Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.559447] ==================================================================
[   16.559705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.559830] Write of size 1 at addr fff00000c65220d0 by task kunit_try_catch/163
[   16.559896] 
[   16.560027] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.560115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.560157] Hardware name: linux,dummy-virt (DT)
[   16.560411] Call trace:
[   16.560438]  show_stack+0x20/0x38 (C)
[   16.560865]  dump_stack_lvl+0x8c/0xd0
[   16.560989]  print_report+0x118/0x608
[   16.561093]  kasan_report+0xdc/0x128
[   16.561142]  __asan_report_store1_noabort+0x20/0x30
[   16.561197]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.561245]  krealloc_large_less_oob+0x20/0x38
[   16.561303]  kunit_try_run_case+0x170/0x3f0
[   16.561349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.561401]  kthread+0x328/0x630
[   16.561442]  ret_from_fork+0x10/0x20
[   16.561487] 
[   16.561506] The buggy address belongs to the physical page:
[   16.561543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520
[   16.561594] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.561648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.561697] page_type: f8(unknown)
[   16.561734] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.561782] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.561830] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.561897] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.561953] head: 0bfffe0000000002 ffffc1ffc3194801 00000000ffffffff 00000000ffffffff
[   16.562001] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.562047] page dumped because: kasan: bad access detected
[   16.562086] 
[   16.562103] Memory state around the buggy address:
[   16.562133]  fff00000c6521f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.562174]  fff00000c6522000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.562218] >fff00000c6522080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.562265]                                                  ^
[   16.562300]  fff00000c6522100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.562341]  fff00000c6522180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.562385] ==================================================================
[   16.496993] ==================================================================
[   16.497346] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.497408] Write of size 1 at addr fff00000c4408eea by task kunit_try_catch/159
[   16.497524] 
[   16.497557] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.497810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.497863] Hardware name: linux,dummy-virt (DT)
[   16.498129] Call trace:
[   16.498392]  show_stack+0x20/0x38 (C)
[   16.498591]  dump_stack_lvl+0x8c/0xd0
[   16.498672]  print_report+0x118/0x608
[   16.498824]  kasan_report+0xdc/0x128
[   16.498969]  __asan_report_store1_noabort+0x20/0x30
[   16.499124]  krealloc_less_oob_helper+0xae4/0xc50
[   16.499505]  krealloc_less_oob+0x20/0x38
[   16.499954]  kunit_try_run_case+0x170/0x3f0
[   16.500346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.500569]  kthread+0x328/0x630
[   16.500805]  ret_from_fork+0x10/0x20
[   16.500951] 
[   16.500991] Allocated by task 159:
[   16.501018]  kasan_save_stack+0x3c/0x68
[   16.501236]  kasan_save_track+0x20/0x40
[   16.501288]  kasan_save_alloc_info+0x40/0x58
[   16.501432]  __kasan_krealloc+0x118/0x178
[   16.501541]  krealloc_noprof+0x128/0x360
[   16.501602]  krealloc_less_oob_helper+0x168/0xc50
[   16.501655]  krealloc_less_oob+0x20/0x38
[   16.501690]  kunit_try_run_case+0x170/0x3f0
[   16.501727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.501769]  kthread+0x328/0x630
[   16.501823]  ret_from_fork+0x10/0x20
[   16.501870] 
[   16.501888] The buggy address belongs to the object at fff00000c4408e00
[   16.501888]  which belongs to the cache kmalloc-256 of size 256
[   16.501944] The buggy address is located 33 bytes to the right of
[   16.501944]  allocated 201-byte region [fff00000c4408e00, fff00000c4408ec9)
[   16.502025] 
[   16.502045] The buggy address belongs to the physical page:
[   16.502083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104408
[   16.502149] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.502201] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.502262] page_type: f5(slab)
[   16.502309] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.502357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.502407] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.502455] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.502502] head: 0bfffe0000000001 ffffc1ffc3110201 00000000ffffffff 00000000ffffffff
[   16.502559] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.502604] page dumped because: kasan: bad access detected
[   16.502640] 
[   16.502657] Memory state around the buggy address:
[   16.502688]  fff00000c4408d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.503019]  fff00000c4408e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.503417] >fff00000c4408e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.503460]                                                           ^
[   16.503498]  fff00000c4408f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.503714]  fff00000c4408f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.503781] ==================================================================
[   16.562436] ==================================================================
[   16.562470] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.562512] Write of size 1 at addr fff00000c65220da by task kunit_try_catch/163
[   16.562558] 
[   16.562585] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.562660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.562694] Hardware name: linux,dummy-virt (DT)
[   16.563596] Call trace:
[   16.563637]  show_stack+0x20/0x38 (C)
[   16.563720]  dump_stack_lvl+0x8c/0xd0
[   16.563832]  print_report+0x118/0x608
[   16.564090]  kasan_report+0xdc/0x128
[   16.564145]  __asan_report_store1_noabort+0x20/0x30
[   16.564862]  krealloc_less_oob_helper+0xa80/0xc50
[   16.565151]  krealloc_large_less_oob+0x20/0x38
[   16.565298]  kunit_try_run_case+0x170/0x3f0
[   16.565509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.565766]  kthread+0x328/0x630
[   16.565832]  ret_from_fork+0x10/0x20
[   16.566316] 
[   16.566429] The buggy address belongs to the physical page:
[   16.566719] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520
[   16.566876] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.567061] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.567204] page_type: f8(unknown)
[   16.567250] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.567299] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.567538] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.567732] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.568026] head: 0bfffe0000000002 ffffc1ffc3194801 00000000ffffffff 00000000ffffffff
[   16.568217] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.568387] page dumped because: kasan: bad access detected
[   16.568443] 
[   16.568461] Memory state around the buggy address:
[   16.568663]  fff00000c6521f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.569133]  fff00000c6522000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.569189] >fff00000c6522080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.569759]                                                     ^
[   16.569949]  fff00000c6522100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.570090]  fff00000c6522180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.570206] ==================================================================
[   16.571257] ==================================================================
[   16.571306] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.571485] Write of size 1 at addr fff00000c65220ea by task kunit_try_catch/163
[   16.571601] 
[   16.571777] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.571949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.571978] Hardware name: linux,dummy-virt (DT)
[   16.572046] Call trace:
[   16.572094]  show_stack+0x20/0x38 (C)
[   16.572245]  dump_stack_lvl+0x8c/0xd0
[   16.572294]  print_report+0x118/0x608
[   16.572359]  kasan_report+0xdc/0x128
