Hay
Date
July 12, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.653027] ==================================================================
[   16.653229] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.653315] Write of size 1 at addr fff00000c665e0d0 by task kunit_try_catch/162
[   16.653426] 
[   16.653457] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.653536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.653562] Hardware name: linux,dummy-virt (DT)
[   16.653598] Call trace:
[   16.653618]  show_stack+0x20/0x38 (C)
[   16.653794]  dump_stack_lvl+0x8c/0xd0
[   16.653855]  print_report+0x118/0x5d0
[   16.653900]  kasan_report+0xdc/0x128
[   16.653955]  __asan_report_store1_noabort+0x20/0x30
[   16.654043]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.654130]  krealloc_large_less_oob+0x20/0x38
[   16.654209]  kunit_try_run_case+0x170/0x3f0
[   16.654256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.654307]  kthread+0x328/0x630
[   16.654370]  ret_from_fork+0x10/0x20
[   16.654418] 
[   16.654443] The buggy address belongs to the physical page:
[   16.654473] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c
[   16.654525] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.654582] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.654633] page_type: f8(unknown)
[   16.654670] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.654729] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.654779] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.654827] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.654885] head: 0bfffe0000000002 ffffc1ffc3199701 00000000ffffffff 00000000ffffffff
[   16.654939] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.654979] page dumped because: kasan: bad access detected
[   16.655014] 
[   16.655031] Memory state around the buggy address:
[   16.655066]  fff00000c665df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.655108]  fff00000c665e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.655154] >fff00000c665e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.655482]                                                  ^
[   16.655525]  fff00000c665e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.655734]  fff00000c665e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.655908] ==================================================================
[   16.603143] ==================================================================
[   16.603352] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.603449] Write of size 1 at addr fff00000c47862da by task kunit_try_catch/158
[   16.603604] 
[   16.603662] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.603809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.603837] Hardware name: linux,dummy-virt (DT)
[   16.603875] Call trace:
[   16.603895]  show_stack+0x20/0x38 (C)
[   16.604079]  dump_stack_lvl+0x8c/0xd0
[   16.604162]  print_report+0x118/0x5d0
[   16.604224]  kasan_report+0xdc/0x128
[   16.604286]  __asan_report_store1_noabort+0x20/0x30
[   16.604456]  krealloc_less_oob_helper+0xa80/0xc50
[   16.604556]  krealloc_less_oob+0x20/0x38
[   16.604698]  kunit_try_run_case+0x170/0x3f0
[   16.604829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.605012]  kthread+0x328/0x630
[   16.605085]  ret_from_fork+0x10/0x20
[   16.605518] 
[   16.605597] Allocated by task 158:
[   16.605719]  kasan_save_stack+0x3c/0x68
[   16.605822]  kasan_save_track+0x20/0x40
[   16.605957]  kasan_save_alloc_info+0x40/0x58
[   16.606008]  __kasan_krealloc+0x118/0x178
[   16.606045]  krealloc_noprof+0x128/0x360
[   16.606090]  krealloc_less_oob_helper+0x168/0xc50
[   16.606140]  krealloc_less_oob+0x20/0x38
[   16.606236]  kunit_try_run_case+0x170/0x3f0
[   16.606291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.606343]  kthread+0x328/0x630
[   16.606374]  ret_from_fork+0x10/0x20
[   16.606418] 
[   16.606437] The buggy address belongs to the object at fff00000c4786200
[   16.606437]  which belongs to the cache kmalloc-256 of size 256
[   16.606503] The buggy address is located 17 bytes to the right of
[   16.606503]  allocated 201-byte region [fff00000c4786200, fff00000c47862c9)
[   16.606568] 
[   16.606586] The buggy address belongs to the physical page:
[   16.606617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104786
[   16.606669] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.606724] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.606773] page_type: f5(slab)
[   16.606810] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.606858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.606917] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.606964] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.607022] head: 0bfffe0000000001 ffffc1ffc311e181 00000000ffffffff 00000000ffffffff
[   16.607076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.607116] page dumped because: kasan: bad access detected
[   16.607155] 
[   16.607182] Memory state around the buggy address:
[   16.607427]  fff00000c4786180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.607540]  fff00000c4786200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.607763] >fff00000c4786280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.607838]                                                     ^
[   16.608338]  fff00000c4786300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.608734]  fff00000c4786380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.608869] ==================================================================
[   16.646397] ==================================================================
[   16.646453] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.646503] Write of size 1 at addr fff00000c665e0c9 by task kunit_try_catch/162
[   16.646733] 
[   16.646785] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.646874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.646911] Hardware name: linux,dummy-virt (DT)
[   16.646993] Call trace:
[   16.647031]  show_stack+0x20/0x38 (C)
[   16.647082]  dump_stack_lvl+0x8c/0xd0
[   16.647127]  print_report+0x118/0x5d0
[   16.647250]  kasan_report+0xdc/0x128
[   16.647318]  __asan_report_store1_noabort+0x20/0x30
[   16.647486]  krealloc_less_oob_helper+0xa48/0xc50
[   16.647568]  krealloc_large_less_oob+0x20/0x38
[   16.647616]  kunit_try_run_case+0x170/0x3f0
[   16.647689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.647888]  kthread+0x328/0x630
[   16.648060]  ret_from_fork+0x10/0x20
[   16.648131] 
[   16.648151] The buggy address belongs to the physical page:
[   16.648193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c
[   16.648626] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.648752] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.648919] page_type: f8(unknown)
[   16.648982] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.649150] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.649254] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.649470] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.649564] head: 0bfffe0000000002 ffffc1ffc3199701 00000000ffffffff 00000000ffffffff
[   16.649620] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.649686] page dumped because: kasan: bad access detected
[   16.649796] 
[   16.649865] Memory state around the buggy address:
[   16.649946]  fff00000c665df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.650050]  fff00000c665e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.650092] >fff00000c665e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.650129]                                               ^
[   16.650196]  fff00000c665e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.650238]  fff00000c665e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.650276] ==================================================================
[   16.616674] ==================================================================
[   16.616727] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.616784] Write of size 1 at addr fff00000c47862eb by task kunit_try_catch/158
[   16.616941] 
[   16.617002] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.617148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.617327] Hardware name: linux,dummy-virt (DT)
[   16.617375] Call trace:
[   16.617486]  show_stack+0x20/0x38 (C)
[   16.617540]  dump_stack_lvl+0x8c/0xd0
[   16.617584]  print_report+0x118/0x5d0
[   16.617717]  kasan_report+0xdc/0x128
