] head: 0bfffe0000000001 ffffc1ffc305ed81 00000000ffffffff 00000000ffffffff
[   15.801095] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.801152] page dumped because: kasan: bad access detected
[   15.801218] 
[   15.801303] Memory state around the buggy address:
[   15.801333]  fff00000c17b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801382]  fff00000c17b6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.801532] >fff00000c17b6c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.801681]                                                  ^
[   15.801743]  fff00000c17b6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801812]  fff00000c17b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801859] ==================================================================
[   15.851289] ==================================================================
[   15.851373] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.851447] Write of size 1 at addr fff00000c663e0c9 by task kunit_try_catch/162
[   15.851502] 
[   15.851556] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.851639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.851664] Hardware name: linux,dummy-virt (DT)
[   15.851705] Call trace:
[   15.851728]  show_stack+0x20/0x38 (C)
[   15.851778]  dump_stack_lvl+0x8c/0xd0
[   15.851958]  print_report+0x118/0x608
[   15.852175]  kasan_report+0xdc/0x128
[   15.852255]  __asan_report_store1_noabort+0x20/0x30
[   15.852317]  krealloc_less_oob_helper+0xa48/0xc50
[   15.852373]  krealloc_large_less_oob+0x20/0x38
[   15.852421]  kunit_try_run_case+0x170/0x3f0
[   15.852478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.852531]  kthread+0x328/0x630
[   15.852574]  ret_from_fork+0x10/0x20
[   15.852671] 
[   15.852700] The buggy address belongs to the physical page:
[   15.852749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c
[   15.852802] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.852856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.852912] page_type: f8(unknown)
[   15.853059] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.853228] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.853356] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.853425] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.853480] head: 0bfffe0000000002 ffffc1ffc3198f01 00000000ffffffff 00000000ffffffff
[   15.853534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.853653] page dumped because: kasan: bad access detected
[   15.853684] 
[   15.853701] Memory state around the buggy address:
[   15.853860]  fff00000c663df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.853933]  fff00000c663e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.853986] >fff00000c663e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.854035]                                               ^
[   15.854157]  fff00000c663e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.854225]  fff00000c663e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.854302] ==================================================================
[   15.811269] ==================================================================
[   15.811335] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.811386] Write of size 1 at addr fff00000c17b6cea by task kunit_try_catch/158
[   15.811443] 
[   15.811505] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.811589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.811614] Hardware name: linux,dummy-virt (DT)
[   15.811644] Call trace:
[   15.811665]  show_stack+0x20/0x38 (C)
[   15.811830]  dump_stack_lvl+0x8c/0xd0
[   15.812041]  print_report+0x118/0x608
[   15.812136]  kasan_report+0xdc/0x128
[   15.812203]  __asan_report_store1_noabort+0x20/0x30
[   15.812255]  krealloc_less_oob_helper+0xae4/0xc50
[   15.812321]  krealloc_less_oob+0x20/0x38
[   15.812396]  kunit_try_run_case+0x170/0x3f0
[   15.812451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.812505]  kthread+0x328/0x630
[   15.812558]  ret_from_fork+0x10/0x20
[   15.812607] 
[   15.812625] Allocated by task 158:
[   15.812757]  kasan_save_stack+0x3c/0x68
[   15.812824]  kasan_save_track+0x20/0x40
[   15.812950]  kasan_save_alloc_info+0x40/0x58
[   15.813069]  __kasan_krealloc+0x118/0x178
[   15.813131]  krealloc_noprof+0x128/0x360
[   15.813250]  krealloc_less_oob_helper+0x168/0xc50
[   15.813332]  krealloc_less_oob+0x20/0x38
[   15.813396]  kunit_try_run_case+0x170/0x3f0
[   15.813453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.813497]  kthread+0x328/0x630
[   15.813553]  ret_from_fork+0x10/0x20
[   15.813599] 
[   15.813655] The buggy address belongs to the object at fff00000c17b6c00
[   15.813655]  which belongs to the cache kmalloc-256 of size 256
[   15.813721] The buggy address is located 33 bytes to the right of
[   15.813721]  allocated 201-byte region [fff00000c17b6c00, fff00000c17b6cc9)
[   15.813831] 
[   15.813858] The buggy address belongs to the physical page:
[   15.813888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b6
[   15.813954] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.814135] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.814304] page_type: f5(slab)
[   15.814383] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.814480] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.814599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.814675] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.814797] head: 0bfffe0000000001 ffffc1ffc305ed81 00000000ffffffff 00000000ffffffff
[   15.814876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.814945] page dumped because: kasan: bad access detected
[   15.814988] 
[   15.815067] Memory state around the buggy address:
[   15.815168]  fff00000c17b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.815220]  fff00000c17b6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.815260] >fff00000c17b6c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.815412]                                                           ^
[   15.815618]  fff00000c17b6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.815721]  fff00000c17b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.815800] ==================================================================
[   15.854903] ==================================================================
[   15.854971] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.855019] Write of size 1 at addr fff00000c663e0d0 by task kunit_try_catch/162
[   15.855072] 
[   15.855112] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.855290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.855321] Hardware name: linux,dummy-virt (DT)
[   15.855374] Call trace:
[   15.855400]  show_stack+0x20/0x38 (C)
[   15.855456]  dump_stack_lvl+0x8c/0xd0