[   16.572810]  __asan_report_store1_noabort+0x20/0x30
[   16.573006]  krealloc_less_oob_helper+0xae4/0xc50
[   16.573409]  krealloc_large_less_oob+0x20/0x38
[   16.573518]  kunit_try_run_case+0x170/0x3f0
[   16.573642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.573725]  kthread+0x328/0x630
[   16.573933]  ret_from_fork+0x10/0x20
[   16.574137] 
[   16.574404] The buggy address belongs to the physical page:
[   16.574438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520
[   16.574507] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.574697] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.575044] page_type: f8(unknown)
[   16.575219] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.575308] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.575606] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.575857] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.576485] head: 0bfffe0000000002 ffffc1ffc3194801 00000000ffffffff 00000000ffffffff
[   16.576838] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.577074] page dumped because: kasan: bad access detected
[   16.577387] 
[   16.577541] Memory state around the buggy address:
[   16.577652]  fff00000c6521f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.577900]  fff00000c6522000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.578165] >fff00000c6522080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.578371]                                                           ^
[   16.578626]  fff00000c6522100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.578698]  fff00000c6522180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.578905] ==================================================================
[   16.470083] ==================================================================
[   16.470308] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.470386] Write of size 1 at addr fff00000c4408ec9 by task kunit_try_catch/159
[   16.470530] 
[   16.470611] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.470692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.470762] Hardware name: linux,dummy-virt (DT)
[   16.470820] Call trace:
[   16.470852]  show_stack+0x20/0x38 (C)
[   16.471048]  dump_stack_lvl+0x8c/0xd0
[   16.471099]  print_report+0x118/0x608
[   16.471144]  kasan_report+0xdc/0x128
[   16.471277]  __asan_report_store1_noabort+0x20/0x30
[   16.471442]  krealloc_less_oob_helper+0xa48/0xc50
[   16.471715]  krealloc_less_oob+0x20/0x38
[   16.471877]  kunit_try_run_case+0x170/0x3f0
[   16.472128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.472409]  kthread+0x328/0x630
[   16.472660]  ret_from_fork+0x10/0x20
[   16.473037] 
[   16.473282] Allocated by task 159:
[   16.473634]  kasan_save_stack+0x3c/0x68
[   16.473676]  kasan_save_track+0x20/0x40
[   16.474108]  kasan_save_alloc_info+0x40/0x58
[   16.474264]  __kasan_krealloc+0x118/0x178
[   16.474489]  krealloc_noprof+0x128/0x360
[   16.474765]  krealloc_less_oob_helper+0x168/0xc50
[   16.474812]  krealloc_less_oob+0x20/0x38
[   16.474890]  kunit_try_run_case+0x170/0x3f0
[   16.475157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.475374]  kthread+0x328/0x630
[   16.475608]  ret_from_fork+0x10/0x20
[   16.475657] 
[   16.475676] The buggy address belongs to the object at fff00000c4408e00
[   16.475676]  which belongs to the cache kmalloc-256 of size 256
[   16.475865] The buggy address is located 0 bytes to the right of
[   16.475865]  allocated 201-byte region [fff00000c4408e00, fff00000c4408ec9)
[   16.476178] 
[   16.476242] The buggy address belongs to the physical page:
[   16.476367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104408
[   16.476645] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.476769] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.476819] page_type: f5(slab)
[   16.476971] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.477350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.477508] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.477583] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.477642] head: 0bfffe0000000001 ffffc1ffc3110201 00000000ffffffff 00000000ffffffff
[   16.477689] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.477757] page dumped because: kasan: bad access detected
[   16.477787] 
[   16.477804] Memory state around the buggy address:
[   16.477862]  fff00000c4408d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.477908]  fff00000c4408e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.477964] >fff00000c4408e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.478021]                                               ^
[   16.478054]  fff00000c4408f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478095]  fff00000c4408f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478132] ==================================================================
[   16.480653] ==================================================================
[   16.480701] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.480764] Write of size 1 at addr fff00000c4408ed0 by task kunit_try_catch/159
[   16.480851] 
[   16.480883] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.480960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.481022] Hardware name: linux,dummy-virt (DT)
[   16.481086] Call trace:
[   16.481135]  show_stack+0x20/0x38 (C)
[   16.481220]  dump_stack_lvl+0x8c/0xd0
[   16.481267]  print_report+0x118/0x608
[   16.481312]  kasan_report+0xdc/0x128
[   16.481356]  __asan_report_store1_noabort+0x20/0x30
[   16.481406]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.481453]  krealloc_less_oob+0x20/0x38
[   16.481496]  kunit_try_run_case+0x170/0x3f0
[   16.481678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.481769]  kthread+0x328/0x630
[   16.481838]  ret_from_fork+0x10/0x20
[   16.481968] 
[   16.481986] Allocated by task 159:
[   16.482012]  kasan_save_stack+0x3c/0x68
[   16.482125]  kasan_save_track+0x20/0x40
[   16.482162]  kasan_save_alloc_info+0x40/0x58
[   16.482211]  __kasan_krealloc+0x118/0x178
[   16.482247]  krealloc_noprof+0x128/0x360
[   16.482282]  krealloc_less_oob_helper+0x168/0xc50
[   16.482319]  krealloc_less_oob+0x20/0x38
[   16.482354]  kunit_try_run_case+0x170/0x3f0
[   16.482458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.482576]  kthread+0x328/0x630
[   16.482608]  ret_from_fork+0x10/0x20
[   16.482641] 
[   16.482792] The buggy address belongs to the object at fff00000c4408e00
[   16.482792]  which belongs to the cache kmalloc-256 of size 256
[   16.483177] The buggy address is located 7 bytes to the right of
[   16.483177]  allocated 201-byte region [fff00000c4408e00, fff00000c4408ec9)
[   16.483296] 
[   16.483424] The buggy address belongs to the physical page:
[   16.483516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104408
[   16.483662] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.483778] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.483876] page_type: f5(slab)
[   16.483912] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.483969] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.484261] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.484427] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.484564] head: 0bfffe0000000001 ffffc1ffc3110201 00000000ffffffff 00000000ffffffff
[   16.484744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.484908] page dumped because: kasan: bad access detected
[   16.485017] 
[   16.485083] Memory state around the buggy address:
[   16.485230]  fff00000c4408d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.485272]  fff00000c4408e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.485346] >fff00000c4408e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.485498]                                                  ^
[   16.485778]  fff00000c4408f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.485833]  fff00000c4408f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.485940] ==================================================================
[   16.579854] ==================================================================
[   16.579900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.579947] Write of size 1 at addr fff00000c65220eb by task kunit_try_catch/163
[   16.580433] 
[   16.580668] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.580871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.580939] Hardware name: linux,dummy-virt (DT)
[   16.580989] Call trace:
[   16.581076]  show_stack+0x20/0x38 (C)
[   16.581190]  dump_stack_lvl+0x8c/0xd0
[   16.581286]  print_report+0x118/0x608
[   16.581333]  kasan_report+0xdc/0x128
[   16.581697]  __asan_report_store1_noabort+0x20/0x30
[   16.581763]  krealloc_less_oob_helper+0xa58/0xc50
[   16.581829]  krealloc_large_less_oob+0x20/0x38
[   16.581891]  kunit_try_run_case+0x170/0x3f0
[   16.581937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.581987]  kthread+0x328/0x630
[   16.582027]  ret_from_fork+0x10/0x20
[   16.582072] 
[   16.582091] The buggy address belongs to the physical page:
[   16.582120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520
[   16.582171] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.582216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.582266] page_type: f8(unknown)
[   16.582303] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.582351] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.582398] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.582444] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.582490] head: 0bfffe0000000002 ffffc1ffc3194801 00000000ffffffff 00000000ffffffff
[   16.582536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.582573] page dumped because: kasan: bad access detected
[   16.582602] 
[   16.582619] Memory state around the buggy address:
[   16.582648]  fff00000c6521f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.582688]  fff00000c6522000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.582727] >fff00000c6522080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.582763]                                                           ^
[   16.582799]  fff00000c6522100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.582847]  fff00000c6522180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.582883] ==================================================================
[   16.549983] ==================================================================
[   16.550038] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.550090] Write of size 1 at addr fff00000c65220c9 by task kunit_try_catch/163
[   16.550280] 
[   16.550324] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.550405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.550430] Hardware name: linux,dummy-virt (DT)
[   16.550460] Call trace:
[   16.550685]  show_stack+0x20/0x38 (C)
[   16.550862]  dump_stack_lvl+0x8c/0xd0
[   16.550910]  print_report+0x118/0x608
[   16.551201]  kasan_report+0xdc/0x128
[   16.551533]  __asan_report_store1_noabort+0x20/0x30
[   16.551757]  krealloc_less_oob_helper+0xa48/0xc50
[   16.552045]  krealloc_large_less_oob+0x20/0x38
[   16.552280]  kunit_try_run_case+0x170/0x3f0
[   16.552438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.552586]  kthread+0x328/0x630
[   16.552674]  ret_from_fork+0x10/0x20
[   16.552962] 
[   16.553176] The buggy address belongs to the physical page:
[   16.553425] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520
[   16.553542] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.553595] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.553804] page_type: f8(unknown)
[   16.554052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.554166] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.554294] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.554486] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.554949] head: 0bfffe0000000002 ffffc1ffc3194801 00000000ffffffff 00000000ffffffff
[   16.555011] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.555536] page dumped because: kasan: bad access detected
[   16.555643] 
[   16.555718] Memory state around the buggy address:
[   16.555950]  fff00000c6521f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.556024]  fff00000c6522000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.556437] >fff00000c6522080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.556647]                                               ^
[   16.556697]  fff00000c6522100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.556901]  fff00000c6522180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.557251] ==================================================================
[   16.487760] ==================================================================
[   16.487808] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.487869] Write of size 1 at addr fff00000c4408eda by task kunit_try_catch/159
[   16.487927] 
[   16.487956] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.488035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.488060] Hardware name: linux,dummy-virt (DT)
[   16.488091] Call trace:
[   16.488111]  show_stack+0x20/0x38 (C)
[   16.488374]  dump_stack_lvl+0x8c/0xd0
[   16.488809]  print_report+0x118/0x608
[   16.488883]  kasan_report+0xdc/0x128
[   16.488928]  __asan_report_store1_noabort+0x20/0x30
[   16.489058]  krealloc_less_oob_helper+0xa80/0xc50
[   16.489112]  krealloc_less_oob+0x20/0x38
[   16.489157]  kunit_try_run_case+0x170/0x3f0
[   16.489202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.489590]  kthread+0x328/0x630
[   16.489684]  ret_from_fork+0x10/0x20
[   16.489876] 
[   16.489906] Allocated by task 159:
[   16.490079]  kasan_save_stack+0x3c/0x68
[   16.490135]  kasan_save_track+0x20/0x40
[   16.490276]  kasan_save_alloc_info+0x40/0x58
[   16.490314]  __kasan_krealloc+0x118/0x178
[   16.490351]  krealloc_noprof+0x128/0x360
[   16.490387]  krealloc_less_oob_helper+0x168/0xc50
[   16.490424]  krealloc_less_oob+0x20/0x38
[   16.490708]  kunit_try_run_case+0x170/0x3f0
[   16.491020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.491067]  kthread+0x328/0x630
[   16.491099]  ret_from_fork+0x10/0x20
[   16.491133] 
[   16.491444] The buggy address belongs to the object at fff00000c4408e00
[   16.491444]  which belongs to the cache kmalloc-256 of size 256
[   16.491720] The buggy address is located 17 bytes to the right of
[   16.491720]  allocated 201-byte region [fff00000c4408e00, fff00000c4408ec9)
[   16.491867] 
[   16.491916] The buggy address belongs to the physical page:
[   16.491996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104408
[   16.492104] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.492250] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.492486] page_type: f5(slab)
[   16.492788] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.493272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.493484] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.493551] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.493899] head: 0bfffe0000000001 ffffc1ffc3110201 00000000ffffffff 00000000ffffffff
[   16.494039] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.494363] page dumped because: kasan: bad access detected
[   16.494542] 
[   16.494808] Memory state around the buggy address:
[   16.494909]  fff00000c4408d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.494956]  fff00000c4408e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.495004] >fff00000c4408e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.495202]                                                     ^
[   16.495513]  fff00000c4408f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495569]  fff00000c4408f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495884] ==================================================================
[   16.504773] ==================================================================
[   16.504818] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.505193] Write of size 1 at addr fff00000c4408eeb by task kunit_try_catch/159
[   16.505485] 
[   16.505523] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.505739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.505767] Hardware name: linux,dummy-virt (DT)
[   16.505953] Call trace:
[   16.506029]  show_stack+0x20/0x38 (C)
[   16.506085]  dump_stack_lvl+0x8c/0xd0
[   16.506177]  print_report+0x118/0x608
[   16.506431]  kasan_report+0xdc/0x128
[   16.506647]  __asan_report_store1_noabort+0x20/0x30
[   16.506724]  krealloc_less_oob_helper+0xa58/0xc50
[   16.506888]  krealloc_less_oob+0x20/0x38
[   16.507160]  kunit_try_run_case+0x170/0x3f0
[   16.507270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.507538]  kthread+0x328/0x630
[   16.507726]  ret_from_fork+0x10/0x20
[   16.507776] 
[   16.507801] Allocated by task 159:
[   16.507828]  kasan_save_stack+0x3c/0x68
[   16.507999]  kasan_save_track+0x20/0x40