[   16.617781]  __asan_report_store1_noabort+0x20/0x30
[   16.617831]  krealloc_less_oob_helper+0xa58/0xc50
[   16.618042]  krealloc_less_oob+0x20/0x38
[   16.618109]  kunit_try_run_case+0x170/0x3f0
[   16.618196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.618250]  kthread+0x328/0x630
[   16.618299]  ret_from_fork+0x10/0x20
[   16.618391] 
[   16.618410] Allocated by task 158:
[   16.618437]  kasan_save_stack+0x3c/0x68
[   16.618506]  kasan_save_track+0x20/0x40
[   16.618605]  kasan_save_alloc_info+0x40/0x58
[   16.618648]  __kasan_krealloc+0x118/0x178
[   16.618712]  krealloc_noprof+0x128/0x360
[   16.618756]  krealloc_less_oob_helper+0x168/0xc50
[   16.618924]  krealloc_less_oob+0x20/0x38
[   16.618976]  kunit_try_run_case+0x170/0x3f0
[   16.619037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.619218]  kthread+0x328/0x630
[   16.619309]  ret_from_fork+0x10/0x20
[   16.619390] 
[   16.619630] The buggy address belongs to the object at fff00000c4786200
[   16.619630]  which belongs to the cache kmalloc-256 of size 256
[   16.619699] The buggy address is located 34 bytes to the right of
[   16.619699]  allocated 201-byte region [fff00000c4786200, fff00000c47862c9)
[   16.619784] 
[   16.619802] The buggy address belongs to the physical page:
[   16.619832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104786
[   16.619883] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.619931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.619981] page_type: f5(slab)
[   16.620017] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.620377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.620467] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.620663] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.620741] head: 0bfffe0000000001 ffffc1ffc311e181 00000000ffffffff 00000000ffffffff
[   16.620826] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.620974] page dumped because: kasan: bad access detected
[   16.621005] 
[   16.621250] Memory state around the buggy address:
[   16.621332]  fff00000c4786180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.621477]  fff00000c4786200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.621556] >fff00000c4786280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.621634]                                                           ^
[   16.621683]  fff00000c4786300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.621734]  fff00000c4786380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.621776] ==================================================================
[   16.657374] ==================================================================
[   16.657558] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.657616] Write of size 1 at addr fff00000c665e0da by task kunit_try_catch/162
[   16.657748] 
[   16.657782] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.657862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.658066] Hardware name: linux,dummy-virt (DT)
[   16.658196] Call trace:
[   16.658222]  show_stack+0x20/0x38 (C)
[   16.658342]  dump_stack_lvl+0x8c/0xd0
[   16.658408]  print_report+0x118/0x5d0
[   16.658454]  kasan_report+0xdc/0x128
[   16.658623]  __asan_report_store1_noabort+0x20/0x30
[   16.658690]  krealloc_less_oob_helper+0xa80/0xc50
[   16.658738]  krealloc_large_less_oob+0x20/0x38
[   16.658794]  kunit_try_run_case+0x170/0x3f0
[   16.658840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.658929]  kthread+0x328/0x630
[   16.658974]  ret_from_fork+0x10/0x20
[   16.659029] 
[   16.659049] The buggy address belongs to the physical page:
[   16.659292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c
[   16.659389] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.659447] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.659577] page_type: f8(unknown)
[   16.659652] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.659847] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.659903] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.660054] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.660234] head: 0bfffe0000000002 ffffc1ffc3199701 00000000ffffffff 00000000ffffffff
[   16.660318] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.660416] page dumped because: kasan: bad access detected
[   16.660494] 
[   16.660547] Memory state around the buggy address:
[   16.660579]  fff00000c665df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.660818]  fff00000c665e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.660922] >fff00000c665e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.661009]                                                     ^
[   16.661094]  fff00000c665e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.661211]  fff00000c665e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.661271] ==================================================================
[   16.595347] ==================================================================
[   16.595431] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.595604] Write of size 1 at addr fff00000c47862d0 by task kunit_try_catch/158
[   16.595713] 
[   16.595834] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.595967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.595993] Hardware name: linux,dummy-virt (DT)
[   16.596023] Call trace:
[   16.596044]  show_stack+0x20/0x38 (C)
[   16.596292]  dump_stack_lvl+0x8c/0xd0
[   16.596341]  print_report+0x118/0x5d0
[   16.596421]  kasan_report+0xdc/0x128
[   16.596588]  __asan_report_store1_noabort+0x20/0x30
[   16.596759]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.596847]  krealloc_less_oob+0x20/0x38
[   16.596962]  kunit_try_run_case+0x170/0x3f0
[   16.597071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.597220]  kthread+0x328/0x630
[   16.597265]  ret_from_fork+0x10/0x20
[   16.597505] 
[   16.597543] Allocated by task 158:
[   16.597720]  kasan_save_stack+0x3c/0x68
[   16.597801]  kasan_save_track+0x20/0x40
[   16.597969]  kasan_save_alloc_info+0x40/0x58
[   16.598230]  __kasan_krealloc+0x118/0x178
[   16.598469]  krealloc_noprof+0x128/0x360
[   16.598513]  krealloc_less_oob_helper+0x168/0xc50
[   16.598589]  krealloc_less_oob+0x20/0x38
[   16.598780]  kunit_try_run_case+0x170/0x3f0
[   16.598861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.599023]  kthread+0x328/0x630
[   16.599162]  ret_from_fork+0x10/0x20
[   16.599212] 
[   16.599365] The buggy address belongs to the object at fff00000c4786200
[   16.599365]  which belongs to the cache kmalloc-256 of size 256
[   16.599427] The buggy address is located 7 bytes to the right of
[   16.599427]  allocated 201-byte region [fff00000c4786200, fff00000c47862c9)
[   16.599501] 
[   16.599520] The buggy address belongs to the physical page:
[   16.599557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104786
[   16.599614] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.599667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.599717] page_type: f5(slab)
[   16.600141] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.600241] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.600426] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.600600] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.600689] head: 0bfffe0000000001 ffffc1ffc311e181 00000000ffffffff 00000000ffffffff
[   16.600837] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.600902] page dumped because: kasan: bad access detected
[   16.600933] 
[   16.600990] Memory state around the buggy address:
[   16.601208]  fff00000c4786180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.601256]  fff00000c4786200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.601313] >fff00000c4786280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.601369]                                                  ^
[   16.601481]  fff00000c4786300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.601538]  fff00000c4786380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.601636] ==================================================================
[   16.586704] ==================================================================
[   16.586761] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.586869] Write of size 1 at addr fff00000c47862c9 by task kunit_try_catch/158
[   16.586942] 
[   16.586981] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.587067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.587094] Hardware name: linux,dummy-virt (DT)