[   15.855516]  print_report+0x118/0x608
[   15.855562]  kasan_report+0xdc/0x128
[   15.855608]  __asan_report_store1_noabort+0x20/0x30
[   15.855659]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.855708]  krealloc_large_less_oob+0x20/0x38
[   15.855767]  kunit_try_run_case+0x170/0x3f0
[   15.855814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.855889]  kthread+0x328/0x630
[   15.855931]  ret_from_fork+0x10/0x20
[   15.855978] 
[   15.855997] The buggy address belongs to the physical page:
[   15.856025] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c
[   15.856074] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.856130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.856178] page_type: f8(unknown)
[   15.856214] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.856262] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.856309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.856356] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.856403] head: 0bfffe0000000002 ffffc1ffc3198f01 00000000ffffffff 00000000ffffffff
[   15.856449] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.856497] page dumped because: kasan: bad access detected
[   15.856532] 
[   15.856549] Memory state around the buggy address:
[   15.856578]  fff00000c663df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.856617]  fff00000c663e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.856658] >fff00000c663e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.856693]                                                  ^
[   15.856726]  fff00000c663e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.856766]  fff00000c663e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.856810] ==================================================================
[   15.802394] ==================================================================
[   15.802466] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.802523] Write of size 1 at addr fff00000c17b6cda by task kunit_try_catch/158
[   15.802579] 
[   15.802623] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.802729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.802759] Hardware name: linux,dummy-virt (DT)
[   15.802790] Call trace:
[   15.802818]  show_stack+0x20/0x38 (C)
[   15.802873]  dump_stack_lvl+0x8c/0xd0
[   15.802920]  print_report+0x118/0x608
[   15.802972]  kasan_report+0xdc/0x128
[   15.803018]  __asan_report_store1_noabort+0x20/0x30
[   15.803070]  krealloc_less_oob_helper+0xa80/0xc50
[   15.803131]  krealloc_less_oob+0x20/0x38
[   15.803176]  kunit_try_run_case+0x170/0x3f0
[   15.803239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.803302]  kthread+0x328/0x630
[   15.803344]  ret_from_fork+0x10/0x20
[   15.803391] 
[   15.803423] Allocated by task 158:
[   15.803458]  kasan_save_stack+0x3c/0x68
[   15.803498]  kasan_save_track+0x20/0x40
[   15.803534]  kasan_save_alloc_info+0x40/0x58
[   15.803578]  __kasan_krealloc+0x118/0x178
[   15.803624]  krealloc_noprof+0x128/0x360
[   15.803661]  krealloc_less_oob_helper+0x168/0xc50
[   15.803699]  krealloc_less_oob+0x20/0x38
[   15.803742]  kunit_try_run_case+0x170/0x3f0
[   15.803780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.803822]  kthread+0x328/0x630
[   15.803854]  ret_from_fork+0x10/0x20
[   15.803888] 
[   15.803906] The buggy address belongs to the object at fff00000c17b6c00
[   15.803906]  which belongs to the cache kmalloc-256 of size 256
[   15.803968] The buggy address is located 17 bytes to the right of
[   15.803968]  allocated 201-byte region [fff00000c17b6c00, fff00000c17b6cc9)
[   15.804029] 
[   15.804057] The buggy address belongs to the physical page:
[   15.804096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017b6
[   15.804145] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.804189] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.804237] page_type: f5(slab)
[   15.804274] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.804321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.804626] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.805797] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.805883] head: 0bfffe0000000001 ffffc1ffc305ed81 00000000ffffffff 00000000ffffffff
[   15.807110] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.807155] page dumped because: kasan: bad access detected
[   15.807185] 
[   15.808866] Memory state around the buggy address:
[   15.808907]  fff00000c17b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.809777]  fff00000c17b6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.810153] >fff00000c17b6c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.810196]                                                     ^
[   15.810233]  fff00000c17b6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810296]  fff00000c17b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810333] ==================================================================
[   15.856859] ==================================================================
[   15.856892] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.856932] Write of size 1 at addr fff00000c663e0da by task kunit_try_catch/162
[   15.856978] 
[   15.857003] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   15.857087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.857138] Hardware name: linux,dummy-virt (DT)
[   15.857168] Call trace:
[   15.857187]  show_stack+0x20/0x38 (C)
[   15.857234]  dump_stack_lvl+0x8c/0xd0
[   15.857279]  print_report+0x118/0x608
[   15.857325]  kasan_report+0xdc/0x128
[   15.857370]  __asan_report_store1_noabort+0x20/0x30
[   15.857421]  krealloc_less_oob_helper+0xa80/0xc50
[   15.857824]  krealloc_large_less_oob+0x20/0x38
[   15.857928]  kunit_try_run_case+0x170/0x3f0
[   15.858017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.858188]  kthread+0x328/0x630
[   15.858265]  ret_from_fork+0x10/0x20
[   15.858395] 
[   15.858426] The buggy address belongs to the physical page:
[   15.858462] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c
[   15.858595] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.858672] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.858778] page_type: f8(unknown)
[   15.858824] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.858873] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.858920] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.858966] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.859013] head: 0bfffe0000000002 ffffc1ffc3198f01 00000000ffffffff 00000000ffffffff
[   15.859300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.859392] page dumped because: kasan: bad access detected
[   15.859504] 
[   15.859544] Memory state around the buggy address:
[   15.859601]  fff00000c663df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.859702]  fff00000c663e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.859749] >fff00000c663e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.859798]                                                     ^
[   15.859888]  fff00000c663e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.859934]  fff00000c663e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.859993] ==================================================================

[   12.451592] ==================================================================
[   12.452119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.452537] Write of size 1 at addr ffff8881003588da by task kunit_try_catch/175
[   12.452849] 
[   12.452953] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.452990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.453001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.453020] Call Trace:
[   12.453034]  <TASK>
[   12.453047]  dump_stack_lvl+0x73/0xb0
[   12.453074]  print_report+0xd1/0x650
[   12.453096]  ? __virt_addr_valid+0x1db/0x2d0
[   12.453117]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.453140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.453162]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.453186]  kasan_report+0x141/0x180
[   12.453208]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.453236]  __asan_report_store1_noabort+0x1b/0x30
[   12.453262]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.453288]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.453312]  ? irqentry_exit+0x2a/0x60
[   12.453332]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.453372]  ? __pfx_read_tsc+0x10/0x10
[   12.453406]  krealloc_less_oob+0x1c/0x30
[   12.453427]  kunit_try_run_case+0x1a5/0x480
[   12.453451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.453484]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.453507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.453530]  ? __kthread_parkme+0x82/0x180
[   12.453550]  ? preempt_count_sub+0x50/0x80
[   12.453572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.453596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.453620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.453644]  kthread+0x337/0x6f0
[   12.453663]  ? trace_preempt_on+0x20/0xc0
[   12.453685]  ? __pfx_kthread+0x10/0x10
[   12.453705]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.453726]  ? calculate_sigpending+0x7b/0xa0
[   12.453749]  ? __pfx_kthread+0x10/0x10
[   12.453770]  ret_from_fork+0x116/0x1d0
[   12.453788]  ? __pfx_kthread+0x10/0x10
[   12.453808]  ret_from_fork_asm+0x1a/0x30
[   12.453839]  </TASK>
[   12.453848] 
[   12.461151] Allocated by task 175:
[   12.461280]  kasan_save_stack+0x45/0x70
[   12.461506]  kasan_save_track+0x18/0x40
[   12.461765]  kasan_save_alloc_info+0x3b/0x50
[   12.461982]  __kasan_krealloc+0x190/0x1f0
[   12.462184]  krealloc_noprof+0xf3/0x340
[   12.462382]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.462660]  krealloc_less_oob+0x1c/0x30
[   12.462821]  kunit_try_run_case+0x1a5/0x480
[   12.462966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.463140]  kthread+0x337/0x6f0
[   12.463257]  ret_from_fork+0x116/0x1d0
[   12.463405]  ret_from_fork_asm+0x1a/0x30
[   12.463604] 
[   12.463701] The buggy address belongs to the object at ffff888100358800
[   12.463701]  which belongs to the cache kmalloc-256 of size 256
[   12.464238] The buggy address is located 17 bytes to the right of
[   12.464238]  allocated 201-byte region [ffff888100358800, ffff8881003588c9)
[   12.464854] 
[   12.464978] The buggy address belongs to the physical page:
[   12.465286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100358
[   12.465995] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.466327] flags: 0x200000000000040(head|node=0|zone=2)
[   12.467204] page_type: f5(slab)
[   12.467345] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.468296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.469000] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.469231] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.469471] head: 0200000000000001 ffffea000400d601 00000000ffffffff 00000000ffffffff
[   12.469692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.469905] page dumped because: kasan: bad access detected
[   12.470066] 
[   12.470134] Memory state around the buggy address:
[   12.470280]  ffff888100358780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.470549]  ffff888100358800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.470761] >ffff888100358880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.471073]                                                     ^
[   12.471568]  ffff888100358900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.471832]  ffff888100358980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.472359] ==================================================================
[   12.577356] ==================================================================
[   12.577806] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.578176] Write of size 1 at addr ffff8881021160d0 by task kunit_try_catch/179
[   12.578720] 
[   12.578806] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.578844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.578854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.578872] Call Trace:
[   12.578884]  <TASK>
[   12.578898]  dump_stack_lvl+0x73/0xb0
[   12.578925]  print_report+0xd1/0x650
[   12.578947]  ? __virt_addr_valid+0x1db/0x2d0
[   12.578968]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.578992]  ? kasan_addr_to_slab+0x11/0xa0
[   12.579012]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.579036]  kasan_report+0x141/0x180
[   12.579057]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.579085]  __asan_report_store1_noabort+0x1b/0x30
[   12.579110]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.579137]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.579162]  ? finish_task_switch.isra.0+0x153/0x700
[   12.579183]  ? __switch_to+0x47/0xf50
[   12.579207]  ? __schedule+0x10cc/0x2b60
[   12.579228]  ? __pfx_read_tsc+0x10/0x10
[   12.579252]  krealloc_large_less_oob+0x1c/0x30
[   12.579275]  kunit_try_run_case+0x1a5/0x480
[   12.579298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.579321]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.579345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.579392]  ? __kthread_parkme+0x82/0x180
[   12.579412]  ? preempt_count_sub+0x50/0x80
[   12.579435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.579504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.579528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.579553]  kthread+0x337/0x6f0
[   12.579572]  ? trace_preempt_on+0x20/0xc0