[   16.508044]  kasan_save_alloc_info+0x40/0x58
[   16.508249]  __kasan_krealloc+0x118/0x178
[   16.508295]  krealloc_noprof+0x128/0x360
[   16.508591]  krealloc_less_oob_helper+0x168/0xc50
[   16.508803]  krealloc_less_oob+0x20/0x38
[   16.508905]  kunit_try_run_case+0x170/0x3f0
[   16.509005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.509049]  kthread+0x328/0x630
[   16.509452]  ret_from_fork+0x10/0x20
[   16.509561] 
[   16.509640] The buggy address belongs to the object at fff00000c4408e00
[   16.509640]  which belongs to the cache kmalloc-256 of size 256
[   16.509804] The buggy address is located 34 bytes to the right of
[   16.509804]  allocated 201-byte region [fff00000c4408e00, fff00000c4408ec9)
[   16.510005] 
[   16.510028] The buggy address belongs to the physical page:
[   16.510123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104408
[   16.510308] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.510584] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.510811] page_type: f5(slab)
[   16.510887] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.511055] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.511120] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.511335] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.511475] head: 0bfffe0000000001 ffffc1ffc3110201 00000000ffffffff 00000000ffffffff
[   16.511525] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.511614] page dumped because: kasan: bad access detected
[   16.511809] 
[   16.512008] Memory state around the buggy address:
[   16.512148]  fff00000c4408d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.512341]  fff00000c4408e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.512430] >fff00000c4408e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.512480]                                                           ^
[   16.512736]  fff00000c4408f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.512896]  fff00000c4408f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.513037] ==================================================================

[   12.054991] ==================================================================
[   12.055422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.055671] Write of size 1 at addr ffff8881003300c9 by task kunit_try_catch/175
[   12.055902] 
[   12.055995] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.056036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.056046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.056066] Call Trace:
[   12.056078]  <TASK>
[   12.056092]  dump_stack_lvl+0x73/0xb0
[   12.056119]  print_report+0xd1/0x650
[   12.056141]  ? __virt_addr_valid+0x1db/0x2d0
[   12.056163]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.056187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.056209]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.056234]  kasan_report+0x141/0x180
[   12.056256]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.056285]  __asan_report_store1_noabort+0x1b/0x30
[   12.056312]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.056338]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.056365]  ? finish_task_switch.isra.0+0x153/0x700
[   12.056388]  ? __switch_to+0x47/0xf50
[   12.056413]  ? __schedule+0x10cc/0x2b60
[   12.056434]  ? __pfx_read_tsc+0x10/0x10
[   12.056458]  krealloc_less_oob+0x1c/0x30
[   12.056480]  kunit_try_run_case+0x1a5/0x480
[   12.056503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.056525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.056549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.056572]  ? __kthread_parkme+0x82/0x180
[   12.056591]  ? preempt_count_sub+0x50/0x80
[   12.056614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.056637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.056661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.056685]  kthread+0x337/0x6f0
[   12.056703]  ? trace_preempt_on+0x20/0xc0
[   12.056727]  ? __pfx_kthread+0x10/0x10
[   12.056746]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.056767]  ? calculate_sigpending+0x7b/0xa0
[   12.056791]  ? __pfx_kthread+0x10/0x10
[   12.056812]  ret_from_fork+0x116/0x1d0
[   12.056829]  ? __pfx_kthread+0x10/0x10
[   12.056849]  ret_from_fork_asm+0x1a/0x30
[   12.056880]  </TASK>
[   12.056889] 
[   12.079692] Allocated by task 175:
[   12.079843]  kasan_save_stack+0x45/0x70
[   12.080012]  kasan_save_track+0x18/0x40
[   12.080149]  kasan_save_alloc_info+0x3b/0x50
[   12.080299]  __kasan_krealloc+0x190/0x1f0
[   12.080438]  krealloc_noprof+0xf3/0x340
[   12.080571]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.080732]  krealloc_less_oob+0x1c/0x30
[   12.080870]  kunit_try_run_case+0x1a5/0x480
[   12.081894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.082703]  kthread+0x337/0x6f0
[   12.083372]  ret_from_fork+0x116/0x1d0
[   12.084025]  ret_from_fork_asm+0x1a/0x30
[   12.084862] 
[   12.085157] The buggy address belongs to the object at ffff888100330000
[   12.085157]  which belongs to the cache kmalloc-256 of size 256
[   12.086940] The buggy address is located 0 bytes to the right of
[   12.086940]  allocated 201-byte region [ffff888100330000, ffff8881003300c9)
[   12.087579] 
[   12.087657] The buggy address belongs to the physical page:
[   12.087993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100330
[   12.088743] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.089450] flags: 0x200000000000040(head|node=0|zone=2)
[   12.090108] page_type: f5(slab)
[   12.090267] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.090498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.090732] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.091464] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.092315] head: 0200000000000001 ffffea000400cc01 00000000ffffffff 00000000ffffffff
[   12.093005] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.093685] page dumped because: kasan: bad access detected
[   12.094108] 
[   12.094190] Memory state around the buggy address:
[   12.094346]  ffff88810032ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.094571]  ffff888100330000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.094815] >ffff888100330080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.095103]                                               ^
[   12.095305]  ffff888100330100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.095599]  ffff888100330180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.095955] ==================================================================
[   12.249747] ==================================================================
[   12.249998] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.250407] Write of size 1 at addr ffff888102a3e0d0 by task kunit_try_catch/179
[   12.250756] 
[   12.250865] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.250905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.250915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.250946] Call Trace:
[   12.250960]  <TASK>
[   12.250974]  dump_stack_lvl+0x73/0xb0
[   12.251002]  print_report+0xd1/0x650
[   12.251023]  ? __virt_addr_valid+0x1db/0x2d0
[   12.251045]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.251069]  ? kasan_addr_to_slab+0x11/0xa0
[   12.251089]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.251113]  kasan_report+0x141/0x180
[   12.251134]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.251163]  __asan_report_store1_noabort+0x1b/0x30
[   12.251188]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.251213]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.251238]  ? finish_task_switch.isra.0+0x153/0x700
[   12.251260]  ? __switch_to+0x47/0xf50
[   12.251284]  ? __schedule+0x10cc/0x2b60
[   12.251306]  ? __pfx_read_tsc+0x10/0x10
[   12.251329]  krealloc_large_less_oob+0x1c/0x30
[   12.251352]  kunit_try_run_case+0x1a5/0x480
[   12.251376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.251398]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.251421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.251444]  ? __kthread_parkme+0x82/0x180
[   12.251464]  ? preempt_count_sub+0x50/0x80
[   12.251487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.251511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.251534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.251559]  kthread+0x337/0x6f0
[   12.251577]  ? trace_preempt_on+0x20/0xc0
[   12.251599]  ? __pfx_kthread+0x10/0x10