[   16.587123] Call trace:
[   16.587145]  show_stack+0x20/0x38 (C)
[   16.587213]  dump_stack_lvl+0x8c/0xd0
[   16.587287]  print_report+0x118/0x5d0
[   16.587335]  kasan_report+0xdc/0x128
[   16.587380]  __asan_report_store1_noabort+0x20/0x30
[   16.587430]  krealloc_less_oob_helper+0xa48/0xc50
[   16.587479]  krealloc_less_oob+0x20/0x38
[   16.588011]  kunit_try_run_case+0x170/0x3f0
[   16.588475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.588589]  kthread+0x328/0x630
[   16.589016]  ret_from_fork+0x10/0x20
[   16.589252] 
[   16.589560] Allocated by task 158:
[   16.589714]  kasan_save_stack+0x3c/0x68
[   16.589781]  kasan_save_track+0x20/0x40
[   16.589955]  kasan_save_alloc_info+0x40/0x58
[   16.590095]  __kasan_krealloc+0x118/0x178
[   16.590407]  krealloc_noprof+0x128/0x360
[   16.590558]  krealloc_less_oob_helper+0x168/0xc50
[   16.590710]  krealloc_less_oob+0x20/0x38
[   16.590807]  kunit_try_run_case+0x170/0x3f0
[   16.590930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.590977]  kthread+0x328/0x630
[   16.591038]  ret_from_fork+0x10/0x20
[   16.591457] 
[   16.591506] The buggy address belongs to the object at fff00000c4786200
[   16.591506]  which belongs to the cache kmalloc-256 of size 256
[   16.591661] The buggy address is located 0 bytes to the right of
[   16.591661]  allocated 201-byte region [fff00000c4786200, fff00000c47862c9)
[   16.591809] 
[   16.591858] The buggy address belongs to the physical page:
[   16.591931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104786
[   16.592017] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.592137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.592201] page_type: f5(slab)
[   16.592440] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.592531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.592726] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.592892] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.593042] head: 0bfffe0000000001 ffffc1ffc311e181 00000000ffffffff 00000000ffffffff
[   16.593168] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.593321] page dumped because: kasan: bad access detected
[   16.593365] 
[   16.593383] Memory state around the buggy address:
[   16.593414]  fff00000c4786180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.593623]  fff00000c4786200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.593852] >fff00000c4786280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.594065]                                               ^
[   16.594164]  fff00000c4786300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.594290]  fff00000c4786380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.594329] ==================================================================
[   16.661955] ==================================================================
[   16.662004] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.662050] Write of size 1 at addr fff00000c665e0ea by task kunit_try_catch/162
[   16.662348] 
[   16.662384] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.662538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.662582] Hardware name: linux,dummy-virt (DT)
[   16.662658] Call trace:
[   16.662694]  show_stack+0x20/0x38 (C)
[   16.662760]  dump_stack_lvl+0x8c/0xd0
[   16.662805]  print_report+0x118/0x5d0
[   16.662979]  kasan_report+0xdc/0x128
[   16.663053]  __asan_report_store1_noabort+0x20/0x30
[   16.663112]  krealloc_less_oob_helper+0xae4/0xc50
[   16.663192]  krealloc_large_less_oob+0x20/0x38
[   16.663374]  kunit_try_run_case+0x170/0x3f0
[   16.663422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.663635]  kthread+0x328/0x630
[   16.663681]  ret_from_fork+0x10/0x20
[   16.663770] 
[   16.663806] The buggy address belongs to the physical page:
[   16.663896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c
[   16.663969] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.664080] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.664288] page_type: f8(unknown)
[   16.664354] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.664406] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.664469] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.664539] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.664589] head: 0bfffe0000000002 ffffc1ffc3199701 00000000ffffffff 00000000ffffffff
[   16.664647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.664686] page dumped because: kasan: bad access detected
[   16.664716] 
[   16.664733] Memory state around the buggy address:
[   16.664772]  fff00000c665df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.664814]  fff00000c665e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.664861] >fff00000c665e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.664907]                                                           ^
[   16.664946]  fff00000c665e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.664987]  fff00000c665e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.665042] ==================================================================
[   16.665679] ==================================================================
[   16.665811] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.665869] Write of size 1 at addr fff00000c665e0eb by task kunit_try_catch/162
[   16.665966] 
[   16.666052] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.666166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.666234] Hardware name: linux,dummy-virt (DT)
[   16.666282] Call trace:
[   16.666343]  show_stack+0x20/0x38 (C)
[   16.666411]  dump_stack_lvl+0x8c/0xd0
[   16.666456]  print_report+0x118/0x5d0
[   16.666627]  kasan_report+0xdc/0x128
[   16.666698]  __asan_report_store1_noabort+0x20/0x30
[   16.666767]  krealloc_less_oob_helper+0xa58/0xc50
[   16.666815]  krealloc_large_less_oob+0x20/0x38
[   16.666928]  kunit_try_run_case+0x170/0x3f0
[   16.667102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.667198]  kthread+0x328/0x630
[   16.667333]  ret_from_fork+0x10/0x20
[   16.667419] 
[   16.667511] The buggy address belongs to the physical page:
[   16.667546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c
[   16.667620] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.667800] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.667998] page_type: f8(unknown)
[   16.668100] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.668257] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.668321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.668520] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.668578] head: 0bfffe0000000002 ffffc1ffc3199701 00000000ffffffff 00000000ffffffff
[   16.668675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.668774] page dumped because: kasan: bad access detected
[   16.668911] 
[   16.669041] Memory state around the buggy address:
[   16.669130]  fff00000c665df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.669196]  fff00000c665e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.669344] >fff00000c665e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.669454]                                                           ^
[   16.669495]  fff00000c665e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.669548]  fff00000c665e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.669878] ==================================================================
[   16.609256] ==================================================================
[   16.609479] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.609538] Write of size 1 at addr fff00000c47862ea by task kunit_try_catch/158
[   16.609720] 
[   16.609758] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.609860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.609917] Hardware name: linux,dummy-virt (DT)
[   16.609981] Call trace:
[   16.610020]  show_stack+0x20/0x38 (C)
[   16.610122]  dump_stack_lvl+0x8c/0xd0
[   16.610183]  print_report+0x118/0x5d0
[   16.610228]  kasan_report+0xdc/0x128
[   16.610330]  __asan_report_store1_noabort+0x20/0x30
[   16.610384]  krealloc_less_oob_helper+0xae4/0xc50
[   16.610432]  krealloc_less_oob+0x20/0x38
[   16.610476]  kunit_try_run_case+0x170/0x3f0
[   16.610549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.610627]  kthread+0x328/0x630
[   16.610786]  ret_from_fork+0x10/0x20
[   16.610862] 
[   16.610880] Allocated by task 158:
[   16.611024]  kasan_save_stack+0x3c/0x68
[   16.611095]  kasan_save_track+0x20/0x40
