Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.259693] ==================================================================
[   19.260040] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.260709] Write of size 1 at addr fff00000c79060ea by task kunit_try_catch/163
[   19.260848] 
[   19.260937] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.261199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.261290] Hardware name: linux,dummy-virt (DT)
[   19.261641] Call trace:
[   19.261933]  show_stack+0x20/0x38 (C)
[   19.262138]  dump_stack_lvl+0x8c/0xd0
[   19.262277]  print_report+0x118/0x608
[   19.262445]  kasan_report+0xdc/0x128
[   19.262628]  __asan_report_store1_noabort+0x20/0x30
[   19.262784]  krealloc_less_oob_helper+0xae4/0xc50
[   19.263206]  krealloc_large_less_oob+0x20/0x38
[   19.263361]  kunit_try_run_case+0x170/0x3f0
[   19.263662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.263885]  kthread+0x328/0x630
[   19.264376]  ret_from_fork+0x10/0x20
[   19.264578] 
[   19.264645] The buggy address belongs to the physical page:
[   19.264736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904
[   19.264964] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.265152] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.265541] page_type: f8(unknown)
[   19.265811] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.265966] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.266189] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.266380] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.266575] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff
[   19.267121] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.267301] page dumped because: kasan: bad access detected
[   19.267407] 
[   19.267462] Memory state around the buggy address:
[   19.267623]  fff00000c7905f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.267758]  fff00000c7906000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.268111] >fff00000c7906080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.268502]                                                           ^
[   19.268662]  fff00000c7906100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.268816]  fff00000c7906180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.268931] ==================================================================
[   19.219640] ==================================================================
[   19.219788] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.219951] Write of size 1 at addr fff00000c79060c9 by task kunit_try_catch/163
[   19.220072] 
[   19.220160] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.220358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.220420] Hardware name: linux,dummy-virt (DT)
[   19.220493] Call trace:
[   19.220545]  show_stack+0x20/0x38 (C)
[   19.220664]  dump_stack_lvl+0x8c/0xd0
[   19.220773]  print_report+0x118/0x608
[   19.221161]  kasan_report+0xdc/0x128
[   19.221294]  __asan_report_store1_noabort+0x20/0x30
[   19.221421]  krealloc_less_oob_helper+0xa48/0xc50
[   19.221681]  krealloc_large_less_oob+0x20/0x38
[   19.221844]  kunit_try_run_case+0x170/0x3f0
[   19.221958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.222060]  kthread+0x328/0x630
[   19.222416]  ret_from_fork+0x10/0x20
[   19.222570] 
[   19.222631] The buggy address belongs to the physical page:
[   19.222715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904
[   19.222862] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.223058] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.223441] page_type: f8(unknown)
[   19.223549] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.224004] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.224218] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.224548] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.224723] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff
[   19.224910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.225102] page dumped because: kasan: bad access detected
[   19.225204] 
[   19.225252] Memory state around the buggy address:
[   19.225320]  fff00000c7905f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.225410]  fff00000c7906000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.225495] >fff00000c7906080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.225574]                                               ^
[   19.225659]  fff00000c7906100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.225763]  fff00000c7906180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.226203] ==================================================================
[   19.242715] ==================================================================
[   19.244291] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.244883] Write of size 1 at addr fff00000c79060da by task kunit_try_catch/163
[   19.245482] 
[   19.245978] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.246779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.246867] Hardware name: linux,dummy-virt (DT)
[   19.247483] Call trace:
[   19.247547]  show_stack+0x20/0x38 (C)
[   19.247740]  dump_stack_lvl+0x8c/0xd0
[   19.248405]  print_report+0x118/0x608
[   19.249006]  kasan_report+0xdc/0x128
[   19.249186]  __asan_report_store1_noabort+0x20/0x30
[   19.249566]  krealloc_less_oob_helper+0xa80/0xc50
[   19.249969]  krealloc_large_less_oob+0x20/0x38
[   19.250115]  kunit_try_run_case+0x170/0x3f0
[   19.251014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.251240]  kthread+0x328/0x630
[   19.251815]  ret_from_fork+0x10/0x20
[   19.252331] 
[   19.252505] The buggy address belongs to the physical page:
[   19.252711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904
[   19.252942] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.253056] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.253190] page_type: f8(unknown)
[   19.253951] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.254214] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.254479] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.254833] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.255350] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff
[   19.255664] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.256109] page dumped because: kasan: bad access detected
[   19.256335] 
[   19.256452] Memory state around the buggy address:
[   19.256540]  fff00000c7905f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.256723]  fff00000c7906000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.256858] >fff00000c7906080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.257298]                                                     ^
[   19.257472]  fff00000c7906100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.257640]  fff00000c7906180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.257793] ==================================================================
[   19.227875] ==================================================================
[   19.228015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.228185] Write of size 1 at addr fff00000c79060d0 by task kunit_try_catch/163
[   19.228344] 
[   19.228426] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.229158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.229244] Hardware name: linux,dummy-virt (DT)
[   19.229314] Call trace:
[   19.229367]  show_stack+0x20/0x38 (C)
[   19.229490]  dump_stack_lvl+0x8c/0xd0
[   19.230245]  print_report+0x118/0x608
[   19.230482]  kasan_report+0xdc/0x128
[   19.230610]  __asan_report_store1_noabort+0x20/0x30
[   19.230723]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.230845]  krealloc_large_less_oob+0x20/0x38
[   19.231663]  kunit_try_run_case+0x170/0x3f0
[   19.232457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.232765]  kthread+0x328/0x630
[   19.232990]  ret_from_fork+0x10/0x20
[   19.233188] 
[   19.233306] The buggy address belongs to the physical page:
[   19.233751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904
[   19.234360] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.234558] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.234703] page_type: f8(unknown)
[   19.234804] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.234999] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.235812] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.236098] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.236625] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff
[   19.236876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.237106] page dumped because: kasan: bad access detected
[   19.237177] 
[   19.237219] Memory state around the buggy address:
[   19.237289]  fff00000c7905f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.237369]  fff00000c7906000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.237458] >fff00000c7906080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.237544]                                                  ^
[   19.238675]  fff00000c7906100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.239269]  fff00000c7906180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.239882] ==================================================================
[   19.146790] ==================================================================
[   19.146917] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.147395] Write of size 1 at addr fff00000c440aaea by task kunit_try_catch/159
[   19.147587] 
[   19.147676] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.147884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.147943] Hardware name: linux,dummy-virt (DT)
[   19.148008] Call trace:
[   19.148059]  show_stack+0x20/0x38 (C)
[   19.148167]  dump_stack_lvl+0x8c/0xd0
[   19.148268]  print_report+0x118/0x608
[   19.148369]  kasan_report+0xdc/0x128
[   19.148468]  __asan_report_store1_noabort+0x20/0x30
[   19.148581]  krealloc_less_oob_helper+0xae4/0xc50
[   19.148693]  krealloc_less_oob+0x20/0x38
[   19.150426]  kunit_try_run_case+0x170/0x3f0
[   19.150757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.151576]  kthread+0x328/0x630
[   19.151850]  ret_from_fork+0x10/0x20
[   19.152087] 
[   19.152191] Allocated by task 159:
[   19.152277]  kasan_save_stack+0x3c/0x68
[   19.152377]  kasan_save_track+0x20/0x40
[   19.152768]  kasan_save_alloc_info+0x40/0x58
[   19.153168]  __kasan_krealloc+0x118/0x178
[   19.153518]  krealloc_noprof+0x128/0x360
[   19.153597]  krealloc_less_oob_helper+0x168/0xc50
[   19.153971]  krealloc_less_oob+0x20/0x38
[   19.154333]  kunit_try_run_case+0x170/0x3f0
[   19.154421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.155294]  kthread+0x328/0x630
[   19.155718]  ret_from_fork+0x10/0x20
[   19.155909] 
[   19.155965] The buggy address belongs to the object at fff00000c440aa00
[   19.155965]  which belongs to the cache kmalloc-256 of size 256
[   19.156109] The buggy address is located 33 bytes to the right of
[   19.156109]  allocated 201-byte region [fff00000c440aa00, fff00000c440aac9)
[   19.156398] 
[   19.156464] The buggy address belongs to the physical page:
[   19.156868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10440a
[   19.157476] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.158216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.158486] page_type: f5(slab)
[   19.158606] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.158768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.158899] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.159010] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.159120] head: 0bfffe0000000001 ffffc1ffc3110281 00000000ffffffff 00000000ffffffff
[   19.159228] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.159318] page dumped because: kasan: bad access detected
[   19.160699] 
[   19.161057] Memory state around the buggy address:
[   19.161285]  fff00000c440a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.161853]  fff00000c440aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.162710] >fff00000c440aa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.162811]                                                           ^
[   19.163273]  fff00000c440ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.163900]  fff00000c440ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.164245] ==================================================================
[   19.166639] ==================================================================
[   19.166707] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.166783] Write of size 1 at addr fff00000c440aaeb by task kunit_try_catch/159
[   19.166927] 
[   19.167033] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.167272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.167354] Hardware name: linux,dummy-virt (DT)
[   19.167438] Call trace:
[   19.167491]  show_stack+0x20/0x38 (C)
[   19.167801]  dump_stack_lvl+0x8c/0xd0
[   19.168244]  print_report+0x118/0x608
[   19.168357]  kasan_report+0xdc/0x128
[   19.168456]  __asan_report_store1_noabort+0x20/0x30
[   19.168568]  krealloc_less_oob_helper+0xa58/0xc50
[   19.168680]  krealloc_less_oob+0x20/0x38
[   19.168844]  kunit_try_run_case+0x170/0x3f0
[   19.168952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.169064]  kthread+0x328/0x630
[   19.169193]  ret_from_fork+0x10/0x20
[   19.169289] 
[   19.169329] Allocated by task 159:
[   19.169684]  kasan_save_stack+0x3c/0x68
[   19.169791]  kasan_save_track+0x20/0x40
[   19.169894]  kasan_save_alloc_info+0x40/0x58
[   19.169967]  __kasan_krealloc+0x118/0x178
[   19.170031]  krealloc_noprof+0x128/0x360
[   19.170127]  krealloc_less_oob_helper+0x168/0xc50
[   19.170219]  krealloc_less_oob+0x20/0x38
[   19.170295]  kunit_try_run_case+0x170/0x3f0
[   19.170374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.170634]  kthread+0x328/0x630
[   19.170719]  ret_from_fork+0x10/0x20
[   19.170813] 
[   19.170881] The buggy address belongs to the object at fff00000c440aa00
[   19.170881]  which belongs to the cache kmalloc-256 of size 256
[   19.171051] The buggy address is located 34 bytes to the right of
[   19.171051]  allocated 201-byte region [fff00000c440aa00, fff00000c440aac9)
[   19.171274] 
[   19.171345] The buggy address belongs to the physical page:
[   19.171459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10440a
[   19.171586] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.171698] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.171876] page_type: f5(slab)
[   19.171964] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.172479] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.172643] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.172806] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.172932] head: 0bfffe0000000001 ffffc1ffc3110281 00000000ffffffff 00000000ffffffff
[   19.173074] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.173175] page dumped because: kasan: bad access detected
[   19.173258] 
[   19.173320] Memory state around the buggy address:
[   19.173421]  fff00000c440a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.173541]  fff00000c440aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.173688] >fff00000c440aa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.173785]                                                           ^
[   19.173896]  fff00000c440ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.174001]  fff00000c440ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.174101] ==================================================================
[   19.111143] ==================================================================
[   19.111475] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.111615] Write of size 1 at addr fff00000c440aad0 by task kunit_try_catch/159
[   19.111733] 
[   19.111808] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.112014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.112084] Hardware name: linux,dummy-virt (DT)
[   19.112156] Call trace:
[   19.112204]  show_stack+0x20/0x38 (C)
[   19.112440]  dump_stack_lvl+0x8c/0xd0
[   19.112779]  print_report+0x118/0x608
[   19.112906]  kasan_report+0xdc/0x128
[   19.113007]  __asan_report_store1_noabort+0x20/0x30
[   19.113209]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.113576]  krealloc_less_oob+0x20/0x38
[   19.113687]  kunit_try_run_case+0x170/0x3f0
[   19.113792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.113910]  kthread+0x328/0x630
[   19.114013]  ret_from_fork+0x10/0x20
[   19.114119] 
[   19.114156] Allocated by task 159:
[   19.114214]  kasan_save_stack+0x3c/0x68
[   19.114297]  kasan_save_track+0x20/0x40
[   19.114383]  kasan_save_alloc_info+0x40/0x58
[   19.114722]  __kasan_krealloc+0x118/0x178
[   19.114848]  krealloc_noprof+0x128/0x360
[   19.114947]  krealloc_less_oob_helper+0x168/0xc50
