Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.286550] ==================================================================
[   19.286601] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.286689] Write of size 1 at addr fff00000c64c60eb by task kunit_try_catch/162
[   19.286750] 
[   19.286779] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.286856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.286881] Hardware name: linux,dummy-virt (DT)
[   19.286919] Call trace:
[   19.286939]  show_stack+0x20/0x38 (C)
[   19.286987]  dump_stack_lvl+0x8c/0xd0
[   19.287032]  print_report+0x118/0x608
[   19.287085]  kasan_report+0xdc/0x128
[   19.287131]  __asan_report_store1_noabort+0x20/0x30
[   19.287193]  krealloc_less_oob_helper+0xa58/0xc50
[   19.287248]  krealloc_large_less_oob+0x20/0x38
[   19.287295]  kunit_try_run_case+0x170/0x3f0
[   19.287341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.287397]  kthread+0x328/0x630
[   19.287438]  ret_from_fork+0x10/0x20
[   19.287483] 
[   19.288142] The buggy address belongs to the physical page:
[   19.288196] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c4
[   19.288252] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.288536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.288793] page_type: f8(unknown)
[   19.288868] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.288944] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.289116] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.289367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.289547] head: 0bfffe0000000002 ffffc1ffc3193101 00000000ffffffff 00000000ffffffff
[   19.289650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.289859] page dumped because: kasan: bad access detected
[   19.289977] 
[   19.290020] Memory state around the buggy address:
[   19.290051]  fff00000c64c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.290263]  fff00000c64c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.290384] >fff00000c64c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.290503]                                                           ^
[   19.290659]  fff00000c64c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.290895]  fff00000c64c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.291248] ==================================================================
[   19.196771] ==================================================================
[   19.196817] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.196864] Write of size 1 at addr fff00000c454ced0 by task kunit_try_catch/158
[   19.196912] 
[   19.196970] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.197388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.197725] Hardware name: linux,dummy-virt (DT)
[   19.197768] Call trace:
[   19.197828]  show_stack+0x20/0x38 (C)
[   19.197896]  dump_stack_lvl+0x8c/0xd0
[   19.198000]  print_report+0x118/0x608
[   19.198088]  kasan_report+0xdc/0x128
[   19.198182]  __asan_report_store1_noabort+0x20/0x30
[   19.198234]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.198486]  krealloc_less_oob+0x20/0x38
[   19.198546]  kunit_try_run_case+0x170/0x3f0
[   19.198635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.198688]  kthread+0x328/0x630
[   19.198731]  ret_from_fork+0x10/0x20
[   19.199175] 
[   19.199213] Allocated by task 158:
[   19.199250]  kasan_save_stack+0x3c/0x68
[   19.199301]  kasan_save_track+0x20/0x40
[   19.199348]  kasan_save_alloc_info+0x40/0x58
[   19.199424]  __kasan_krealloc+0x118/0x178
[   19.199501]  krealloc_noprof+0x128/0x360
[   19.199569]  krealloc_less_oob_helper+0x168/0xc50
[   19.199607]  krealloc_less_oob+0x20/0x38
[   19.199642]  kunit_try_run_case+0x170/0x3f0
[   19.199922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.200019]  kthread+0x328/0x630
[   19.200587]  ret_from_fork+0x10/0x20
[   19.200683] 
[   19.200775] The buggy address belongs to the object at fff00000c454ce00
[   19.200775]  which belongs to the cache kmalloc-256 of size 256
[   19.200912] The buggy address is located 7 bytes to the right of
[   19.200912]  allocated 201-byte region [fff00000c454ce00, fff00000c454cec9)
[   19.201045] 
[   19.201063] The buggy address belongs to the physical page:
[   19.201093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   19.201433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.201493] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.201790] page_type: f5(slab)
[   19.201944] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.202043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.202183] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.202314] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.202427] head: 0bfffe0000000001 ffffc1ffc3115301 00000000ffffffff 00000000ffffffff
[   19.202540] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.202678] page dumped because: kasan: bad access detected
[   19.202755] 
[   19.202837] Memory state around the buggy address:
[   19.202901]  fff00000c454cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.202982]  fff00000c454ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.203348] >fff00000c454ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.203438]                                                  ^
[   19.203591]  fff00000c454cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.203654]  fff00000c454cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.203692] ==================================================================
[   19.190466] ==================================================================
[   19.190520] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.190570] Write of size 1 at addr fff00000c454cec9 by task kunit_try_catch/158