[   12.579595]  ? __pfx_kthread+0x10/0x10
[   12.579615]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.579636]  ? calculate_sigpending+0x7b/0xa0
[   12.579659]  ? __pfx_kthread+0x10/0x10
[   12.579680]  ret_from_fork+0x116/0x1d0
[   12.579698]  ? __pfx_kthread+0x10/0x10
[   12.579718]  ret_from_fork_asm+0x1a/0x30
[   12.579748]  </TASK>
[   12.579757] 
[   12.587205] The buggy address belongs to the physical page:
[   12.587586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102114
[   12.587891] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.588192] flags: 0x200000000000040(head|node=0|zone=2)
[   12.588421] page_type: f8(unknown)
[   12.588638] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.588924] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.589212] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.589719] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.590014] head: 0200000000000002 ffffea0004084501 00000000ffffffff 00000000ffffffff
[   12.590308] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.590713] page dumped because: kasan: bad access detected
[   12.590887] 
[   12.590955] Memory state around the buggy address:
[   12.591104]  ffff888102115f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.591319]  ffff888102116000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.591627] >ffff888102116080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.592010]                                                  ^
[   12.592307]  ffff888102116100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.592668]  ffff888102116180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.592881] ==================================================================
[   12.503289] ==================================================================
[   12.503723] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.503999] Write of size 1 at addr ffff8881003588eb by task kunit_try_catch/175
[   12.504292] 
[   12.504408] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.504447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.504458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.504476] Call Trace:
[   12.504488]  <TASK>
[   12.504501]  dump_stack_lvl+0x73/0xb0
[   12.504528]  print_report+0xd1/0x650
[   12.504550]  ? __virt_addr_valid+0x1db/0x2d0
[   12.504571]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.504594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.504616]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.504640]  kasan_report+0x141/0x180
[   12.504662]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.504690]  __asan_report_store1_noabort+0x1b/0x30
[   12.504717]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.504743]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.504767]  ? irqentry_exit+0x2a/0x60
[   12.504788]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.504816]  ? __pfx_read_tsc+0x10/0x10
[   12.504840]  krealloc_less_oob+0x1c/0x30
[   12.504861]  kunit_try_run_case+0x1a5/0x480
[   12.504884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.504906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.504929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.504952]  ? __kthread_parkme+0x82/0x180
[   12.504972]  ? preempt_count_sub+0x50/0x80
[   12.504995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.505018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.505042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.505067]  kthread+0x337/0x6f0
[   12.505085]  ? trace_preempt_on+0x20/0xc0
[   12.505108]  ? __pfx_kthread+0x10/0x10
[   12.505128]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.505149]  ? calculate_sigpending+0x7b/0xa0
[   12.505172]  ? __pfx_kthread+0x10/0x10
[   12.505193]  ret_from_fork+0x116/0x1d0
[   12.505211]  ? __pfx_kthread+0x10/0x10
[   12.505230]  ret_from_fork_asm+0x1a/0x30
[   12.505260]  </TASK>
[   12.505270] 
[   12.512241] Allocated by task 175:
[   12.512419]  kasan_save_stack+0x45/0x70
[   12.512583]  kasan_save_track+0x18/0x40
[   12.512775]  kasan_save_alloc_info+0x3b/0x50
[   12.512959]  __kasan_krealloc+0x190/0x1f0
[   12.513111]  krealloc_noprof+0xf3/0x340
[   12.513244]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.513415]  krealloc_less_oob+0x1c/0x30
[   12.513630]  kunit_try_run_case+0x1a5/0x480
[   12.513836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.514085]  kthread+0x337/0x6f0
[   12.514250]  ret_from_fork+0x116/0x1d0
[   12.514402]  ret_from_fork_asm+0x1a/0x30
[   12.514694] 
[   12.514761] The buggy address belongs to the object at ffff888100358800
[   12.514761]  which belongs to the cache kmalloc-256 of size 256
[   12.515224] The buggy address is located 34 bytes to the right of
[   12.515224]  allocated 201-byte region [ffff888100358800, ffff8881003588c9)
[   12.515957] 
[   12.516040] The buggy address belongs to the physical page:
[   12.516274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100358
[   12.516633] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.516917] flags: 0x200000000000040(head|node=0|zone=2)
[   12.517116] page_type: f5(slab)
[   12.517275] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.517596] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.517884] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.518193] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.518477] head: 0200000000000001 ffffea000400d601 00000000ffffffff 00000000ffffffff
[   12.518831] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.519056] page dumped because: kasan: bad access detected
[   12.519226] 
[   12.519295] Memory state around the buggy address:
[   12.519576]  ffff888100358780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.519904]  ffff888100358800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.520226] >ffff888100358880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.520586]                                                           ^
[   12.520789]  ffff888100358900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.521000]  ffff888100358980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.521291] ==================================================================
[   12.627965] ==================================================================
[   12.628218] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.628836] Write of size 1 at addr ffff8881021160eb by task kunit_try_catch/179
[   12.629220] 
[   12.629332] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.629389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.629400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.629421] Call Trace:
[   12.629436]  <TASK>
[   12.629450]  dump_stack_lvl+0x73/0xb0
[   12.629480]  print_report+0xd1/0x650
[   12.629503]  ? __virt_addr_valid+0x1db/0x2d0