[   12.251619]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.251640]  ? calculate_sigpending+0x7b/0xa0
[   12.251663]  ? __pfx_kthread+0x10/0x10
[   12.251684]  ret_from_fork+0x116/0x1d0
[   12.251702]  ? __pfx_kthread+0x10/0x10
[   12.251721]  ret_from_fork_asm+0x1a/0x30
[   12.251753]  </TASK>
[   12.251763] 
[   12.259529] The buggy address belongs to the physical page:
[   12.259716] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3c
[   12.260056] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.260399] flags: 0x200000000000040(head|node=0|zone=2)
[   12.260644] page_type: f8(unknown)
[   12.260817] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.261814] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.262107] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.262358] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.262601] head: 0200000000000002 ffffea00040a8f01 00000000ffffffff 00000000ffffffff
[   12.262832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.264215] page dumped because: kasan: bad access detected
[   12.264906] 
[   12.265491] Memory state around the buggy address:
[   12.266233]  ffff888102a3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.267314]  ffff888102a3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.267996] >ffff888102a3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.268854]                                                  ^
[   12.269061]  ffff888102a3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.269277]  ffff888102a3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.269490] ==================================================================
[   12.150244] ==================================================================
[   12.150595] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.150945] Write of size 1 at addr ffff8881003300ea by task kunit_try_catch/175
[   12.151327] 
[   12.151426] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.151467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.151478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.151497] Call Trace:
[   12.151512]  <TASK>
[   12.151528]  dump_stack_lvl+0x73/0xb0
[   12.151555]  print_report+0xd1/0x650
[   12.151575]  ? __virt_addr_valid+0x1db/0x2d0
[   12.151598]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.151621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.151643]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.151667]  kasan_report+0x141/0x180
[   12.151688]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.151717]  __asan_report_store1_noabort+0x1b/0x30
[   12.151741]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.151767]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.151811]  ? finish_task_switch.isra.0+0x153/0x700
[   12.151833]  ? __switch_to+0x47/0xf50
[   12.151857]  ? __schedule+0x10cc/0x2b60
[   12.151878]  ? __pfx_read_tsc+0x10/0x10
[   12.151901]  krealloc_less_oob+0x1c/0x30
[   12.151930]  kunit_try_run_case+0x1a5/0x480
[   12.151954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.151976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.152062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.152090]  ? __kthread_parkme+0x82/0x180
[   12.152109]  ? preempt_count_sub+0x50/0x80
[   12.152132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.152156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.152180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.152204]  kthread+0x337/0x6f0
[   12.152222]  ? trace_preempt_on+0x20/0xc0
[   12.152245]  ? __pfx_kthread+0x10/0x10
[   12.152265]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.152286]  ? calculate_sigpending+0x7b/0xa0
[   12.152309]  ? __pfx_kthread+0x10/0x10
[   12.152330]  ret_from_fork+0x116/0x1d0
[   12.152348]  ? __pfx_kthread+0x10/0x10
[   12.152368]  ret_from_fork_asm+0x1a/0x30
[   12.152399]  </TASK>
[   12.152408] 
[   12.160160] Allocated by task 175:
[   12.160336]  kasan_save_stack+0x45/0x70
[   12.160519]  kasan_save_track+0x18/0x40
[   12.160698]  kasan_save_alloc_info+0x3b/0x50
[   12.160888]  __kasan_krealloc+0x190/0x1f0
[   12.161249]  krealloc_noprof+0xf3/0x340
[   12.161433]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.161656]  krealloc_less_oob+0x1c/0x30
[   12.161827]  kunit_try_run_case+0x1a5/0x480
[   12.162147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.162346]  kthread+0x337/0x6f0
[   12.162466]  ret_from_fork+0x116/0x1d0
[   12.162601]  ret_from_fork_asm+0x1a/0x30
[   12.162739] 
[   12.162832] The buggy address belongs to the object at ffff888100330000
[   12.162832]  which belongs to the cache kmalloc-256 of size 256
[   12.163453] The buggy address is located 33 bytes to the right of
[   12.163453]  allocated 201-byte region [ffff888100330000, ffff8881003300c9)
[   12.164109] 
[   12.164206] The buggy address belongs to the physical page:
[   12.164463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100330
[   12.164807] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.165263] flags: 0x200000000000040(head|node=0|zone=2)
[   12.165521] page_type: f5(slab)
[   12.165682] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.165983] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.166306] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.166566] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.166941] head: 0200000000000001 ffffea000400cc01 00000000ffffffff 00000000ffffffff
[   12.167377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.167726] page dumped because: kasan: bad access detected
[   12.168787] 
[   12.168933] Memory state around the buggy address:
[   12.169488]  ffff88810032ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.169768]  ffff888100330000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.170354] >ffff888100330080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.170626]                                                           ^
[   12.171172]  ffff888100330100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.171477]  ffff888100330180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.171769] ==================================================================
[   12.232822] ==================================================================
[   12.233454] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.233769] Write of size 1 at addr ffff888102a3e0c9 by task kunit_try_catch/179
[   12.234092] 
[   12.234249] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.234291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.234301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.234320] Call Trace:
[   12.234331]  <TASK>
[   12.234345]  dump_stack_lvl+0x73/0xb0
[   12.234373]  print_report+0xd1/0x650
[   12.234394]  ? __virt_addr_valid+0x1db/0x2d0
[   12.234416]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.234440]  ? kasan_addr_to_slab+0x11/0xa0
[   12.234460]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.234484]  kasan_report+0x141/0x180
[   12.234510]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.234542]  __asan_report_store1_noabort+0x1b/0x30
[   12.234567]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.234593]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.234619]  ? finish_task_switch.isra.0+0x153/0x700
[   12.234642]  ? __switch_to+0x47/0xf50
[   12.234666]  ? __schedule+0x10cc/0x2b60
[   12.234688]  ? __pfx_read_tsc+0x10/0x10
[   12.234711]  krealloc_large_less_oob+0x1c/0x30
[   12.234734]  kunit_try_run_case+0x1a5/0x480
[   12.234758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.234781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.234818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.234842]  ? __kthread_parkme+0x82/0x180
[   12.234861]  ? preempt_count_sub+0x50/0x80
[   12.234884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.234908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.234942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.234966]  kthread+0x337/0x6f0
[   12.234984]  ? trace_preempt_on+0x20/0xc0
[   12.235007]  ? __pfx_kthread+0x10/0x10
[   12.235027]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.235049]  ? calculate_sigpending+0x7b/0xa0
[   12.235072]  ? __pfx_kthread+0x10/0x10
[   12.235094]  ret_from_fork+0x116/0x1d0
[   12.235111]  ? __pfx_kthread+0x10/0x10
[   12.235131]  ret_from_fork_asm+0x1a/0x30
[   12.235163]  </TASK>
[   12.235172] 
[   12.243124] The buggy address belongs to the physical page:
[   12.243306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3c