[   19.115034]  krealloc_less_oob+0x20/0x38
[   19.115112]  kunit_try_run_case+0x170/0x3f0
[   19.115505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.115653]  kthread+0x328/0x630
[   19.115732]  ret_from_fork+0x10/0x20
[   19.115839] 
[   19.115910] The buggy address belongs to the object at fff00000c440aa00
[   19.115910]  which belongs to the cache kmalloc-256 of size 256
[   19.116036] The buggy address is located 7 bytes to the right of
[   19.116036]  allocated 201-byte region [fff00000c440aa00, fff00000c440aac9)
[   19.116430] 
[   19.116490] The buggy address belongs to the physical page:
[   19.116580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10440a
[   19.116711] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.116832] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.116949] page_type: f5(slab)
[   19.117160] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.117298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.117433] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.117657] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.117885] head: 0bfffe0000000001 ffffc1ffc3110281 00000000ffffffff 00000000ffffffff
[   19.118174] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.118509] page dumped because: kasan: bad access detected
[   19.118652] 
[   19.118755] Memory state around the buggy address:
[   19.118861]  fff00000c440a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.119020]  fff00000c440aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.119335] >fff00000c440aa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.119441]                                                  ^
[   19.119530]  fff00000c440ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.119725]  fff00000c440ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.120274] ==================================================================
[   19.095558] ==================================================================
[   19.095693] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.096654] Write of size 1 at addr fff00000c440aac9 by task kunit_try_catch/159
[   19.096871] 
[   19.097027] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.097319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.097497] Hardware name: linux,dummy-virt (DT)
[   19.097569] Call trace:
[   19.097615]  show_stack+0x20/0x38 (C)
[   19.098306]  dump_stack_lvl+0x8c/0xd0
[   19.098746]  print_report+0x118/0x608
[   19.098913]  kasan_report+0xdc/0x128
[   19.099029]  __asan_report_store1_noabort+0x20/0x30
[   19.099145]  krealloc_less_oob_helper+0xa48/0xc50
[   19.099264]  krealloc_less_oob+0x20/0x38
[   19.099372]  kunit_try_run_case+0x170/0x3f0
[   19.099484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.100459]  kthread+0x328/0x630
[   19.100660]  ret_from_fork+0x10/0x20
[   19.100867] 
[   19.100909] Allocated by task 159:
[   19.101431]  kasan_save_stack+0x3c/0x68
[   19.101975]  kasan_save_track+0x20/0x40
[   19.102192]  kasan_save_alloc_info+0x40/0x58
[   19.102391]  __kasan_krealloc+0x118/0x178
[   19.102498]  krealloc_noprof+0x128/0x360
[   19.102658]  krealloc_less_oob_helper+0x168/0xc50
[   19.102760]  krealloc_less_oob+0x20/0x38
[   19.102869]  kunit_try_run_case+0x170/0x3f0
[   19.102959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.103483]  kthread+0x328/0x630
[   19.103642]  ret_from_fork+0x10/0x20
[   19.103729] 
[   19.103781] The buggy address belongs to the object at fff00000c440aa00
[   19.103781]  which belongs to the cache kmalloc-256 of size 256
[   19.103923] The buggy address is located 0 bytes to the right of
[   19.103923]  allocated 201-byte region [fff00000c440aa00, fff00000c440aac9)
[   19.104084] 
[   19.104137] The buggy address belongs to the physical page:
[   19.104212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10440a
[   19.104348] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.104467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.104602] page_type: f5(slab)
[   19.104698] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.104830] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.104954] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.105071] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.106172] head: 0bfffe0000000001 ffffc1ffc3110281 00000000ffffffff 00000000ffffffff
[   19.107576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.108223] page dumped because: kasan: bad access detected
[   19.108312] 
[   19.108362] Memory state around the buggy address:
[   19.108438]  fff00000c440a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.108544]  fff00000c440aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.108648] >fff00000c440aa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.109125]                                               ^
[   19.109579]  fff00000c440ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.109698]  fff00000c440ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.109855] ==================================================================
[   19.123375] ==================================================================
[   19.123486] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.123597] Write of size 1 at addr fff00000c440aada by task kunit_try_catch/159
[   19.123712] 
[   19.123788] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.123998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.124061] Hardware name: linux,dummy-virt (DT)
[   19.124132] Call trace:
[   19.124181]  show_stack+0x20/0x38 (C)
[   19.124294]  dump_stack_lvl+0x8c/0xd0
[   19.125572]  print_report+0x118/0x608
[   19.127152]  kasan_report+0xdc/0x128
[   19.127675]  __asan_report_store1_noabort+0x20/0x30
[   19.128142]  krealloc_less_oob_helper+0xa80/0xc50
[   19.128556]  krealloc_less_oob+0x20/0x38
[   19.129021]  kunit_try_run_case+0x170/0x3f0
[   19.129520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.129744]  kthread+0x328/0x630
[   19.130218]  ret_from_fork+0x10/0x20
[   19.130603] 
[   19.130649] Allocated by task 159:
[   19.131115]  kasan_save_stack+0x3c/0x68
[   19.131650]  kasan_save_track+0x20/0x40
[   19.132130]  kasan_save_alloc_info+0x40/0x58
[   19.132302]  __kasan_krealloc+0x118/0x178
[   19.132386]  krealloc_noprof+0x128/0x360
[   19.132744]  krealloc_less_oob_helper+0x168/0xc50
[   19.133367]  krealloc_less_oob+0x20/0x38
[   19.133756]  kunit_try_run_case+0x170/0x3f0
[   19.133892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.133997]  kthread+0x328/0x630
[   19.134073]  ret_from_fork+0x10/0x20
[   19.134508] 
[   19.134753] The buggy address belongs to the object at fff00000c440aa00
[   19.134753]  which belongs to the cache kmalloc-256 of size 256
[   19.134889] The buggy address is located 17 bytes to the right of
[   19.134889]  allocated 201-byte region [fff00000c440aa00, fff00000c440aac9)
[   19.135708] 
[   19.135903] The buggy address belongs to the physical page:
[   19.136143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10440a
[   19.136274] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.136376] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.136503] page_type: f5(slab)
[   19.136593] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.136711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.137709] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.138026] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.138310] head: 0bfffe0000000001 ffffc1ffc3110281 00000000ffffffff 00000000ffffffff
[   19.138596] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.139164] page dumped because: kasan: bad access detected
[   19.139413] 
[   19.139759] Memory state around the buggy address:
[   19.139962]  fff00000c440a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.140281]  fff00000c440aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.140685] >fff00000c440aa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.140783]                                                     ^
[   19.141088]  fff00000c440ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.141426]  fff00000c440ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.141785] ==================================================================
[   19.270861] ==================================================================
[   19.271472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.272075] Write of size 1 at addr fff00000c79060eb by task kunit_try_catch/163
[   19.272200] 