[   12.629526]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.629551]  ? kasan_addr_to_slab+0x11/0xa0
[   12.629572]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.629596]  kasan_report+0x141/0x180
[   12.629821]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.629851]  __asan_report_store1_noabort+0x1b/0x30
[   12.629877]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.629904]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.629929]  ? finish_task_switch.isra.0+0x153/0x700
[   12.629952]  ? __switch_to+0x47/0xf50
[   12.629977]  ? __schedule+0x10cc/0x2b60
[   12.629999]  ? __pfx_read_tsc+0x10/0x10
[   12.630022]  krealloc_large_less_oob+0x1c/0x30
[   12.630046]  kunit_try_run_case+0x1a5/0x480
[   12.630069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.630092]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.630116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.630140]  ? __kthread_parkme+0x82/0x180
[   12.630160]  ? preempt_count_sub+0x50/0x80
[   12.630183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.630207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.630232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.630257]  kthread+0x337/0x6f0
[   12.630275]  ? trace_preempt_on+0x20/0xc0
[   12.630298]  ? __pfx_kthread+0x10/0x10
[   12.630318]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.630340]  ? calculate_sigpending+0x7b/0xa0
[   12.630376]  ? __pfx_kthread+0x10/0x10
[   12.630398]  ret_from_fork+0x116/0x1d0
[   12.630416]  ? __pfx_kthread+0x10/0x10
[   12.630436]  ret_from_fork_asm+0x1a/0x30
[   12.630467]  </TASK>
[   12.630477] 
[   12.640771] The buggy address belongs to the physical page:
[   12.641208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102114
[   12.641666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.641967] flags: 0x200000000000040(head|node=0|zone=2)
[   12.642208] page_type: f8(unknown)
[   12.642378] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.642956] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.643390] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.643863] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.644249] head: 0200000000000002 ffffea0004084501 00000000ffffffff 00000000ffffffff
[   12.644716] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.645136] page dumped because: kasan: bad access detected
[   12.645689] 
[   12.645807] Memory state around the buggy address:
[   12.645999]  ffff888102115f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.646572]  ffff888102116000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.646884] >ffff888102116080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.647176]                                                           ^
[   12.647721]  ffff888102116100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.648036]  ffff888102116180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.648470] ==================================================================
[   12.474014] ==================================================================
[   12.474638] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.474876] Write of size 1 at addr ffff8881003588ea by task kunit_try_catch/175
[   12.475089] 
[   12.475170] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.475209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.475221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.475240] Call Trace:
[   12.475250]  <TASK>
[   12.475263]  dump_stack_lvl+0x73/0xb0
[   12.475290]  print_report+0xd1/0x650
[   12.475312]  ? __virt_addr_valid+0x1db/0x2d0
[   12.475336]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.475359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.475402]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.475446]  kasan_report+0x141/0x180
[   12.475796]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.475831]  __asan_report_store1_noabort+0x1b/0x30
[   12.475858]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.475884]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.475909]  ? irqentry_exit+0x2a/0x60
[   12.475929]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.475959]  ? __pfx_read_tsc+0x10/0x10
[   12.475983]  krealloc_less_oob+0x1c/0x30
[   12.476004]  kunit_try_run_case+0x1a5/0x480
[   12.476027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.476050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.476072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.476095]  ? __kthread_parkme+0x82/0x180
[   12.476115]  ? preempt_count_sub+0x50/0x80
[   12.476139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.476162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.476193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.476218]  kthread+0x337/0x6f0
[   12.476236]  ? trace_preempt_on+0x20/0xc0
[   12.476258]  ? __pfx_kthread+0x10/0x10
[   12.476278]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.476299]  ? calculate_sigpending+0x7b/0xa0
[   12.476323]  ? __pfx_kthread+0x10/0x10
[   12.476344]  ret_from_fork+0x116/0x1d0
[   12.476549]  ? __pfx_kthread+0x10/0x10
[   12.476581]  ret_from_fork_asm+0x1a/0x30
[   12.476611]  </TASK>
[   12.476621] 
[   12.488165] Allocated by task 175:
[   12.488342]  kasan_save_stack+0x45/0x70
[   12.488975]  kasan_save_track+0x18/0x40
[   12.489225]  kasan_save_alloc_info+0x3b/0x50
[   12.489551]  __kasan_krealloc+0x190/0x1f0
[   12.489926]  krealloc_noprof+0xf3/0x340
[   12.490227]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.490606]  krealloc_less_oob+0x1c/0x30
[   12.490800]  kunit_try_run_case+0x1a5/0x480
[   12.490994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.491224]  kthread+0x337/0x6f0
[   12.491384]  ret_from_fork+0x116/0x1d0
[   12.491975]  ret_from_fork_asm+0x1a/0x30
[   12.492231] 
[   12.492476] The buggy address belongs to the object at ffff888100358800
[   12.492476]  which belongs to the cache kmalloc-256 of size 256
[   12.493207] The buggy address is located 33 bytes to the right of
[   12.493207]  allocated 201-byte region [ffff888100358800, ffff8881003588c9)
[   12.493997] 
[   12.494086] The buggy address belongs to the physical page:
[   12.494313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100358
[   12.494959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.495575] flags: 0x200000000000040(head|node=0|zone=2)
[   12.495889] page_type: f5(slab)
[   12.496163] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.496666] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.496984] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.497287] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.498046] head: 0200000000000001 ffffea000400d601 00000000ffffffff 00000000ffffffff