[   12.243663] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.244090] flags: 0x200000000000040(head|node=0|zone=2)
[   12.244294] page_type: f8(unknown)
[   12.244466] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.244712] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.245191] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.245499] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.245798] head: 0200000000000002 ffffea00040a8f01 00000000ffffffff 00000000ffffffff
[   12.246242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.246471] page dumped because: kasan: bad access detected
[   12.246837] 
[   12.246946] Memory state around the buggy address:
[   12.247169]  ffff888102a3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.247556]  ffff888102a3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.247773] >ffff888102a3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.247996]                                               ^
[   12.248210]  ffff888102a3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.249017]  ffff888102a3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.249449] ==================================================================
[   12.096847] ==================================================================
[   12.097270] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.097989] Write of size 1 at addr ffff8881003300d0 by task kunit_try_catch/175
[   12.098546] 
[   12.098662] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.098706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.098717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.098736] Call Trace:
[   12.098753]  <TASK>
[   12.098769]  dump_stack_lvl+0x73/0xb0
[   12.098800]  print_report+0xd1/0x650
[   12.098821]  ? __virt_addr_valid+0x1db/0x2d0
[   12.098844]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.098892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.098915]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.098949]  kasan_report+0x141/0x180
[   12.098970]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.098999]  __asan_report_store1_noabort+0x1b/0x30
[   12.099090]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.099120]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.099144]  ? finish_task_switch.isra.0+0x153/0x700
[   12.099167]  ? __switch_to+0x47/0xf50
[   12.099191]  ? __schedule+0x10cc/0x2b60
[   12.099213]  ? __pfx_read_tsc+0x10/0x10
[   12.099236]  krealloc_less_oob+0x1c/0x30
[   12.099257]  kunit_try_run_case+0x1a5/0x480
[   12.099306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.099328]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.099352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.099375]  ? __kthread_parkme+0x82/0x180
[   12.099396]  ? preempt_count_sub+0x50/0x80
[   12.099418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.099442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.099484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.099509]  kthread+0x337/0x6f0
[   12.099527]  ? trace_preempt_on+0x20/0xc0
[   12.099549]  ? __pfx_kthread+0x10/0x10
[   12.099569]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.099590]  ? calculate_sigpending+0x7b/0xa0
[   12.099613]  ? __pfx_kthread+0x10/0x10
[   12.099634]  ret_from_fork+0x116/0x1d0
[   12.099652]  ? __pfx_kthread+0x10/0x10
[   12.099672]  ret_from_fork_asm+0x1a/0x30
[   12.099703]  </TASK>
[   12.099713] 
[   12.107780] Allocated by task 175:
[   12.107910]  kasan_save_stack+0x45/0x70
[   12.108121]  kasan_save_track+0x18/0x40
[   12.108460]  kasan_save_alloc_info+0x3b/0x50
[   12.108703]  __kasan_krealloc+0x190/0x1f0
[   12.108903]  krealloc_noprof+0xf3/0x340
[   12.109055]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.109376]  krealloc_less_oob+0x1c/0x30
[   12.109704]  kunit_try_run_case+0x1a5/0x480
[   12.110219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.110428]  kthread+0x337/0x6f0
[   12.110592]  ret_from_fork+0x116/0x1d0
[   12.110819]  ret_from_fork_asm+0x1a/0x30
[   12.111028] 
[   12.111102] The buggy address belongs to the object at ffff888100330000
[   12.111102]  which belongs to the cache kmalloc-256 of size 256
[   12.111567] The buggy address is located 7 bytes to the right of
[   12.111567]  allocated 201-byte region [ffff888100330000, ffff8881003300c9)
[   12.112405] 
[   12.112526] The buggy address belongs to the physical page:
[   12.112724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100330
[   12.113178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.113441] flags: 0x200000000000040(head|node=0|zone=2)
[   12.113669] page_type: f5(slab)
[   12.113833] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.114239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.114739] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.115163] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.115534] head: 0200000000000001 ffffea000400cc01 00000000ffffffff 00000000ffffffff
[   12.115820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.116290] page dumped because: kasan: bad access detected
[   12.116518] 
[   12.116586] Memory state around the buggy address:
[   12.116823]  ffff88810032ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.117289]  ffff888100330000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.117575] >ffff888100330080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.117951]                                                  ^
[   12.118411]  ffff888100330100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.118707]  ffff888100330180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.119186] ==================================================================
[   12.172576] ==================================================================
[   12.172833] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.173473] Write of size 1 at addr ffff8881003300eb by task kunit_try_catch/175
[   12.173772] 
[   12.173862] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.173901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.173912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.173941] Call Trace:
[   12.173955]  <TASK>
[   12.173969]  dump_stack_lvl+0x73/0xb0
[   12.173997]  print_report+0xd1/0x650
[   12.174017]  ? __virt_addr_valid+0x1db/0x2d0
[   12.174040]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.174063]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.174086]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.174115]  kasan_report+0x141/0x180
[   12.174136]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.174165]  __asan_report_store1_noabort+0x1b/0x30
[   12.174189]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.174215]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.174240]  ? finish_task_switch.isra.0+0x153/0x700
[   12.174262]  ? __switch_to+0x47/0xf50
[   12.174287]  ? __schedule+0x10cc/0x2b60
[   12.174308]  ? __pfx_read_tsc+0x10/0x10
[   12.174331]  krealloc_less_oob+0x1c/0x30
[   12.174352]  kunit_try_run_case+0x1a5/0x480
[   12.174375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.174397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.174420]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.174444]  ? __kthread_parkme+0x82/0x180
[   12.174463]  ? preempt_count_sub+0x50/0x80
[   12.174486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.174515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.174539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.174564]  kthread+0x337/0x6f0
[   12.174582]  ? trace_preempt_on+0x20/0xc0
[   12.174604]  ? __pfx_kthread+0x10/0x10
[   12.174624]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.174645]  ? calculate_sigpending+0x7b/0xa0
[   12.174668]  ? __pfx_kthread+0x10/0x10
[   12.174689]  ret_from_fork+0x116/0x1d0
[   12.174706]  ? __pfx_kthread+0x10/0x10
[   12.174726]  ret_from_fork_asm+0x1a/0x30
[   12.174757]  </TASK>
[   12.174766] 
[   12.182786] Allocated by task 175:
[   12.182934]  kasan_save_stack+0x45/0x70
[   12.183082]  kasan_save_track+0x18/0x40
[   12.183509]  kasan_save_alloc_info+0x3b/0x50
[   12.183726]  __kasan_krealloc+0x190/0x1f0
[   12.183948]  krealloc_noprof+0xf3/0x340
[   12.184233]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.184440]  krealloc_less_oob+0x1c/0x30
[   12.184579]  kunit_try_run_case+0x1a5/0x480
[   12.184722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.184958]  kthread+0x337/0x6f0