[   19.272287] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.272481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.272546] Hardware name: linux,dummy-virt (DT)
[   19.272621] Call trace:
[   19.272674]  show_stack+0x20/0x38 (C)
[   19.272792]  dump_stack_lvl+0x8c/0xd0
[   19.273159]  print_report+0x118/0x608
[   19.273314]  kasan_report+0xdc/0x128
[   19.273411]  __asan_report_store1_noabort+0x20/0x30
[   19.274300]  krealloc_less_oob_helper+0xa58/0xc50
[   19.274455]  krealloc_large_less_oob+0x20/0x38
[   19.274810]  kunit_try_run_case+0x170/0x3f0
[   19.275036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.275181]  kthread+0x328/0x630
[   19.275285]  ret_from_fork+0x10/0x20
[   19.275666] 
[   19.276015] The buggy address belongs to the physical page:
[   19.276144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904
[   19.276327] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.276630] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.276989] page_type: f8(unknown)
[   19.277108] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.277686] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.277842] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.278806] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.279016] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff
[   19.279696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.279791] page dumped because: kasan: bad access detected
[   19.279893] 
[   19.279939] Memory state around the buggy address:
[   19.280228]  fff00000c7905f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.280392]  fff00000c7906000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.280739] >fff00000c7906080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.280849]                                                           ^
[   19.280946]  fff00000c7906100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.281285]  fff00000c7906180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.282227] ==================================================================

[   12.572759] ==================================================================
[   12.573087] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.573442] Write of size 1 at addr ffff888102bba0eb by task kunit_try_catch/180
[   12.573775] 
[   12.573862] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.573902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.573912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.573931] Call Trace:
[   12.573945]  <TASK>
[   12.573959]  dump_stack_lvl+0x73/0xb0
[   12.573984]  print_report+0xd1/0x650
[   12.574005]  ? __virt_addr_valid+0x1db/0x2d0
[   12.574027]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.574050]  ? kasan_addr_to_slab+0x11/0xa0
[   12.574071]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.574094]  kasan_report+0x141/0x180
[   12.574116]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.574144]  __asan_report_store1_noabort+0x1b/0x30
[   12.574169]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.574195]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.574219]  ? finish_task_switch.isra.0+0x153/0x700
[   12.574241]  ? __switch_to+0x47/0xf50
[   12.574265]  ? __schedule+0x10cc/0x2b60
[   12.574286]  ? __pfx_read_tsc+0x10/0x10
[   12.574309]  krealloc_large_less_oob+0x1c/0x30
[   12.574332]  kunit_try_run_case+0x1a5/0x480
[   12.574356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.574384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.574407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.574430]  ? __kthread_parkme+0x82/0x180
[   12.574450]  ? preempt_count_sub+0x50/0x80
[   12.574473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.574497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.574520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.574545]  kthread+0x337/0x6f0
[   12.574563]  ? trace_preempt_on+0x20/0xc0
[   12.574586]  ? __pfx_kthread+0x10/0x10
[   12.574607]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.574628]  ? calculate_sigpending+0x7b/0xa0
[   12.574651]  ? __pfx_kthread+0x10/0x10
[   12.574672]  ret_from_fork+0x116/0x1d0
[   12.574690]  ? __pfx_kthread+0x10/0x10
[   12.574710]  ret_from_fork_asm+0x1a/0x30
[   12.574741]  </TASK>
[   12.574760] 
[   12.582599] The buggy address belongs to the physical page:
[   12.582985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb8
[   12.583360] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.583841] flags: 0x200000000000040(head|node=0|zone=2)
[   12.584063] page_type: f8(unknown)
[   12.584222] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.584452] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.584698] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.585066] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.585874] head: 0200000000000002 ffffea00040aee01 00000000ffffffff 00000000ffffffff
[   12.586238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.586520] page dumped because: kasan: bad access detected
[   12.586714] 
[   12.586835] Memory state around the buggy address:
[   12.587216]  ffff888102bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.587461]  ffff888102bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.587690] >ffff888102bba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.588020]                                                           ^
[   12.588422]  ffff888102bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.588847]  ffff888102bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.589146] ==================================================================
[   12.361020] ==================================================================
[   12.361346] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.361615] Write of size 1 at addr ffff888100a290da by task kunit_try_catch/176
[   12.362040] 
[   12.362169] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.362214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.362226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.362243] Call Trace:
[   12.362258]  <TASK>
[   12.362275]  dump_stack_lvl+0x73/0xb0
[   12.362325]  print_report+0xd1/0x650
[   12.362347]  ? __virt_addr_valid+0x1db/0x2d0
[   12.362375]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.362399]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.362422]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.362447]  kasan_report+0x141/0x180
[   12.362486]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.362515]  __asan_report_store1_noabort+0x1b/0x30
[   12.362540]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.362583]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.362608]  ? finish_task_switch.isra.0+0x153/0x700
[   12.362630]  ? __switch_to+0x47/0xf50
[   12.362714]  ? __schedule+0x10cc/0x2b60
[   12.362739]  ? __pfx_read_tsc+0x10/0x10
[   12.362774]  krealloc_less_oob+0x1c/0x30
[   12.362795]  kunit_try_run_case+0x1a5/0x480
[   12.362819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.362841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.362866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.362889]  ? __kthread_parkme+0x82/0x180
[   12.362931]  ? preempt_count_sub+0x50/0x80
[   12.362954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.362978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.363017]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.363056]  kthread+0x337/0x6f0
[   12.363075]  ? trace_preempt_on+0x20/0xc0
[   12.363097]  ? __pfx_kthread+0x10/0x10
[   12.363118]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.363139]  ? calculate_sigpending+0x7b/0xa0
[   12.363163]  ? __pfx_kthread+0x10/0x10
[   12.363184]  ret_from_fork+0x116/0x1d0
[   12.363202]  ? __pfx_kthread+0x10/0x10
[   12.363221]  ret_from_fork_asm+0x1a/0x30
[   12.363251]  </TASK>
[   12.363261] 
[   12.371180] Allocated by task 176:
[   12.371305]  kasan_save_stack+0x45/0x70
[   12.371448]  kasan_save_track+0x18/0x40
[   12.371578]  kasan_save_alloc_info+0x3b/0x50
[   12.371876]  __kasan_krealloc+0x190/0x1f0
[   12.372107]  krealloc_noprof+0xf3/0x340
[   12.372320]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.372578]  krealloc_less_oob+0x1c/0x30
[   12.372786]  kunit_try_run_case+0x1a5/0x480
[   12.373098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.373711]  kthread+0x337/0x6f0
[   12.373917]  ret_from_fork+0x116/0x1d0
[   12.374106]  ret_from_fork_asm+0x1a/0x30