[   12.498558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.499181] page dumped because: kasan: bad access detected
[   12.499684] 
[   12.499772] Memory state around the buggy address:
[   12.500164]  ffff888100358780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.500693]  ffff888100358800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.501174] >ffff888100358880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.501987]                                                           ^
[   12.502202]  ffff888100358900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.502550]  ffff888100358980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.502799] ==================================================================
[   12.608947] ==================================================================
[   12.609341] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.609688] Write of size 1 at addr ffff8881021160ea by task kunit_try_catch/179
[   12.609906] 
[   12.609983] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.610019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.610029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.610046] Call Trace:
[   12.610060]  <TASK>
[   12.610073]  dump_stack_lvl+0x73/0xb0
[   12.610097]  print_report+0xd1/0x650
[   12.610118]  ? __virt_addr_valid+0x1db/0x2d0
[   12.610139]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.610161]  ? kasan_addr_to_slab+0x11/0xa0
[   12.610180]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.610202]  kasan_report+0x141/0x180
[   12.610223]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.610249]  __asan_report_store1_noabort+0x1b/0x30
[   12.610273]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.610297]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.610320]  ? finish_task_switch.isra.0+0x153/0x700
[   12.610340]  ? __switch_to+0x47/0xf50
[   12.610416]  ? __schedule+0x10cc/0x2b60
[   12.610441]  ? __pfx_read_tsc+0x10/0x10
[   12.610465]  krealloc_large_less_oob+0x1c/0x30
[   12.610488]  kunit_try_run_case+0x1a5/0x480
[   12.610511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.610534]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.610556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.610579]  ? __kthread_parkme+0x82/0x180
[   12.610599]  ? preempt_count_sub+0x50/0x80
[   12.610621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.610645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.610668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.610693]  kthread+0x337/0x6f0
[   12.610711]  ? trace_preempt_on+0x20/0xc0
[   12.610734]  ? __pfx_kthread+0x10/0x10
[   12.610754]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.610775]  ? calculate_sigpending+0x7b/0xa0
[   12.610798]  ? __pfx_kthread+0x10/0x10
[   12.610819]  ret_from_fork+0x116/0x1d0
[   12.610837]  ? __pfx_kthread+0x10/0x10
[   12.610858]  ret_from_fork_asm+0x1a/0x30
[   12.610887]  </TASK>
[   12.610896] 
[   12.618619] The buggy address belongs to the physical page:
[   12.618878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102114
[   12.619244] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.619729] flags: 0x200000000000040(head|node=0|zone=2)
[   12.620085] page_type: f8(unknown)
[   12.620263] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.621070] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.621953] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.622236] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.623442] head: 0200000000000002 ffffea0004084501 00000000ffffffff 00000000ffffffff
[   12.623761] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.624084] page dumped because: kasan: bad access detected
[   12.624330] 
[   12.624874] Memory state around the buggy address:
[   12.625073]  ffff888102115f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.625542]  ffff888102116000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.625839] >ffff888102116080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.626129]                                                           ^
[   12.626657]  ffff888102116100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.626912]  ffff888102116180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.627204] ==================================================================
[   12.593219] ==================================================================
[   12.593563] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.593918] Write of size 1 at addr ffff8881021160da by task kunit_try_catch/179
[   12.594438] 
[   12.594548] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.594585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.594596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.594614] Call Trace:
[   12.594625]  <TASK>
[   12.594638]  dump_stack_lvl+0x73/0xb0
[   12.594665]  print_report+0xd1/0x650
[   12.594686]  ? __virt_addr_valid+0x1db/0x2d0
[   12.594708]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.594731]  ? kasan_addr_to_slab+0x11/0xa0
[   12.594751]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.594775]  kasan_report+0x141/0x180
[   12.594796]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.594825]  __asan_report_store1_noabort+0x1b/0x30
[   12.594850]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.594875]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.594900]  ? finish_task_switch.isra.0+0x153/0x700
[   12.594922]  ? __switch_to+0x47/0xf50
[   12.594945]  ? __schedule+0x10cc/0x2b60
[   12.594966]  ? __pfx_read_tsc+0x10/0x10
[   12.594990]  krealloc_large_less_oob+0x1c/0x30
[   12.595013]  kunit_try_run_case+0x1a5/0x480
[   12.595036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.595058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.595081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.595105]  ? __kthread_parkme+0x82/0x180
[   12.595124]  ? preempt_count_sub+0x50/0x80
[   12.595147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.595170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.595194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.595219]  kthread+0x337/0x6f0
[   12.595237]  ? trace_preempt_on+0x20/0xc0
[   12.595260]  ? __pfx_kthread+0x10/0x10
[   12.595280]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.595301]  ? calculate_sigpending+0x7b/0xa0
[   12.595325]  ? __pfx_kthread+0x10/0x10
[   12.595346]  ret_from_fork+0x116/0x1d0
[   12.595373]  ? __pfx_kthread+0x10/0x10
[   12.595394]  ret_from_fork_asm+0x1a/0x30
[   12.595424]  </TASK>
[   12.595433] 
[   12.602580] The buggy address belongs to the physical page:
[   12.602839] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102114
[   12.603197] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.603542] flags: 0x200000000000040(head|node=0|zone=2)
[   12.603764] page_type: f8(unknown)