[   12.185132]  ret_from_fork+0x116/0x1d0
[   12.185324]  ret_from_fork_asm+0x1a/0x30
[   12.185522] 
[   12.185842] The buggy address belongs to the object at ffff888100330000
[   12.185842]  which belongs to the cache kmalloc-256 of size 256
[   12.186404] The buggy address is located 34 bytes to the right of
[   12.186404]  allocated 201-byte region [ffff888100330000, ffff8881003300c9)
[   12.186808] 
[   12.186983] The buggy address belongs to the physical page:
[   12.187373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100330
[   12.187906] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.188293] flags: 0x200000000000040(head|node=0|zone=2)
[   12.188470] page_type: f5(slab)
[   12.188596] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.188935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.189270] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.189809] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.190209] head: 0200000000000001 ffffea000400cc01 00000000ffffffff 00000000ffffffff
[   12.190533] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.190759] page dumped because: kasan: bad access detected
[   12.190963] 
[   12.191058] Memory state around the buggy address:
[   12.191278]  ffff88810032ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.191719]  ffff888100330000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.192019] >ffff888100330080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.192362]                                                           ^
[   12.192606]  ffff888100330100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.192928]  ffff888100330180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.193157] ==================================================================
[   12.269789] ==================================================================
[   12.270652] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.271518] Write of size 1 at addr ffff888102a3e0da by task kunit_try_catch/179
[   12.272946] 
[   12.273310] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.273356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.273367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.273386] Call Trace:
[   12.273401]  <TASK>
[   12.273424]  dump_stack_lvl+0x73/0xb0
[   12.273454]  print_report+0xd1/0x650
[   12.273683]  ? __virt_addr_valid+0x1db/0x2d0
[   12.273707]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.273731]  ? kasan_addr_to_slab+0x11/0xa0
[   12.273762]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.273786]  kasan_report+0x141/0x180
[   12.273807]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.273836]  __asan_report_store1_noabort+0x1b/0x30
[   12.273860]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.273886]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.273911]  ? finish_task_switch.isra.0+0x153/0x700
[   12.273944]  ? __switch_to+0x47/0xf50
[   12.273968]  ? __schedule+0x10cc/0x2b60
[   12.273990]  ? __pfx_read_tsc+0x10/0x10
[   12.274013]  krealloc_large_less_oob+0x1c/0x30
[   12.274036]  kunit_try_run_case+0x1a5/0x480
[   12.274060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.274082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.274105]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.274128]  ? __kthread_parkme+0x82/0x180
[   12.274148]  ? preempt_count_sub+0x50/0x80
[   12.274170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.274194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.274218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.274242]  kthread+0x337/0x6f0
[   12.274261]  ? trace_preempt_on+0x20/0xc0
[   12.274284]  ? __pfx_kthread+0x10/0x10
[   12.274304]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.274325]  ? calculate_sigpending+0x7b/0xa0
[   12.274348]  ? __pfx_kthread+0x10/0x10
[   12.274369]  ret_from_fork+0x116/0x1d0
[   12.274386]  ? __pfx_kthread+0x10/0x10
[   12.274406]  ret_from_fork_asm+0x1a/0x30
[   12.274438]  </TASK>
[   12.274447] 
[   12.287181] The buggy address belongs to the physical page:
[   12.287431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3c
[   12.287954] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.288529] flags: 0x200000000000040(head|node=0|zone=2)
[   12.288949] page_type: f8(unknown)
[   12.289147] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.289659] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.290426] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.290750] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.291314] head: 0200000000000002 ffffea00040a8f01 00000000ffffffff 00000000ffffffff
[   12.291783] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.292237] page dumped because: kasan: bad access detected
[   12.292458] 
[   12.292554] Memory state around the buggy address:
[   12.293145]  ffff888102a3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.293447]  ffff888102a3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.293988] >ffff888102a3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.294593]                                                     ^
[   12.294979]  ffff888102a3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.295518]  ffff888102a3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.296153] ==================================================================
[   12.120998] ==================================================================
[   12.121433] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.121679] Write of size 1 at addr ffff8881003300da by task kunit_try_catch/175
[   12.122367] 
[   12.122731] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.122773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.122784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.122803] Call Trace:
[   12.122814]  <TASK>
[   12.122828]  dump_stack_lvl+0x73/0xb0
[   12.122872]  print_report+0xd1/0x650
[   12.122902]  ? __virt_addr_valid+0x1db/0x2d0
[   12.122938]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.122961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.122983]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.123007]  kasan_report+0x141/0x180
[   12.123030]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.123059]  __asan_report_store1_noabort+0x1b/0x30
[   12.123084]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.123110]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.123134]  ? finish_task_switch.isra.0+0x153/0x700
[   12.123155]  ? __switch_to+0x47/0xf50
[   12.123180]  ? __schedule+0x10cc/0x2b60
[   12.123202]  ? __pfx_read_tsc+0x10/0x10
[   12.123225]  krealloc_less_oob+0x1c/0x30
[   12.123246]  kunit_try_run_case+0x1a5/0x480
[   12.123269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.123291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.123313]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.123336]  ? __kthread_parkme+0x82/0x180
[   12.123355]  ? preempt_count_sub+0x50/0x80
[   12.123378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.123402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.123426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.123450]  kthread+0x337/0x6f0
[   12.123468]  ? trace_preempt_on+0x20/0xc0
[   12.123490]  ? __pfx_kthread+0x10/0x10
[   12.123510]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.123531]  ? calculate_sigpending+0x7b/0xa0
[   12.123556]  ? __pfx_kthread+0x10/0x10
[   12.123580]  ret_from_fork+0x116/0x1d0
[   12.123597]  ? __pfx_kthread+0x10/0x10
[   12.123617]  ret_from_fork_asm+0x1a/0x30
[   12.123648]  </TASK>
[   12.123657] 
[   12.138342] Allocated by task 175:
[   12.138534]  kasan_save_stack+0x45/0x70
[   12.139130]  kasan_save_track+0x18/0x40
[   12.139495]  kasan_save_alloc_info+0x3b/0x50
[   12.139710]  __kasan_krealloc+0x190/0x1f0
[   12.140004]  krealloc_noprof+0xf3/0x340
[   12.140205]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.140561]  krealloc_less_oob+0x1c/0x30
[   12.140789]  kunit_try_run_case+0x1a5/0x480
[   12.141238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.141548]  kthread+0x337/0x6f0
[   12.141716]  ret_from_fork+0x116/0x1d0
[   12.141905]  ret_from_fork_asm+0x1a/0x30
[   12.142089] 
[   12.142185] The buggy address belongs to the object at ffff888100330000
[   12.142185]  which belongs to the cache kmalloc-256 of size 256
[   12.142705] The buggy address is located 17 bytes to the right of
[   12.142705]  allocated 201-byte region [ffff888100330000, ffff8881003300c9)
[   12.143387] 