[   12.374239] 
[   12.374307] The buggy address belongs to the object at ffff888100a29000
[   12.374307]  which belongs to the cache kmalloc-256 of size 256
[   12.374971] The buggy address is located 17 bytes to the right of
[   12.374971]  allocated 201-byte region [ffff888100a29000, ffff888100a290c9)
[   12.376006] 
[   12.376136] The buggy address belongs to the physical page:
[   12.376409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   12.376759] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.377093] flags: 0x200000000000040(head|node=0|zone=2)
[   12.377337] page_type: f5(slab)
[   12.377474] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.377695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.377925] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.378290] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.378762] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   12.379364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.379764] page dumped because: kasan: bad access detected
[   12.379986] 
[   12.380054] Memory state around the buggy address:
[   12.380203]  ffff888100a28f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.380483]  ffff888100a29000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.381077] >ffff888100a29080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.381350]                                                     ^
[   12.381606]  ffff888100a29100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.381991]  ffff888100a29180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.382280] ==================================================================
[   12.511385] ==================================================================
[   12.511617] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.511906] Write of size 1 at addr ffff888102bba0d0 by task kunit_try_catch/180
[   12.512238] 
[   12.512352] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.512393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.512405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.512423] Call Trace:
[   12.512435]  <TASK>
[   12.512450]  dump_stack_lvl+0x73/0xb0
[   12.512477]  print_report+0xd1/0x650
[   12.512501]  ? __virt_addr_valid+0x1db/0x2d0
[   12.512524]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.512548]  ? kasan_addr_to_slab+0x11/0xa0
[   12.512569]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.512593]  kasan_report+0x141/0x180
[   12.512615]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.512719]  __asan_report_store1_noabort+0x1b/0x30
[   12.512758]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.512785]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.512810]  ? finish_task_switch.isra.0+0x153/0x700
[   12.512834]  ? __switch_to+0x47/0xf50
[   12.512859]  ? __schedule+0x10cc/0x2b60
[   12.512882]  ? __pfx_read_tsc+0x10/0x10
[   12.512906]  krealloc_large_less_oob+0x1c/0x30
[   12.512929]  kunit_try_run_case+0x1a5/0x480
[   12.512955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.512978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.513002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.513025]  ? __kthread_parkme+0x82/0x180
[   12.513045]  ? preempt_count_sub+0x50/0x80
[   12.513069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.513093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.513117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.513142]  kthread+0x337/0x6f0
[   12.513160]  ? trace_preempt_on+0x20/0xc0
[   12.513183]  ? __pfx_kthread+0x10/0x10
[   12.513204]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.513226]  ? calculate_sigpending+0x7b/0xa0
[   12.513250]  ? __pfx_kthread+0x10/0x10
[   12.513271]  ret_from_fork+0x116/0x1d0
[   12.513290]  ? __pfx_kthread+0x10/0x10
[   12.513310]  ret_from_fork_asm+0x1a/0x30
[   12.513339]  </TASK>
[   12.513350] 
[   12.520883] The buggy address belongs to the physical page:
[   12.521143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb8
[   12.521494] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.522028] flags: 0x200000000000040(head|node=0|zone=2)
[   12.522245] page_type: f8(unknown)
[   12.522430] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.522830] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.523134] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.523443] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.523779] head: 0200000000000002 ffffea00040aee01 00000000ffffffff 00000000ffffffff
[   12.524131] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.524469] page dumped because: kasan: bad access detected
[   12.524702] 
[   12.524798] Memory state around the buggy address:
[   12.525018]  ffff888102bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.525338]  ffff888102bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.525727] >ffff888102bba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.525952]                                                  ^
[   12.526131]  ffff888102bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.526456]  ffff888102bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.526997] ==================================================================
[   12.552531] ==================================================================
[   12.553022] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.553662] Write of size 1 at addr ffff888102bba0ea by task kunit_try_catch/180
[   12.554446] 
[   12.554617] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.554657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.554668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.554687] Call Trace:
[   12.554720]  <TASK>
[   12.554735]  dump_stack_lvl+0x73/0xb0
[   12.554772]  print_report+0xd1/0x650
[   12.554795]  ? __virt_addr_valid+0x1db/0x2d0
[   12.554818]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.554842]  ? kasan_addr_to_slab+0x11/0xa0
[   12.554862]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.554887]  kasan_report+0x141/0x180
[   12.554909]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.554938]  __asan_report_store1_noabort+0x1b/0x30
[   12.554964]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.554989]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.555014]  ? finish_task_switch.isra.0+0x153/0x700
[   12.555037]  ? __switch_to+0x47/0xf50
[   12.555062]  ? __schedule+0x10cc/0x2b60
[   12.555083]  ? __pfx_read_tsc+0x10/0x10
[   12.555106]  krealloc_large_less_oob+0x1c/0x30
[   12.555130]  kunit_try_run_case+0x1a5/0x480
[   12.555154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.555177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.555202]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.555229]  ? __kthread_parkme+0x82/0x180
[   12.555251]  ? preempt_count_sub+0x50/0x80
[   12.555275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.555299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.555323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.555348]  kthread+0x337/0x6f0
[   12.555367]  ? trace_preempt_on+0x20/0xc0
[   12.555391]  ? __pfx_kthread+0x10/0x10
[   12.555411]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.555433]  ? calculate_sigpending+0x7b/0xa0
[   12.555456]  ? __pfx_kthread+0x10/0x10
[   12.555479]  ret_from_fork+0x116/0x1d0
[   12.555497]  ? __pfx_kthread+0x10/0x10
[   12.555517]  ret_from_fork_asm+0x1a/0x30
[   12.555547]  </TASK>
[   12.555557] 
[   12.565770] The buggy address belongs to the physical page:
[   12.565956] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb8
[   12.566522] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.567183] flags: 0x200000000000040(head|node=0|zone=2)
[   12.567417] page_type: f8(unknown)
[   12.567543] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.568152] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.568407] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.568637] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.568978] head: 0200000000000002 ffffea00040aee01 00000000ffffffff 00000000ffffffff
[   12.569322] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.569866] page dumped because: kasan: bad access detected
[   12.570072] 
[   12.570171] Memory state around the buggy address:
[   12.570350]  ffff888102bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.570596]  ffff888102bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.571275] >ffff888102bba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.571539]                                                           ^