[   12.603893] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.604122] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.604770] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.605123] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.605405] head: 0200000000000002 ffffea0004084501 00000000ffffffff 00000000ffffffff
[   12.606077] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.606494] page dumped because: kasan: bad access detected
[   12.606793] 
[   12.606883] Memory state around the buggy address:
[   12.607036]  ffff888102115f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.607373]  ffff888102116000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.607666] >ffff888102116080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.607876]                                                     ^
[   12.608058]  ffff888102116100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.608275]  ffff888102116180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.608570] ==================================================================
[   12.561066] ==================================================================
[   12.561568] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.562216] Write of size 1 at addr ffff8881021160c9 by task kunit_try_catch/179
[   12.562548] 
[   12.562850] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.562894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.562906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.562924] Call Trace:
[   12.562935]  <TASK>
[   12.562950]  dump_stack_lvl+0x73/0xb0
[   12.562981]  print_report+0xd1/0x650
[   12.563003]  ? __virt_addr_valid+0x1db/0x2d0
[   12.563026]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.563050]  ? kasan_addr_to_slab+0x11/0xa0
[   12.563070]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.563094]  kasan_report+0x141/0x180
[   12.563115]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.563144]  __asan_report_store1_noabort+0x1b/0x30
[   12.563168]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.563194]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.563219]  ? finish_task_switch.isra.0+0x153/0x700
[   12.563241]  ? __switch_to+0x47/0xf50
[   12.563266]  ? __schedule+0x10cc/0x2b60
[   12.563288]  ? __pfx_read_tsc+0x10/0x10
[   12.563311]  krealloc_large_less_oob+0x1c/0x30
[   12.563334]  kunit_try_run_case+0x1a5/0x480
[   12.563385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.563408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.563431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.563454]  ? __kthread_parkme+0x82/0x180
[   12.563476]  ? preempt_count_sub+0x50/0x80
[   12.563498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.563522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.563546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.563570]  kthread+0x337/0x6f0
[   12.563589]  ? trace_preempt_on+0x20/0xc0
[   12.563612]  ? __pfx_kthread+0x10/0x10
[   12.563632]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.563653]  ? calculate_sigpending+0x7b/0xa0
[   12.563676]  ? __pfx_kthread+0x10/0x10
[   12.563697]  ret_from_fork+0x116/0x1d0
[   12.563715]  ? __pfx_kthread+0x10/0x10
[   12.563735]  ret_from_fork_asm+0x1a/0x30
[   12.563765]  </TASK>
[   12.563774] 
[   12.571213] The buggy address belongs to the physical page:
[   12.571435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102114
[   12.571701] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.572080] flags: 0x200000000000040(head|node=0|zone=2)
[   12.572271] page_type: f8(unknown)
[   12.572422] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.572816] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.573166] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.573555] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.573798] head: 0200000000000002 ffffea0004084501 00000000ffffffff 00000000ffffffff
[   12.574050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.574391] page dumped because: kasan: bad access detected
[   12.574725] 
[   12.574832] Memory state around the buggy address:
[   12.575035]  ffff888102115f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.575441]  ffff888102116000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.575740] >ffff888102116080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.576000]                                               ^
[   12.576207]  ffff888102116100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.576432]  ffff888102116180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.576940] ==================================================================
[   12.406585] ==================================================================
[   12.408840] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.410122] Write of size 1 at addr ffff8881003588c9 by task kunit_try_catch/175
[   12.411360] 
[   12.411623] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.411678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.411690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.411711] Call Trace:
[   12.411723]  <TASK>
[   12.411739]  dump_stack_lvl+0x73/0xb0
[   12.411770]  print_report+0xd1/0x650
[   12.411791]  ? __virt_addr_valid+0x1db/0x2d0
[   12.411814]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.411838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.411860]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.411884]  kasan_report+0x141/0x180
[   12.411906]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.411934]  __asan_report_store1_noabort+0x1b/0x30
[   12.411960]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.411985]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.412010]  ? irqentry_exit+0x2a/0x60
[   12.412031]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.412059]  ? __pfx_read_tsc+0x10/0x10
[   12.412083]  krealloc_less_oob+0x1c/0x30
[   12.412104]  kunit_try_run_case+0x1a5/0x480
[   12.412127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.412149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.412172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.412203]  ? __kthread_parkme+0x82/0x180
[   12.412224]  ? preempt_count_sub+0x50/0x80
[   12.412247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.412271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.412294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.412318]  kthread+0x337/0x6f0
[   12.412336]  ? trace_preempt_on+0x20/0xc0
[   12.412360]  ? __pfx_kthread+0x10/0x10
[   12.412392]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.412413]  ? calculate_sigpending+0x7b/0xa0
[   12.412436]  ? __pfx_kthread+0x10/0x10
[   12.412457]  ret_from_fork+0x116/0x1d0
[   12.412474]  ? __pfx_kthread+0x10/0x10
[   12.412494]  ret_from_fork_asm+0x1a/0x30