[   16.611133]  kasan_save_alloc_info+0x40/0x58
[   16.611200]  __kasan_krealloc+0x118/0x178
[   16.611389]  krealloc_noprof+0x128/0x360
[   16.611550]  krealloc_less_oob_helper+0x168/0xc50
[   16.611624]  krealloc_less_oob+0x20/0x38
[   16.611734]  kunit_try_run_case+0x170/0x3f0
[   16.611874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.611926]  kthread+0x328/0x630
[   16.611976]  ret_from_fork+0x10/0x20
[   16.612141] 
[   16.612240] The buggy address belongs to the object at fff00000c4786200
[   16.612240]  which belongs to the cache kmalloc-256 of size 256
[   16.612412] The buggy address is located 33 bytes to the right of
[   16.612412]  allocated 201-byte region [fff00000c4786200, fff00000c47862c9)
[   16.612486] 
[   16.612505] The buggy address belongs to the physical page:
[   16.612693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104786
[   16.612751] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.612873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.612954] page_type: f5(slab)
[   16.612991] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.613205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.613259] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.613332] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.613450] head: 0bfffe0000000001 ffffc1ffc311e181 00000000ffffffff 00000000ffffffff
[   16.613567] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.613743] page dumped because: kasan: bad access detected
[   16.613777] 
[   16.613837] Memory state around the buggy address:
[   16.614007]  fff00000c4786180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.614097]  fff00000c4786200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.614235] >fff00000c4786280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.614273]                                                           ^
[   16.614626]  fff00000c4786300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.614716]  fff00000c4786380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.614967] ==================================================================

[   12.770091] ==================================================================
[   12.770514] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.770781] Write of size 1 at addr ffff88810272e0c9 by task kunit_try_catch/179
[   12.771020] 
[   12.771115] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.771161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.771173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.771194] Call Trace:
[   12.771207]  <TASK>
[   12.771533]  dump_stack_lvl+0x73/0xb0
[   12.771577]  print_report+0xd1/0x610
[   12.771602]  ? __virt_addr_valid+0x1db/0x2d0
[   12.771628]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.771654]  ? kasan_addr_to_slab+0x11/0xa0
[   12.771675]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.771700]  kasan_report+0x141/0x180
[   12.771722]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.771751]  __asan_report_store1_noabort+0x1b/0x30
[   12.771816]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.771843]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.771869]  ? finish_task_switch.isra.0+0x153/0x700
[   12.771894]  ? __switch_to+0x47/0xf50
[   12.771921]  ? __schedule+0x10cc/0x2b60
[   12.771945]  ? __pfx_read_tsc+0x10/0x10
[   12.771970]  krealloc_large_less_oob+0x1c/0x30
[   12.772120]  kunit_try_run_case+0x1a5/0x480
[   12.772149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.772173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.772199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.772223]  ? __kthread_parkme+0x82/0x180
[   12.772245]  ? preempt_count_sub+0x50/0x80
[   12.772280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.772305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.772330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.772356]  kthread+0x337/0x6f0
[   12.772375]  ? trace_preempt_on+0x20/0xc0
[   12.772400]  ? __pfx_kthread+0x10/0x10
[   12.772421]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.772443]  ? calculate_sigpending+0x7b/0xa0
[   12.772469]  ? __pfx_kthread+0x10/0x10
[   12.772490]  ret_from_fork+0x116/0x1d0
[   12.772509]  ? __pfx_kthread+0x10/0x10
[   12.772529]  ret_from_fork_asm+0x1a/0x30
[   12.772561]  </TASK>
[   12.772572] 
[   12.784681] The buggy address belongs to the physical page:
[   12.784875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272c
[   12.785471] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.787340] flags: 0x200000000000040(head|node=0|zone=2)
[   12.787538] page_type: f8(unknown)
[   12.787672] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.787955] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.788526] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.789406] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.789691] head: 0200000000000002 ffffea000409cb01 00000000ffffffff 00000000ffffffff
[   12.789920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.790683] page dumped because: kasan: bad access detected
[   12.791332] 
[   12.791547] Memory state around the buggy address:
[   12.792049]  ffff88810272df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.792872]  ffff88810272e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.793478] >ffff88810272e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.793692]                                               ^
[   12.793866]  ffff88810272e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.794091]  ffff88810272e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.794787] ==================================================================
[   12.669583] ==================================================================
[   12.669920] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.670512] Write of size 1 at addr ffff888100a2e0ea by task kunit_try_catch/175
[   12.670751] 
[   12.670843] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.670888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.670899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.670920] Call Trace:
[   12.670938]  <TASK>
[   12.670954]  dump_stack_lvl+0x73/0xb0
[   12.670984]  print_report+0xd1/0x610
[   12.671006]  ? __virt_addr_valid+0x1db/0x2d0
[   12.671029]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.671053]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.671076]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.671101]  kasan_report+0x141/0x180
[   12.671122]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.671151]  __asan_report_store1_noabort+0x1b/0x30
[   12.671176]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.671202]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.671227]  ? finish_task_switch.isra.0+0x153/0x700
[   12.671250]  ? __switch_to+0x47/0xf50
[   12.671288]  ? __schedule+0x10cc/0x2b60
[   12.671310]  ? __pfx_read_tsc+0x10/0x10
[   12.671334]  krealloc_less_oob+0x1c/0x30
[   12.671355]  kunit_try_run_case+0x1a5/0x480
[   12.671379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.671402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.671426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.671450]  ? __kthread_parkme+0x82/0x180
[   12.671470]  ? preempt_count_sub+0x50/0x80
[   12.671493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.671607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.671638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.671663]  kthread+0x337/0x6f0
[   12.671683]  ? trace_preempt_on+0x20/0xc0
[   12.671708]  ? __pfx_kthread+0x10/0x10
[   12.671728]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.671750]  ? calculate_sigpending+0x7b/0xa0
[   12.671774]  ? __pfx_kthread+0x10/0x10
[   12.671795]  ret_from_fork+0x116/0x1d0
[   12.671814]  ? __pfx_kthread+0x10/0x10
[   12.671834]  ret_from_fork_asm+0x1a/0x30
[   12.671864]  </TASK>
[   12.671875] 
[   12.681253] Allocated by task 175:
[   12.681409]  kasan_save_stack+0x45/0x70
[   12.681604]  kasan_save_track+0x18/0x40
[   12.681797]  kasan_save_alloc_info+0x3b/0x50
[   12.682013]  __kasan_krealloc+0x190/0x1f0
[   12.682213]  krealloc_noprof+0xf3/0x340
[   12.682396]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.682581]  krealloc_less_oob+0x1c/0x30
[   12.682735]  kunit_try_run_case+0x1a5/0x480
[   12.682944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.683215]  kthread+0x337/0x6f0
[   12.684203]  ret_from_fork+0x116/0x1d0
[   12.685304]  ret_from_fork_asm+0x1a/0x30