[   12.571736]  ffff888102bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.572038]  ffff888102bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.572395] ==================================================================
[   12.382984] ==================================================================
[   12.383327] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.383688] Write of size 1 at addr ffff888100a290ea by task kunit_try_catch/176
[   12.384048] 
[   12.384150] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.384214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.384225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.384262] Call Trace:
[   12.384278]  <TASK>
[   12.384293]  dump_stack_lvl+0x73/0xb0
[   12.384323]  print_report+0xd1/0x650
[   12.384361]  ? __virt_addr_valid+0x1db/0x2d0
[   12.384384]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.384408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.384431]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.384455]  kasan_report+0x141/0x180
[   12.384476]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.384505]  __asan_report_store1_noabort+0x1b/0x30
[   12.384530]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.384572]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.384597]  ? finish_task_switch.isra.0+0x153/0x700
[   12.384620]  ? __switch_to+0x47/0xf50
[   12.384722]  ? __schedule+0x10cc/0x2b60
[   12.384757]  ? __pfx_read_tsc+0x10/0x10
[   12.384781]  krealloc_less_oob+0x1c/0x30
[   12.384802]  kunit_try_run_case+0x1a5/0x480
[   12.384845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.384868]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.384906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.384943]  ? __kthread_parkme+0x82/0x180
[   12.384963]  ? preempt_count_sub+0x50/0x80
[   12.384986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.385009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.385033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.385058]  kthread+0x337/0x6f0
[   12.385078]  ? trace_preempt_on+0x20/0xc0
[   12.385101]  ? __pfx_kthread+0x10/0x10
[   12.385121]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.385142]  ? calculate_sigpending+0x7b/0xa0
[   12.385166]  ? __pfx_kthread+0x10/0x10
[   12.385187]  ret_from_fork+0x116/0x1d0
[   12.385205]  ? __pfx_kthread+0x10/0x10
[   12.385225]  ret_from_fork_asm+0x1a/0x30
[   12.385255]  </TASK>
[   12.385265] 
[   12.393605] Allocated by task 176:
[   12.393895]  kasan_save_stack+0x45/0x70
[   12.394135]  kasan_save_track+0x18/0x40
[   12.394369]  kasan_save_alloc_info+0x3b/0x50
[   12.394574]  __kasan_krealloc+0x190/0x1f0
[   12.394780]  krealloc_noprof+0xf3/0x340
[   12.394968]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.395192]  krealloc_less_oob+0x1c/0x30
[   12.395618]  kunit_try_run_case+0x1a5/0x480
[   12.395957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.396257]  kthread+0x337/0x6f0
[   12.396459]  ret_from_fork+0x116/0x1d0
[   12.396643]  ret_from_fork_asm+0x1a/0x30
[   12.396849] 
[   12.396942] The buggy address belongs to the object at ffff888100a29000
[   12.396942]  which belongs to the cache kmalloc-256 of size 256
[   12.397483] The buggy address is located 33 bytes to the right of
[   12.397483]  allocated 201-byte region [ffff888100a29000, ffff888100a290c9)
[   12.397854] 
[   12.397923] The buggy address belongs to the physical page:
[   12.398144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   12.398537] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.399167] flags: 0x200000000000040(head|node=0|zone=2)
[   12.399549] page_type: f5(slab)
[   12.399719] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.400239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.400463] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.401049] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.401620] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   12.402000] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.402216] page dumped because: kasan: bad access detected
[   12.402386] 
[   12.402561] Memory state around the buggy address:
[   12.402900]  ffff888100a28f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.403209]  ffff888100a29000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.403732] >ffff888100a29080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.404118]                                                           ^
[   12.404351]  ffff888100a29100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.404711]  ffff888100a29180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.405153] ==================================================================
[   12.480389] ==================================================================
[   12.481160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.481426] Write of size 1 at addr ffff888102bba0c9 by task kunit_try_catch/180
[   12.481648] 
[   12.481735] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.481802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.481812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.481832] Call Trace:
[   12.481845]  <TASK>
[   12.481859]  dump_stack_lvl+0x73/0xb0
[   12.481886]  print_report+0xd1/0x650
[   12.481908]  ? __virt_addr_valid+0x1db/0x2d0
[   12.481930]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.481954]  ? kasan_addr_to_slab+0x11/0xa0
[   12.481974]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.481998]  kasan_report+0x141/0x180
[   12.482020]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.482048]  __asan_report_store1_noabort+0x1b/0x30
[   12.482151]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.482181]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.482208]  ? finish_task_switch.isra.0+0x153/0x700
[   12.482231]  ? __switch_to+0x47/0xf50
[   12.482255]  ? __schedule+0x10cc/0x2b60
[   12.482276]  ? __pfx_read_tsc+0x10/0x10
[   12.482300]  krealloc_large_less_oob+0x1c/0x30
[   12.482324]  kunit_try_run_case+0x1a5/0x480
[   12.482347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.482382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.482405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.482674]  ? __kthread_parkme+0x82/0x180
[   12.482779]  ? preempt_count_sub+0x50/0x80
[   12.482804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.482829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.482854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.482879]  kthread+0x337/0x6f0
[   12.482898]  ? trace_preempt_on+0x20/0xc0
[   12.482922]  ? __pfx_kthread+0x10/0x10
[   12.482943]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.482964]  ? calculate_sigpending+0x7b/0xa0
[   12.482988]  ? __pfx_kthread+0x10/0x10
[   12.483009]  ret_from_fork+0x116/0x1d0
[   12.483027]  ? __pfx_kthread+0x10/0x10
[   12.483047]  ret_from_fork_asm+0x1a/0x30
[   12.483077]  </TASK>
[   12.483088] 
[   12.499352] The buggy address belongs to the physical page:
[   12.499815] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb8
[   12.500311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.500548] flags: 0x200000000000040(head|node=0|zone=2)
[   12.500811] page_type: f8(unknown)
[   12.501431] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.502487] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.503516] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.504556] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.505394] head: 0200000000000002 ffffea00040aee01 00000000ffffffff 00000000ffffffff
[   12.505629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.506547] page dumped because: kasan: bad access detected
[   12.507062] 
[   12.507338] Memory state around the buggy address:
[   12.508026]  ffff888102bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.508541]  ffff888102bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.509254] >ffff888102bba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.510055]                                               ^
[   12.510533]  ffff888102bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.510773]  ffff888102bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.510991] ==================================================================
[   12.527780] ==================================================================