[   12.412570]  </TASK>
[   12.412580] 
[   12.420416] Allocated by task 175:
[   12.420602]  kasan_save_stack+0x45/0x70
[   12.420819]  kasan_save_track+0x18/0x40
[   12.421051]  kasan_save_alloc_info+0x3b/0x50
[   12.421287]  __kasan_krealloc+0x190/0x1f0
[   12.421554]  krealloc_noprof+0xf3/0x340
[   12.421734]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.421910]  krealloc_less_oob+0x1c/0x30
[   12.422107]  kunit_try_run_case+0x1a5/0x480
[   12.422338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.422581]  kthread+0x337/0x6f0
[   12.422700]  ret_from_fork+0x116/0x1d0
[   12.422829]  ret_from_fork_asm+0x1a/0x30
[   12.423030] 
[   12.423135] The buggy address belongs to the object at ffff888100358800
[   12.423135]  which belongs to the cache kmalloc-256 of size 256
[   12.423675] The buggy address is located 0 bytes to the right of
[   12.423675]  allocated 201-byte region [ffff888100358800, ffff8881003588c9)
[   12.424085] 
[   12.424157] The buggy address belongs to the physical page:
[   12.424425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100358
[   12.424805] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.425106] flags: 0x200000000000040(head|node=0|zone=2)
[   12.425356] page_type: f5(slab)
[   12.425546] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.425861] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.426195] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.426538] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.426883] head: 0200000000000001 ffffea000400d601 00000000ffffffff 00000000ffffffff
[   12.427208] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.427548] page dumped because: kasan: bad access detected
[   12.427795] 
[   12.427877] Memory state around the buggy address:
[   12.428085]  ffff888100358780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.428372]  ffff888100358800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.428792] >ffff888100358880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.429124]                                               ^
[   12.429562]  ffff888100358900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.429889]  ffff888100358980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.430119] ==================================================================
[   12.431145] ==================================================================
[   12.431687] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.432111] Write of size 1 at addr ffff8881003588d0 by task kunit_try_catch/175
[   12.432467] 
[   12.432585] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.432623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.432635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.432665] Call Trace:
[   12.432675]  <TASK>
[   12.432688]  dump_stack_lvl+0x73/0xb0
[   12.432717]  print_report+0xd1/0x650
[   12.432739]  ? __virt_addr_valid+0x1db/0x2d0
[   12.432760]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.432793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.432815]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.432839]  kasan_report+0x141/0x180
[   12.432872]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.432901]  __asan_report_store1_noabort+0x1b/0x30
[   12.432927]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.432962]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.432986]  ? irqentry_exit+0x2a/0x60
[   12.433006]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.433045]  ? __pfx_read_tsc+0x10/0x10
[   12.433069]  krealloc_less_oob+0x1c/0x30
[   12.433099]  kunit_try_run_case+0x1a5/0x480
[   12.433122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.433144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.433176]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.433199]  ? __kthread_parkme+0x82/0x180
[   12.433219]  ? preempt_count_sub+0x50/0x80
[   12.433241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.433265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.433288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.433312]  kthread+0x337/0x6f0
[   12.433331]  ? trace_preempt_on+0x20/0xc0
[   12.433353]  ? __pfx_kthread+0x10/0x10
[   12.433390]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.433411]  ? calculate_sigpending+0x7b/0xa0
[   12.433445]  ? __pfx_kthread+0x10/0x10
[   12.433466]  ret_from_fork+0x116/0x1d0
[   12.433483]  ? __pfx_kthread+0x10/0x10
[   12.433503]  ret_from_fork_asm+0x1a/0x30
[   12.433533]  </TASK>
[   12.433542] 
[   12.440891] Allocated by task 175:
[   12.441023]  kasan_save_stack+0x45/0x70
[   12.441258]  kasan_save_track+0x18/0x40
[   12.441456]  kasan_save_alloc_info+0x3b/0x50
[   12.441665]  __kasan_krealloc+0x190/0x1f0
[   12.441861]  krealloc_noprof+0xf3/0x340
[   12.442047]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.442269]  krealloc_less_oob+0x1c/0x30
[   12.442414]  kunit_try_run_case+0x1a5/0x480
[   12.442575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.442828]  kthread+0x337/0x6f0
[   12.443012]  ret_from_fork+0x116/0x1d0
[   12.443212]  ret_from_fork_asm+0x1a/0x30
[   12.443413] 
[   12.443543] The buggy address belongs to the object at ffff888100358800
[   12.443543]  which belongs to the cache kmalloc-256 of size 256
[   12.444038] The buggy address is located 7 bytes to the right of
[   12.444038]  allocated 201-byte region [ffff888100358800, ffff8881003588c9)
[   12.444619] 
[   12.444713] The buggy address belongs to the physical page:
[   12.444943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100358
[   12.445279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.445677] flags: 0x200000000000040(head|node=0|zone=2)
[   12.445907] page_type: f5(slab)
[   12.446026] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.446253] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.446544] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.446894] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.447235] head: 0200000000000001 ffffea000400d601 00000000ffffffff 00000000ffffffff
[   12.447625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.447849] page dumped because: kasan: bad access detected
[   12.448017] 
[   12.448084] Memory state around the buggy address:
[   12.448312]  ffff888100358780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.448935]  ffff888100358800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.449271] >ffff888100358880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.449782]                                                  ^
[   12.450048]  ffff888100358900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.450392]  ffff888100358980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.450695] ==================================================================