[   12.686327] 
[   12.686886] The buggy address belongs to the object at ffff888100a2e000
[   12.686886]  which belongs to the cache kmalloc-256 of size 256
[   12.688291] The buggy address is located 33 bytes to the right of
[   12.688291]  allocated 201-byte region [ffff888100a2e000, ffff888100a2e0c9)
[   12.689477] 
[   12.689908] The buggy address belongs to the physical page:
[   12.690803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2e
[   12.691350] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.691674] flags: 0x200000000000040(head|node=0|zone=2)
[   12.691924] page_type: f5(slab)
[   12.692081] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.692410] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.692714] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.693012] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.693381] head: 0200000000000001 ffffea0004028b81 00000000ffffffff 00000000ffffffff
[   12.693740] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.694293] page dumped because: kasan: bad access detected
[   12.694478] 
[   12.694572] Memory state around the buggy address:
[   12.694805]  ffff888100a2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.695189]  ffff888100a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.695504] >ffff888100a2e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.695751]                                                           ^
[   12.696106]  ffff888100a2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.696403]  ffff888100a2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.696690] ==================================================================
[   12.589514] ==================================================================
[   12.591519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.592769] Write of size 1 at addr ffff888100a2e0c9 by task kunit_try_catch/175
[   12.593739] 
[   12.593936] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.593986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.593998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.594020] Call Trace:
[   12.595058]  <TASK>
[   12.595084]  dump_stack_lvl+0x73/0xb0
[   12.595121]  print_report+0xd1/0x610
[   12.595145]  ? __virt_addr_valid+0x1db/0x2d0
[   12.595170]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.595194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.595217]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.595241]  kasan_report+0x141/0x180
[   12.595275]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.595303]  __asan_report_store1_noabort+0x1b/0x30
[   12.595330]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.595356]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.595381]  ? finish_task_switch.isra.0+0x153/0x700
[   12.595405]  ? __switch_to+0x47/0xf50
[   12.595431]  ? __schedule+0x10cc/0x2b60
[   12.595453]  ? __pfx_read_tsc+0x10/0x10
[   12.595477]  krealloc_less_oob+0x1c/0x30
[   12.595498]  kunit_try_run_case+0x1a5/0x480
[   12.595524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.595546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.595571]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.595594]  ? __kthread_parkme+0x82/0x180
[   12.595615]  ? preempt_count_sub+0x50/0x80
[   12.595638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.595662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.595686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.595711]  kthread+0x337/0x6f0
[   12.595729]  ? trace_preempt_on+0x20/0xc0
[   12.595754]  ? __pfx_kthread+0x10/0x10
[   12.595774]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.595796]  ? calculate_sigpending+0x7b/0xa0
[   12.595820]  ? __pfx_kthread+0x10/0x10
[   12.595841]  ret_from_fork+0x116/0x1d0
[   12.595859]  ? __pfx_kthread+0x10/0x10
[   12.595879]  ret_from_fork_asm+0x1a/0x30
[   12.595910]  </TASK>
[   12.595920] 
[   12.607948] Allocated by task 175:
[   12.608337]  kasan_save_stack+0x45/0x70
[   12.608686]  kasan_save_track+0x18/0x40
[   12.608920]  kasan_save_alloc_info+0x3b/0x50
[   12.609145]  __kasan_krealloc+0x190/0x1f0
[   12.609307]  krealloc_noprof+0xf3/0x340
[   12.609446]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.609610]  krealloc_less_oob+0x1c/0x30
[   12.609749]  kunit_try_run_case+0x1a5/0x480
[   12.609895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.610487]  kthread+0x337/0x6f0
[   12.610636]  ret_from_fork+0x116/0x1d0
[   12.610805]  ret_from_fork_asm+0x1a/0x30
[   12.611227] 
[   12.611457] The buggy address belongs to the object at ffff888100a2e000
[   12.611457]  which belongs to the cache kmalloc-256 of size 256
[   12.611973] The buggy address is located 0 bytes to the right of
[   12.611973]  allocated 201-byte region [ffff888100a2e000, ffff888100a2e0c9)
[   12.613172] 
[   12.613251] The buggy address belongs to the physical page:
[   12.613452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2e
[   12.613702] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.613931] flags: 0x200000000000040(head|node=0|zone=2)
[   12.614110] page_type: f5(slab)
[   12.614623] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.615372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.615618] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.615857] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.616579] head: 0200000000000001 ffffea0004028b81 00000000ffffffff 00000000ffffffff
[   12.618253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.618929] page dumped because: kasan: bad access detected
[   12.619408] 
[   12.619484] Memory state around the buggy address:
[   12.619638]  ffff888100a2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.620056]  ffff888100a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.620313] >ffff888100a2e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.620521]                                               ^
[   12.620692]  ffff888100a2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.621732]  ffff888100a2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.622208] ==================================================================
[   12.795537] ==================================================================
[   12.795789] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.796044] Write of size 1 at addr ffff88810272e0d0 by task kunit_try_catch/179
[   12.797726] 
[   12.798063] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.798321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.798334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.798355] Call Trace:
[   12.798367]  <TASK>
[   12.798385]  dump_stack_lvl+0x73/0xb0
[   12.798419]  print_report+0xd1/0x610
[   12.798442]  ? __virt_addr_valid+0x1db/0x2d0
[   12.798467]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.798492]  ? kasan_addr_to_slab+0x11/0xa0
[   12.798512]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.798537]  kasan_report+0x141/0x180
[   12.798559]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.798588]  __asan_report_store1_noabort+0x1b/0x30
[   12.798614]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.798640]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.798666]  ? finish_task_switch.isra.0+0x153/0x700
[   12.798689]  ? __switch_to+0x47/0xf50
[   12.798723]  ? __schedule+0x10cc/0x2b60
[   12.798747]  ? __pfx_read_tsc+0x10/0x10
[   12.798771]  krealloc_large_less_oob+0x1c/0x30
[   12.798795]  kunit_try_run_case+0x1a5/0x480
[   12.798820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.798844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.798868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.798892]  ? __kthread_parkme+0x82/0x180
[   12.798913]  ? preempt_count_sub+0x50/0x80
[   12.798936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.798961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.799118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.799147]  kthread+0x337/0x6f0
[   12.799181]  ? trace_preempt_on+0x20/0xc0
[   12.799206]  ? __pfx_kthread+0x10/0x10
[   12.799226]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.799291]  ? calculate_sigpending+0x7b/0xa0
[   12.799316]  ? __pfx_kthread+0x10/0x10
[   12.799338]  ret_from_fork+0x116/0x1d0
[   12.799358]  ? __pfx_kthread+0x10/0x10
[   12.799379]  ret_from_fork_asm+0x1a/0x30
[   12.799410]  </TASK>
[   12.799421] 
[   12.815628] The buggy address belongs to the physical page:
[   12.816194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272c