[   12.528143] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.528439] Write of size 1 at addr ffff888102bba0da by task kunit_try_catch/180
[   12.528743] 
[   12.529036] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.529077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.529088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.529105] Call Trace:
[   12.529116]  <TASK>
[   12.529129]  dump_stack_lvl+0x73/0xb0
[   12.529156]  print_report+0xd1/0x650
[   12.529179]  ? __virt_addr_valid+0x1db/0x2d0
[   12.529201]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.529225]  ? kasan_addr_to_slab+0x11/0xa0
[   12.529245]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.529269]  kasan_report+0x141/0x180
[   12.529291]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.529319]  __asan_report_store1_noabort+0x1b/0x30
[   12.529344]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.529370]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.529396]  ? finish_task_switch.isra.0+0x153/0x700
[   12.529418]  ? __switch_to+0x47/0xf50
[   12.529442]  ? __schedule+0x10cc/0x2b60
[   12.529463]  ? __pfx_read_tsc+0x10/0x10
[   12.529487]  krealloc_large_less_oob+0x1c/0x30
[   12.529509]  kunit_try_run_case+0x1a5/0x480
[   12.529534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.529557]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.529579]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.529603]  ? __kthread_parkme+0x82/0x180
[   12.529623]  ? preempt_count_sub+0x50/0x80
[   12.529722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.529758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.529783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.529809]  kthread+0x337/0x6f0
[   12.529828]  ? trace_preempt_on+0x20/0xc0
[   12.529850]  ? __pfx_kthread+0x10/0x10
[   12.529870]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.529892]  ? calculate_sigpending+0x7b/0xa0
[   12.529916]  ? __pfx_kthread+0x10/0x10
[   12.529938]  ret_from_fork+0x116/0x1d0
[   12.529958]  ? __pfx_kthread+0x10/0x10
[   12.529982]  ret_from_fork_asm+0x1a/0x30
[   12.530014]  </TASK>
[   12.530023] 
[   12.541875] The buggy address belongs to the physical page:
[   12.542364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb8
[   12.543311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.544008] flags: 0x200000000000040(head|node=0|zone=2)
[   12.544589] page_type: f8(unknown)
[   12.544866] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.545497] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.545834] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.546063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.546292] head: 0200000000000002 ffffea00040aee01 00000000ffffffff 00000000ffffffff
[   12.546527] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.547062] page dumped because: kasan: bad access detected
[   12.547626] 
[   12.547791] Memory state around the buggy address:
[   12.548259]  ffff888102bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.549032]  ffff888102bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.549637] >ffff888102bba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.550436]                                                     ^
[   12.551084]  ffff888102bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.551860]  ffff888102bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.552243] ==================================================================
[   12.405603] ==================================================================
[   12.406028] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.406373] Write of size 1 at addr ffff888100a290eb by task kunit_try_catch/176
[   12.406599] 
[   12.406857] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.406902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.406912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.407031] Call Trace:
[   12.407049]  <TASK>
[   12.407064]  dump_stack_lvl+0x73/0xb0
[   12.407092]  print_report+0xd1/0x650
[   12.407114]  ? __virt_addr_valid+0x1db/0x2d0
[   12.407136]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.407160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.407182]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.407206]  kasan_report+0x141/0x180
[   12.407228]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.407286]  __asan_report_store1_noabort+0x1b/0x30
[   12.407312]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.407338]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.407363]  ? finish_task_switch.isra.0+0x153/0x700
[   12.407385]  ? __switch_to+0x47/0xf50
[   12.407408]  ? __schedule+0x10cc/0x2b60
[   12.407430]  ? __pfx_read_tsc+0x10/0x10
[   12.407454]  krealloc_less_oob+0x1c/0x30
[   12.407475]  kunit_try_run_case+0x1a5/0x480
[   12.407498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.407521]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.407544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.407586]  ? __kthread_parkme+0x82/0x180
[   12.407605]  ? preempt_count_sub+0x50/0x80
[   12.407628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.407666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.407691]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.407715]  kthread+0x337/0x6f0
[   12.407734]  ? trace_preempt_on+0x20/0xc0
[   12.407767]  ? __pfx_kthread+0x10/0x10
[   12.407861]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.407888]  ? calculate_sigpending+0x7b/0xa0
[   12.407912]  ? __pfx_kthread+0x10/0x10
[   12.407934]  ret_from_fork+0x116/0x1d0
[   12.407952]  ? __pfx_kthread+0x10/0x10
[   12.407972]  ret_from_fork_asm+0x1a/0x30
[   12.408021]  </TASK>
[   12.408031] 
[   12.416417] Allocated by task 176:
[   12.416622]  kasan_save_stack+0x45/0x70
[   12.416918]  kasan_save_track+0x18/0x40
[   12.417106]  kasan_save_alloc_info+0x3b/0x50
[   12.417360]  __kasan_krealloc+0x190/0x1f0
[   12.417559]  krealloc_noprof+0xf3/0x340
[   12.417840]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.418002]  krealloc_less_oob+0x1c/0x30
[   12.418195]  kunit_try_run_case+0x1a5/0x480
[   12.418434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.418870]  kthread+0x337/0x6f0
[   12.419020]  ret_from_fork+0x116/0x1d0
[   12.419148]  ret_from_fork_asm+0x1a/0x30
[   12.419344] 
[   12.419439] The buggy address belongs to the object at ffff888100a29000
[   12.419439]  which belongs to the cache kmalloc-256 of size 256
[   12.420282] The buggy address is located 34 bytes to the right of
[   12.420282]  allocated 201-byte region [ffff888100a29000, ffff888100a290c9)
[   12.420896] 
[   12.420993] The buggy address belongs to the physical page:
[   12.421273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   12.421541] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.421768] flags: 0x200000000000040(head|node=0|zone=2)
[   12.421936] page_type: f5(slab)
[   12.422102] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.422562] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.423240] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.423528] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.424015] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   12.424526] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.425036] page dumped because: kasan: bad access detected
[   12.425222] 
[   12.425289] Memory state around the buggy address:
[   12.425447]  ffff888100a28f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.425958]  ffff888100a29000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.426293] >ffff888100a29080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.426635]                                                           ^
[   12.426858]  ffff888100a29100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.427153]  ffff888100a29180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.427573] ==================================================================
[   12.299296] ==================================================================
[   12.300611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.301534] Write of size 1 at addr ffff888100a290c9 by task kunit_try_catch/176
[   12.302800] 
[   12.303120] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.303168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.303179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.303199] Call Trace:
[   12.303211]  <TASK>