[   12.143488] The buggy address belongs to the physical page:
[   12.143714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100330
[   12.143980] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.144388] flags: 0x200000000000040(head|node=0|zone=2)
[   12.144647] page_type: f5(slab)
[   12.144844] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.145365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.145673] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.145995] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.146436] head: 0200000000000001 ffffea000400cc01 00000000ffffffff 00000000ffffffff
[   12.146749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.147181] page dumped because: kasan: bad access detected
[   12.147397] 
[   12.147491] Memory state around the buggy address:
[   12.147663]  ffff88810032ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.148086]  ffff888100330000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.148352] >ffff888100330080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.148666]                                                     ^
[   12.148908]  ffff888100330100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.149420]  ffff888100330180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.149694] ==================================================================
[   12.296598] ==================================================================
[   12.297232] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.297776] Write of size 1 at addr ffff888102a3e0ea by task kunit_try_catch/179
[   12.298287] 
[   12.298616] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.298662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.298674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.298693] Call Trace:
[   12.298705]  <TASK>
[   12.298717]  dump_stack_lvl+0x73/0xb0
[   12.298746]  print_report+0xd1/0x650
[   12.298769]  ? __virt_addr_valid+0x1db/0x2d0
[   12.298791]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.298815]  ? kasan_addr_to_slab+0x11/0xa0
[   12.298836]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.298860]  kasan_report+0x141/0x180
[   12.298882]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.298912]  __asan_report_store1_noabort+0x1b/0x30
[   12.298949]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.298975]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.298999]  ? finish_task_switch.isra.0+0x153/0x700
[   12.299160]  ? __switch_to+0x47/0xf50
[   12.299186]  ? __schedule+0x10cc/0x2b60
[   12.299208]  ? __pfx_read_tsc+0x10/0x10
[   12.299232]  krealloc_large_less_oob+0x1c/0x30
[   12.299255]  kunit_try_run_case+0x1a5/0x480
[   12.299278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.299301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.299324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.299348]  ? __kthread_parkme+0x82/0x180
[   12.299367]  ? preempt_count_sub+0x50/0x80
[   12.299390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.299414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.299437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.299462]  kthread+0x337/0x6f0
[   12.299480]  ? trace_preempt_on+0x20/0xc0
[   12.299502]  ? __pfx_kthread+0x10/0x10
[   12.299522]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.299543]  ? calculate_sigpending+0x7b/0xa0
[   12.299566]  ? __pfx_kthread+0x10/0x10
[   12.299587]  ret_from_fork+0x116/0x1d0
[   12.299605]  ? __pfx_kthread+0x10/0x10
[   12.299625]  ret_from_fork_asm+0x1a/0x30
[   12.299656]  </TASK>
[   12.299666] 
[   12.308559] The buggy address belongs to the physical page:
[   12.308785] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3c
[   12.309084] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.309315] flags: 0x200000000000040(head|node=0|zone=2)
[   12.309561] page_type: f8(unknown)
[   12.309764] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.310333] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.310636] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.310866] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.311226] head: 0200000000000002 ffffea00040a8f01 00000000ffffffff 00000000ffffffff
[   12.311570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.311844] page dumped because: kasan: bad access detected
[   12.312194] 
[   12.312291] Memory state around the buggy address:
[   12.312503]  ffff888102a3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.312716]  ffff888102a3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.313051] >ffff888102a3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.313372]                                                           ^
[   12.313728]  ffff888102a3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.314054]  ffff888102a3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.314358] ==================================================================
[   12.314659] ==================================================================
[   12.315117] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.315525] Write of size 1 at addr ffff888102a3e0eb by task kunit_try_catch/179
[   12.316041] 
[   12.316227] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.316269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.316279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.316297] Call Trace:
[   12.316311]  <TASK>
[   12.316325]  dump_stack_lvl+0x73/0xb0
[   12.316353]  print_report+0xd1/0x650
[   12.316374]  ? __virt_addr_valid+0x1db/0x2d0
[   12.316397]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.316422]  ? kasan_addr_to_slab+0x11/0xa0
[   12.316442]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.316466]  kasan_report+0x141/0x180
[   12.316487]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.316516]  __asan_report_store1_noabort+0x1b/0x30
[   12.316540]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.316566]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.316590]  ? finish_task_switch.isra.0+0x153/0x700
[   12.316612]  ? __switch_to+0x47/0xf50
[   12.316636]  ? __schedule+0x10cc/0x2b60
[   12.316657]  ? __pfx_read_tsc+0x10/0x10
[   12.316680]  krealloc_large_less_oob+0x1c/0x30
[   12.316703]  kunit_try_run_case+0x1a5/0x480
[   12.316727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.316749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.316771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.316794]  ? __kthread_parkme+0x82/0x180
[   12.316814]  ? preempt_count_sub+0x50/0x80
[   12.316836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.316860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.316884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.316908]  kthread+0x337/0x6f0
[   12.316939]  ? trace_preempt_on+0x20/0xc0
[   12.316975]  ? __pfx_kthread+0x10/0x10
[   12.316995]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.317016]  ? calculate_sigpending+0x7b/0xa0
[   12.317040]  ? __pfx_kthread+0x10/0x10
[   12.317060]  ret_from_fork+0x116/0x1d0
[   12.317078]  ? __pfx_kthread+0x10/0x10
[   12.317109]  ret_from_fork_asm+0x1a/0x30
[   12.317141]  </TASK>
[   12.317150] 
[   12.325226] The buggy address belongs to the physical page:
[   12.325458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3c
[   12.325789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.326907] flags: 0x200000000000040(head|node=0|zone=2)
[   12.327512] page_type: f8(unknown)
[   12.327666] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.328180] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.328519] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.328973] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.329300] head: 0200000000000002 ffffea00040a8f01 00000000ffffffff 00000000ffffffff
[   12.329640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.330128] page dumped because: kasan: bad access detected
[   12.330463] 
[   12.330567] Memory state around the buggy address:
[   12.330771]  ffff888102a3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.331272]  ffff888102a3e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.331574] >ffff888102a3e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.332019]                                                           ^
[   12.332306]  ffff888102a3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.332709]  ffff888102a3e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.333215] ==================================================================