[   12.817308] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.818103] flags: 0x200000000000040(head|node=0|zone=2)
[   12.818766] page_type: f8(unknown)
[   12.819258] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.820100] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.820843] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.821688] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.822614] head: 0200000000000002 ffffea000409cb01 00000000ffffffff 00000000ffffffff
[   12.822912] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.823824] page dumped because: kasan: bad access detected
[   12.824483] 
[   12.824679] Memory state around the buggy address:
[   12.825203]  ffff88810272df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.825765]  ffff88810272e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.826000] >ffff88810272e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.826705]                                                  ^
[   12.827541]  ffff88810272e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.828334]  ffff88810272e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.828640] ==================================================================
[   12.697227] ==================================================================
[   12.697586] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.697873] Write of size 1 at addr ffff888100a2e0eb by task kunit_try_catch/175
[   12.698439] 
[   12.698553] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.698599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.698610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.698630] Call Trace:
[   12.698649]  <TASK>
[   12.698665]  dump_stack_lvl+0x73/0xb0
[   12.698695]  print_report+0xd1/0x610
[   12.698721]  ? __virt_addr_valid+0x1db/0x2d0
[   12.698745]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.698770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.698792]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.698817]  kasan_report+0x141/0x180
[   12.698838]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.698867]  __asan_report_store1_noabort+0x1b/0x30
[   12.698892]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.698918]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.698943]  ? finish_task_switch.isra.0+0x153/0x700
[   12.699048]  ? __switch_to+0x47/0xf50
[   12.699078]  ? __schedule+0x10cc/0x2b60
[   12.699100]  ? __pfx_read_tsc+0x10/0x10
[   12.699124]  krealloc_less_oob+0x1c/0x30
[   12.699146]  kunit_try_run_case+0x1a5/0x480
[   12.699171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.699194]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.699218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.699241]  ? __kthread_parkme+0x82/0x180
[   12.699273]  ? preempt_count_sub+0x50/0x80
[   12.699296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.699320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.699344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.699369]  kthread+0x337/0x6f0
[   12.699389]  ? trace_preempt_on+0x20/0xc0
[   12.699412]  ? __pfx_kthread+0x10/0x10
[   12.699432]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.699454]  ? calculate_sigpending+0x7b/0xa0
[   12.699478]  ? __pfx_kthread+0x10/0x10
[   12.699499]  ret_from_fork+0x116/0x1d0
[   12.699517]  ? __pfx_kthread+0x10/0x10
[   12.699539]  ret_from_fork_asm+0x1a/0x30
[   12.699570]  </TASK>
[   12.699580] 
[   12.707334] Allocated by task 175:
[   12.707474]  kasan_save_stack+0x45/0x70
[   12.707679]  kasan_save_track+0x18/0x40
[   12.707869]  kasan_save_alloc_info+0x3b/0x50
[   12.708157]  __kasan_krealloc+0x190/0x1f0
[   12.708372]  krealloc_noprof+0xf3/0x340
[   12.708565]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.708758]  krealloc_less_oob+0x1c/0x30
[   12.708902]  kunit_try_run_case+0x1a5/0x480
[   12.709186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.709459]  kthread+0x337/0x6f0
[   12.709632]  ret_from_fork+0x116/0x1d0
[   12.709816]  ret_from_fork_asm+0x1a/0x30
[   12.709957] 
[   12.710221] The buggy address belongs to the object at ffff888100a2e000
[   12.710221]  which belongs to the cache kmalloc-256 of size 256
[   12.710786] The buggy address is located 34 bytes to the right of
[   12.710786]  allocated 201-byte region [ffff888100a2e000, ffff888100a2e0c9)
[   12.711332] 
[   12.711408] The buggy address belongs to the physical page:
[   12.711644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2e
[   12.712089] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.712445] flags: 0x200000000000040(head|node=0|zone=2)
[   12.712699] page_type: f5(slab)
[   12.712863] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.713240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.713558] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.713873] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.714406] head: 0200000000000001 ffffea0004028b81 00000000ffffffff 00000000ffffffff
[   12.714646] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.715071] page dumped because: kasan: bad access detected
[   12.715334] 
[   12.715426] Memory state around the buggy address:
[   12.715585]  ffff888100a2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.715835]  ffff888100a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.716235] >ffff888100a2e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.716572]                                                           ^
[   12.716836]  ffff888100a2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.717185]  ffff888100a2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.717482] ==================================================================
[   12.854141] ==================================================================
[   12.854501] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.854853] Write of size 1 at addr ffff88810272e0ea by task kunit_try_catch/179
[   12.855293] 
[   12.855393] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.855437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.855449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.855480] Call Trace:
[   12.855500]  <TASK>
[   12.855519]  dump_stack_lvl+0x73/0xb0
[   12.855562]  print_report+0xd1/0x610
[   12.855586]  ? __virt_addr_valid+0x1db/0x2d0
[   12.855610]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.855635]  ? kasan_addr_to_slab+0x11/0xa0
[   12.855657]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.855683]  kasan_report+0x141/0x180
[   12.855705]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.855734]  __asan_report_store1_noabort+0x1b/0x30
[   12.855769]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.855796]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.855822]  ? finish_task_switch.isra.0+0x153/0x700
[   12.855857]  ? __switch_to+0x47/0xf50
[   12.855883]  ? __schedule+0x10cc/0x2b60
[   12.855906]  ? __pfx_read_tsc+0x10/0x10
[   12.855931]  krealloc_large_less_oob+0x1c/0x30
[   12.855954]  kunit_try_run_case+0x1a5/0x480
[   12.855990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.856014]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.856038]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.856062]  ? __kthread_parkme+0x82/0x180
[   12.856084]  ? preempt_count_sub+0x50/0x80
[   12.856107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.856201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.856237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.856273]  kthread+0x337/0x6f0
[   12.856293]  ? trace_preempt_on+0x20/0xc0
[   12.856318]  ? __pfx_kthread+0x10/0x10
[   12.856338]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.856360]  ? calculate_sigpending+0x7b/0xa0
[   12.856386]  ? __pfx_kthread+0x10/0x10
[   12.856407]  ret_from_fork+0x116/0x1d0
[   12.856426]  ? __pfx_kthread+0x10/0x10
[   12.856447]  ret_from_fork_asm+0x1a/0x30
[   12.856478]  </TASK>
[   12.856488] 
[   12.865436] The buggy address belongs to the physical page:
[   12.865710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272c
[   12.866098] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.866626] flags: 0x200000000000040(head|node=0|zone=2)
[   12.866907] page_type: f8(unknown)
[   12.867193] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.867515] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.867846] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.868371] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.868610] head: 0200000000000002 ffffea000409cb01 00000000ffffffff 00000000ffffffff