[   12.303226]  dump_stack_lvl+0x73/0xb0
[   12.303257]  print_report+0xd1/0x650
[   12.303279]  ? __virt_addr_valid+0x1db/0x2d0
[   12.303302]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.303325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.303348]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.303372]  kasan_report+0x141/0x180
[   12.303393]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.303421]  __asan_report_store1_noabort+0x1b/0x30
[   12.303446]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.303472]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.303498]  ? finish_task_switch.isra.0+0x153/0x700
[   12.303521]  ? __switch_to+0x47/0xf50
[   12.303548]  ? __schedule+0x10cc/0x2b60
[   12.303573]  ? __pfx_read_tsc+0x10/0x10
[   12.303597]  krealloc_less_oob+0x1c/0x30
[   12.303620]  kunit_try_run_case+0x1a5/0x480
[   12.303761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.303792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.303819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.303843]  ? __kthread_parkme+0x82/0x180
[   12.303863]  ? preempt_count_sub+0x50/0x80
[   12.303886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.303943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.303968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.303993]  kthread+0x337/0x6f0
[   12.304012]  ? trace_preempt_on+0x20/0xc0
[   12.304035]  ? __pfx_kthread+0x10/0x10
[   12.304055]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.304077]  ? calculate_sigpending+0x7b/0xa0
[   12.304100]  ? __pfx_kthread+0x10/0x10
[   12.304121]  ret_from_fork+0x116/0x1d0
[   12.304139]  ? __pfx_kthread+0x10/0x10
[   12.304158]  ret_from_fork_asm+0x1a/0x30
[   12.304188]  </TASK>
[   12.304199] 
[   12.317695] Allocated by task 176:
[   12.318030]  kasan_save_stack+0x45/0x70
[   12.318417]  kasan_save_track+0x18/0x40
[   12.318960]  kasan_save_alloc_info+0x3b/0x50
[   12.319376]  __kasan_krealloc+0x190/0x1f0
[   12.319824]  krealloc_noprof+0xf3/0x340
[   12.320265]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.320710]  krealloc_less_oob+0x1c/0x30
[   12.321266]  kunit_try_run_case+0x1a5/0x480
[   12.321706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.322048]  kthread+0x337/0x6f0
[   12.322175]  ret_from_fork+0x116/0x1d0
[   12.322307]  ret_from_fork_asm+0x1a/0x30
[   12.322451] 
[   12.322522] The buggy address belongs to the object at ffff888100a29000
[   12.322522]  which belongs to the cache kmalloc-256 of size 256
[   12.323461] The buggy address is located 0 bytes to the right of
[   12.323461]  allocated 201-byte region [ffff888100a29000, ffff888100a290c9)
[   12.324719] 
[   12.324928] The buggy address belongs to the physical page:
[   12.325421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   12.326235] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.327042] flags: 0x200000000000040(head|node=0|zone=2)
[   12.327229] page_type: f5(slab)
[   12.327351] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.327579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.328173] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.329088] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.330030] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   12.331045] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.331821] page dumped because: kasan: bad access detected
[   12.332257] 
[   12.332329] Memory state around the buggy address:
[   12.332491]  ffff888100a28f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.332739]  ffff888100a29000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.333550] >ffff888100a29080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.334331]                                               ^
[   12.335001]  ffff888100a29100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.335611]  ffff888100a29180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.336045] ==================================================================
[   12.336979] ==================================================================
[   12.337795] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.338489] Write of size 1 at addr ffff888100a290d0 by task kunit_try_catch/176
[   12.339292] 
[   12.339488] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.339531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.339541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.339561] Call Trace:
[   12.339574]  <TASK>
[   12.339589]  dump_stack_lvl+0x73/0xb0
[   12.339618]  print_report+0xd1/0x650
[   12.339640]  ? __virt_addr_valid+0x1db/0x2d0
[   12.339684]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.339708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.339731]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.339766]  kasan_report+0x141/0x180
[   12.339787]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.339816]  __asan_report_store1_noabort+0x1b/0x30
[   12.339840]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.339866]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.339891]  ? finish_task_switch.isra.0+0x153/0x700
[   12.339914]  ? __switch_to+0x47/0xf50
[   12.339938]  ? __schedule+0x10cc/0x2b60
[   12.339959]  ? __pfx_read_tsc+0x10/0x10
[   12.339982]  krealloc_less_oob+0x1c/0x30
[   12.340004]  kunit_try_run_case+0x1a5/0x480
[   12.340027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.340049]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.340073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.340096]  ? __kthread_parkme+0x82/0x180
[   12.340116]  ? preempt_count_sub+0x50/0x80
[   12.340138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.340162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.340186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.340211]  kthread+0x337/0x6f0
[   12.340229]  ? trace_preempt_on+0x20/0xc0
[   12.340252]  ? __pfx_kthread+0x10/0x10
[   12.340272]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.340293]  ? calculate_sigpending+0x7b/0xa0
[   12.340317]  ? __pfx_kthread+0x10/0x10
[   12.340337]  ret_from_fork+0x116/0x1d0
[   12.340355]  ? __pfx_kthread+0x10/0x10
[   12.340375]  ret_from_fork_asm+0x1a/0x30
[   12.340405]  </TASK>
[   12.340415] 
[   12.349587] Allocated by task 176:
[   12.349879]  kasan_save_stack+0x45/0x70
[   12.350069]  kasan_save_track+0x18/0x40
[   12.350216]  kasan_save_alloc_info+0x3b/0x50
[   12.350456]  __kasan_krealloc+0x190/0x1f0
[   12.350720]  krealloc_noprof+0xf3/0x340
[   12.350912]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.351243]  krealloc_less_oob+0x1c/0x30
[   12.351430]  kunit_try_run_case+0x1a5/0x480
[   12.351792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.352043]  kthread+0x337/0x6f0
[   12.352233]  ret_from_fork+0x116/0x1d0
[   12.352388]  ret_from_fork_asm+0x1a/0x30
[   12.352574] 
[   12.352801] The buggy address belongs to the object at ffff888100a29000
[   12.352801]  which belongs to the cache kmalloc-256 of size 256
[   12.353304] The buggy address is located 7 bytes to the right of
[   12.353304]  allocated 201-byte region [ffff888100a29000, ffff888100a290c9)
[   12.353840] 
[   12.353995] The buggy address belongs to the physical page:
[   12.354248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   12.354634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.355016] flags: 0x200000000000040(head|node=0|zone=2)
[   12.355361] page_type: f5(slab)
[   12.355555] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.355900] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.356118] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.356338] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.356993] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   12.357371] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.357873] page dumped because: kasan: bad access detected
[   12.358154] 
[   12.358248] Memory state around the buggy address:
[   12.358408]  ffff888100a28f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.358702]  ffff888100a29000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.359062] >ffff888100a29080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.359374]                                                  ^
[   12.359637]  ffff888100a29100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.359984]  ffff888100a29180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.360308] ==================================================================