[   12.869007] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.869353] page dumped because: kasan: bad access detected
[   12.869539] 
[   12.869608] Memory state around the buggy address:
[   12.870135]  ffff88810272df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.870627]  ffff88810272e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.870938] >ffff88810272e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.871334]                                                           ^
[   12.871582]  ffff88810272e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.871915]  ffff88810272e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.872468] ==================================================================
[   12.648909] ==================================================================
[   12.649503] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.649832] Write of size 1 at addr ffff888100a2e0da by task kunit_try_catch/175
[   12.650127] 
[   12.650372] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.650418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.650431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.650452] Call Trace:
[   12.650471]  <TASK>
[   12.650487]  dump_stack_lvl+0x73/0xb0
[   12.650517]  print_report+0xd1/0x610
[   12.650539]  ? __virt_addr_valid+0x1db/0x2d0
[   12.650562]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.650586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.650609]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.650633]  kasan_report+0x141/0x180
[   12.650655]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.650683]  __asan_report_store1_noabort+0x1b/0x30
[   12.650716]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.650742]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.650767]  ? finish_task_switch.isra.0+0x153/0x700
[   12.650791]  ? __switch_to+0x47/0xf50
[   12.650816]  ? __schedule+0x10cc/0x2b60
[   12.650838]  ? __pfx_read_tsc+0x10/0x10
[   12.650862]  krealloc_less_oob+0x1c/0x30
[   12.650883]  kunit_try_run_case+0x1a5/0x480
[   12.650908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.650931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.650955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.650978]  ? __kthread_parkme+0x82/0x180
[   12.650999]  ? preempt_count_sub+0x50/0x80
[   12.651021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.651045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.651070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.651095]  kthread+0x337/0x6f0
[   12.651114]  ? trace_preempt_on+0x20/0xc0
[   12.651138]  ? __pfx_kthread+0x10/0x10
[   12.651219]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.651242]  ? calculate_sigpending+0x7b/0xa0
[   12.651280]  ? __pfx_kthread+0x10/0x10
[   12.651302]  ret_from_fork+0x116/0x1d0
[   12.651321]  ? __pfx_kthread+0x10/0x10
[   12.651341]  ret_from_fork_asm+0x1a/0x30
[   12.651381]  </TASK>
[   12.651391] 
[   12.659058] Allocated by task 175:
[   12.659244]  kasan_save_stack+0x45/0x70
[   12.659644]  kasan_save_track+0x18/0x40
[   12.659807]  kasan_save_alloc_info+0x3b/0x50
[   12.660086]  __kasan_krealloc+0x190/0x1f0
[   12.660275]  krealloc_noprof+0xf3/0x340
[   12.660450]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.660671]  krealloc_less_oob+0x1c/0x30
[   12.660843]  kunit_try_run_case+0x1a5/0x480
[   12.661101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.661334]  kthread+0x337/0x6f0
[   12.661490]  ret_from_fork+0x116/0x1d0
[   12.661674]  ret_from_fork_asm+0x1a/0x30
[   12.661846] 
[   12.661931] The buggy address belongs to the object at ffff888100a2e000
[   12.661931]  which belongs to the cache kmalloc-256 of size 256
[   12.662443] The buggy address is located 17 bytes to the right of
[   12.662443]  allocated 201-byte region [ffff888100a2e000, ffff888100a2e0c9)
[   12.662901] 
[   12.662972] The buggy address belongs to the physical page:
[   12.663146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2e
[   12.663474] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.663818] flags: 0x200000000000040(head|node=0|zone=2)
[   12.664075] page_type: f5(slab)
[   12.664246] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.664806] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.665133] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.665524] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.665846] head: 0200000000000001 ffffea0004028b81 00000000ffffffff 00000000ffffffff
[   12.666246] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.666492] page dumped because: kasan: bad access detected
[   12.666665] 
[   12.666740] Memory state around the buggy address:
[   12.666896]  ffff888100a2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.667190]  ffff888100a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.667527] >ffff888100a2e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.667847]                                                     ^
[   12.668124]  ffff888100a2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.668452]  ffff888100a2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.668956] ==================================================================
[   12.623233] ==================================================================
[   12.624304] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.625063] Write of size 1 at addr ffff888100a2e0d0 by task kunit_try_catch/175
[   12.625617] 
[   12.625737] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.625784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.625797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.625818] Call Trace:
[   12.625836]  <TASK>
[   12.625854]  dump_stack_lvl+0x73/0xb0
[   12.625884]  print_report+0xd1/0x610
[   12.625907]  ? __virt_addr_valid+0x1db/0x2d0
[   12.625931]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.625955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.625978]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.626373]  kasan_report+0x141/0x180
[   12.626398]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.626428]  __asan_report_store1_noabort+0x1b/0x30
[   12.626454]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.626481]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.626548]  ? finish_task_switch.isra.0+0x153/0x700
[   12.626573]  ? __switch_to+0x47/0xf50
[   12.626598]  ? __schedule+0x10cc/0x2b60
[   12.626621]  ? __pfx_read_tsc+0x10/0x10
[   12.626645]  krealloc_less_oob+0x1c/0x30
[   12.626666]  kunit_try_run_case+0x1a5/0x480
[   12.626691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.626721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.626746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.626770]  ? __kthread_parkme+0x82/0x180
[   12.626790]  ? preempt_count_sub+0x50/0x80
[   12.626813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.626837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.626861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.626886]  kthread+0x337/0x6f0
[   12.626905]  ? trace_preempt_on+0x20/0xc0
[   12.626929]  ? __pfx_kthread+0x10/0x10
[   12.626950]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.626971]  ? calculate_sigpending+0x7b/0xa0
[   12.627012]  ? __pfx_kthread+0x10/0x10
[   12.627049]  ret_from_fork+0x116/0x1d0
[   12.627067]  ? __pfx_kthread+0x10/0x10
[   12.627087]  ret_from_fork_asm+0x1a/0x30
[   12.627118]  </TASK>
[   12.627128] 
[   12.637501] Allocated by task 175:
[   12.637680]  kasan_save_stack+0x45/0x70
[   12.637875]  kasan_save_track+0x18/0x40
[   12.638177]  kasan_save_alloc_info+0x3b/0x50
[   12.638390]  __kasan_krealloc+0x190/0x1f0
[   12.638571]  krealloc_noprof+0xf3/0x340
[   12.638758]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.639135]  krealloc_less_oob+0x1c/0x30
[   12.639353]  kunit_try_run_case+0x1a5/0x480
[   12.639549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.639784]  kthread+0x337/0x6f0
[   12.639939]  ret_from_fork+0x116/0x1d0
[   12.640177]  ret_from_fork_asm+0x1a/0x30
[   12.640379] 
[   12.640471] The buggy address belongs to the object at ffff888100a2e000
[   12.640471]  which belongs to the cache kmalloc-256 of size 256
[   12.640962] The buggy address is located 7 bytes to the right of
[   12.640962]  allocated 201-byte region [ffff888100a2e000, ffff888100a2e0c9)
[   12.642475] 
[   12.642558] The buggy address belongs to the physical page:
[   12.642740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a2e
[   12.643198] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.643564] flags: 0x200000000000040(head|node=0|zone=2)
[   12.643777] page_type: f5(slab)
[   12.643948] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.644340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.644635] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.644950] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.645407] head: 0200000000000001 ffffea0004028b81 00000000ffffffff 00000000ffffffff
[   12.645711] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.645978] page dumped because: kasan: bad access detected
[   12.646360] 
[   12.646453] Memory state around the buggy address:
[   12.646643]  ffff888100a2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.646880]  ffff888100a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.647253] >ffff888100a2e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.647563]                                                  ^
[   12.647775]  ffff888100a2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.648062]  ffff888100a2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.648358] ==================================================================
[   12.872823] ==================================================================
[   12.873289] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.873635] Write of size 1 at addr ffff88810272e0eb by task kunit_try_catch/179
[   12.873864] 
[   12.873955] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.874198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.874214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.874235] Call Trace:
[   12.874255]  <TASK>
[   12.874282]  dump_stack_lvl+0x73/0xb0
[   12.874317]  print_report+0xd1/0x610
[   12.874342]  ? __virt_addr_valid+0x1db/0x2d0
[   12.874366]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.874391]  ? kasan_addr_to_slab+0x11/0xa0
[   12.874411]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.874436]  kasan_report+0x141/0x180
[   12.874458]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.874487]  __asan_report_store1_noabort+0x1b/0x30
[   12.874513]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.874540]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.874565]  ? finish_task_switch.isra.0+0x153/0x700
[   12.874589]  ? __switch_to+0x47/0xf50
[   12.874615]  ? __schedule+0x10cc/0x2b60
[   12.874637]  ? __pfx_read_tsc+0x10/0x10
[   12.874662]  krealloc_large_less_oob+0x1c/0x30
[   12.874685]  kunit_try_run_case+0x1a5/0x480
[   12.874716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.874740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.874765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.874789]  ? __kthread_parkme+0x82/0x180
[   12.874810]  ? preempt_count_sub+0x50/0x80
[   12.874833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.874858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.874883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.874909]  kthread+0x337/0x6f0
[   12.874927]  ? trace_preempt_on+0x20/0xc0
[   12.874952]  ? __pfx_kthread+0x10/0x10
[   12.874972]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.875063]  ? calculate_sigpending+0x7b/0xa0
[   12.875089]  ? __pfx_kthread+0x10/0x10
[   12.875110]  ret_from_fork+0x116/0x1d0
[   12.875130]  ? __pfx_kthread+0x10/0x10
[   12.875151]  ret_from_fork_asm+0x1a/0x30
[   12.875193]  </TASK>
[   12.875204] 
[   12.884607] The buggy address belongs to the physical page:
[   12.884810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272c
[   12.886010] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.887483] flags: 0x200000000000040(head|node=0|zone=2)
[   12.887754] page_type: f8(unknown)
[   12.887920] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.888228] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.888528] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.888837] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.889108] head: 0200000000000002 ffffea000409cb01 00000000ffffffff 00000000ffffffff
[   12.889693] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.889995] page dumped because: kasan: bad access detected
[   12.890247] 
[   12.890365] Memory state around the buggy address:
[   12.890596]  ffff88810272df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.891395]  ffff88810272e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.891729] >ffff88810272e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.892324]                                                           ^
[   12.892607]  ffff88810272e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.892987]  ffff88810272e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.893374] ==================================================================
[   12.828952] ==================================================================
[   12.829696] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.830429] Write of size 1 at addr ffff88810272e0da by task kunit_try_catch/179
[   12.831480] 
[   12.831693] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.831739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.831762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.831784] Call Trace:
[   12.831803]  <TASK>
[   12.831832]  dump_stack_lvl+0x73/0xb0
[   12.831865]  print_report+0xd1/0x610
[   12.831889]  ? __virt_addr_valid+0x1db/0x2d0
[   12.831913]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.831938]  ? kasan_addr_to_slab+0x11/0xa0
[   12.831959]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.832066]  kasan_report+0x141/0x180
[   12.832093]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.832123]  __asan_report_store1_noabort+0x1b/0x30
[   12.832149]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.832177]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.832203]  ? finish_task_switch.isra.0+0x153/0x700
[   12.832227]  ? __switch_to+0x47/0xf50
[   12.832253]  ? __schedule+0x10cc/0x2b60
[   12.832288]  ? __pfx_read_tsc+0x10/0x10
[   12.832313]  krealloc_large_less_oob+0x1c/0x30
[   12.832339]  kunit_try_run_case+0x1a5/0x480
[   12.832367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.832392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.832418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.832442]  ? __kthread_parkme+0x82/0x180
[   12.832464]  ? preempt_count_sub+0x50/0x80
[   12.832487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.832511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.832537]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.832563]  kthread+0x337/0x6f0
[   12.832583]  ? trace_preempt_on+0x20/0xc0
[   12.832608]  ? __pfx_kthread+0x10/0x10
[   12.832629]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.832651]  ? calculate_sigpending+0x7b/0xa0
[   12.832675]  ? __pfx_kthread+0x10/0x10
[   12.832697]  ret_from_fork+0x116/0x1d0
[   12.832716]  ? __pfx_kthread+0x10/0x10
[   12.832737]  ret_from_fork_asm+0x1a/0x30
[   12.832768]  </TASK>
[   12.832778] 
[   12.845547] The buggy address belongs to the physical page:
[   12.845745] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272c
[   12.846011] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.846922] flags: 0x200000000000040(head|node=0|zone=2)
[   12.847507] page_type: f8(unknown)
[   12.847856] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.848631] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.849393] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.850372] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.850616] head: 0200000000000002 ffffea000409cb01 00000000ffffffff 00000000ffffffff
[   12.850864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.851143] page dumped because: kasan: bad access detected
[   12.851486] 
[   12.851580] Memory state around the buggy address:
[   12.851755]  ffff88810272df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.852060]  ffff88810272e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.852314] >ffff88810272e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.852615]                                                     ^
[   12.852884]  ffff88810272e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.853181]  ffff88810272e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.853597] ==================================================================