[   19.190618] 
[   19.190651] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.190728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.190755] Hardware name: linux,dummy-virt (DT)
[   19.190785] Call trace:
[   19.190806]  show_stack+0x20/0x38 (C)
[   19.190853]  dump_stack_lvl+0x8c/0xd0
[   19.190903]  print_report+0x118/0x608
[   19.190948]  kasan_report+0xdc/0x128
[   19.191014]  __asan_report_store1_noabort+0x20/0x30
[   19.191065]  krealloc_less_oob_helper+0xa48/0xc50
[   19.191121]  krealloc_less_oob+0x20/0x38
[   19.191177]  kunit_try_run_case+0x170/0x3f0
[   19.191224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.191275]  kthread+0x328/0x630
[   19.191380]  ret_from_fork+0x10/0x20
[   19.191972] 
[   19.192027] Allocated by task 158:
[   19.192055]  kasan_save_stack+0x3c/0x68
[   19.192138]  kasan_save_track+0x20/0x40
[   19.192209]  kasan_save_alloc_info+0x40/0x58
[   19.192305]  __kasan_krealloc+0x118/0x178
[   19.192373]  krealloc_noprof+0x128/0x360
[   19.192479]  krealloc_less_oob_helper+0x168/0xc50
[   19.192529]  krealloc_less_oob+0x20/0x38
[   19.192565]  kunit_try_run_case+0x170/0x3f0
[   19.192601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.192642]  kthread+0x328/0x630
[   19.192881]  ret_from_fork+0x10/0x20
[   19.192924] 
[   19.193022] The buggy address belongs to the object at fff00000c454ce00
[   19.193022]  which belongs to the cache kmalloc-256 of size 256
[   19.193230] The buggy address is located 0 bytes to the right of
[   19.193230]  allocated 201-byte region [fff00000c454ce00, fff00000c454cec9)
[   19.193402] 
[   19.193462] The buggy address belongs to the physical page:
[   19.193578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   19.193668] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.193770] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.193886] page_type: f5(slab)
[   19.193944] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.194037] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.194087] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.194493] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.194637] head: 0bfffe0000000001 ffffc1ffc3115301 00000000ffffffff 00000000ffffffff
[   19.194755] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.194864] page dumped because: kasan: bad access detected
[   19.194958] 
[   19.195075] Memory state around the buggy address:
[   19.195273]  fff00000c454cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.195343]  fff00000c454ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.195385] >fff00000c454ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.195421]                                               ^
[   19.195454]  fff00000c454cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.195672]  fff00000c454cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.195753] ==================================================================
[   19.274949] ==================================================================
[   19.274995] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.275243] Write of size 1 at addr fff00000c64c60ea by task kunit_try_catch/162
[   19.275304] 
[   19.275335] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.275880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.275918] Hardware name: linux,dummy-virt (DT)
[   19.276369] Call trace:
[   19.276942]  show_stack+0x20/0x38 (C)
[   19.277014]  dump_stack_lvl+0x8c/0xd0
[   19.277446]  print_report+0x118/0x608
[   19.277573]  kasan_report+0xdc/0x128
[   19.277743]  __asan_report_store1_noabort+0x20/0x30
[   19.278026]  krealloc_less_oob_helper+0xae4/0xc50
[   19.278373]  krealloc_large_less_oob+0x20/0x38
[   19.278650]  kunit_try_run_case+0x170/0x3f0
[   19.278807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.279030]  kthread+0x328/0x630
[   19.279376]  ret_from_fork+0x10/0x20
[   19.279679] 
[   19.279754] The buggy address belongs to the physical page:
[   19.279868] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c4
[   19.280035] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.280152] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.280304] page_type: f8(unknown)
[   19.280374] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.280644] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.280743] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.280928] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.281027] head: 0bfffe0000000002 ffffc1ffc3193101 00000000ffffffff 00000000ffffffff
[   19.281244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.281479] page dumped because: kasan: bad access detected
[   19.281675] 
[   19.281799] Memory state around the buggy address:
[   19.281972]  fff00000c64c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.282026]  fff00000c64c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.282067] >fff00000c64c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.282104]                                                           ^
[   19.282143]  fff00000c64c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.282512]  fff00000c64c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.282904] ==================================================================
[   19.262151] ==================================================================
[   19.262253] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.262313] Write of size 1 at addr fff00000c64c60d0 by task kunit_try_catch/162
[   19.262637] 
[   19.262781] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.262869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.262899] Hardware name: linux,dummy-virt (DT)
[   19.262928] Call trace:
[   19.263094]  show_stack+0x20/0x38 (C)
[   19.263218]  dump_stack_lvl+0x8c/0xd0
[   19.263271]  print_report+0x118/0x608
[   19.263317]  kasan_report+0xdc/0x128
[   19.263401]  __asan_report_store1_noabort+0x20/0x30
[   19.263453]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.263501]  krealloc_large_less_oob+0x20/0x38
[   19.264003]  kunit_try_run_case+0x170/0x3f0
[   19.264226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.264424]  kthread+0x328/0x630
[   19.264473]  ret_from_fork+0x10/0x20
[   19.264520] 
[   19.264692] The buggy address belongs to the physical page:
[   19.264836] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c4
[   19.265055] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.265150] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.265325] page_type: f8(unknown)
[   19.265411] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.265854] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.265934] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.266081] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.266238] head: 0bfffe0000000002 ffffc1ffc3193101 00000000ffffffff 00000000ffffffff
[   19.266345] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.266765] page dumped because: kasan: bad access detected
[   19.266826] 
[   19.266906] Memory state around the buggy address:
[   19.267057]  fff00000c64c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.267240]  fff00000c64c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.267425] >fff00000c64c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.267468]                                                  ^
[   19.267895]  fff00000c64c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.268068]  fff00000c64c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.268197] ==================================================================
[   19.211469] ==================================================================
[   19.211512] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.212122] Write of size 1 at addr fff00000c454ceea by task kunit_try_catch/158
[   19.212231] 
[   19.212383] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.212499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.212525] Hardware name: linux,dummy-virt (DT)
[   19.212554] Call trace:
[   19.212574]  show_stack+0x20/0x38 (C)
[   19.212787]  dump_stack_lvl+0x8c/0xd0
[   19.212952]  print_report+0x118/0x608
[   19.213113]  kasan_report+0xdc/0x128
[   19.213258]  __asan_report_store1_noabort+0x20/0x30
[   19.213343]  krealloc_less_oob_helper+0xae4/0xc50
[   19.213392]  krealloc_less_oob+0x20/0x38
[   19.213636]  kunit_try_run_case+0x170/0x3f0
[   19.213806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.213902]  kthread+0x328/0x630
[   19.213964]  ret_from_fork+0x10/0x20
[   19.214044] 
[   19.214062] Allocated by task 158:
[   19.214089]  kasan_save_stack+0x3c/0x68
[   19.214139]  kasan_save_track+0x20/0x40
[   19.214189]  kasan_save_alloc_info+0x40/0x58
[   19.214228]  __kasan_krealloc+0x118/0x178
[   19.214391]  krealloc_noprof+0x128/0x360
[   19.214534]  krealloc_less_oob_helper+0x168/0xc50
[   19.214578]  krealloc_less_oob+0x20/0x38
[   19.214625]  kunit_try_run_case+0x170/0x3f0
[   19.214739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.214782]  kthread+0x328/0x630
[   19.214814]  ret_from_fork+0x10/0x20
[   19.215044] 
[   19.215143] The buggy address belongs to the object at fff00000c454ce00
[   19.215143]  which belongs to the cache kmalloc-256 of size 256
[   19.215330] The buggy address is located 33 bytes to the right of
[   19.215330]  allocated 201-byte region [fff00000c454ce00, fff00000c454cec9)
[   19.215551] 
[   19.215608] The buggy address belongs to the physical page:
[   19.215723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   19.215827] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.215888] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.215937] page_type: f5(slab)
[   19.216405] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.216499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.216647] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.216737] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.216820] head: 0bfffe0000000001 ffffc1ffc3115301 00000000ffffffff 00000000ffffffff
[   19.216998] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.217215] page dumped because: kasan: bad access detected
[   19.217344] 
[   19.217462] Memory state around the buggy address:
[   19.217557]  fff00000c454cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.217601]  fff00000c454ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.218049] >fff00000c454ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.218238]                                                           ^
[   19.218345]  fff00000c454cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.218478]  fff00000c454cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.218528] ==================================================================
[   19.268865] ==================================================================
[   19.268912] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.269293] Write of size 1 at addr fff00000c64c60da by task kunit_try_catch/162
[   19.269385] 
[   19.269417] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.269891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.270027] Hardware name: linux,dummy-virt (DT)
[   19.270065] Call trace:
[   19.270172]  show_stack+0x20/0x38 (C)
[   19.270229]  dump_stack_lvl+0x8c/0xd0
[   19.270275]  print_report+0x118/0x608
[   19.270327]  kasan_report+0xdc/0x128
[   19.270372]  __asan_report_store1_noabort+0x20/0x30
[   19.270422]  krealloc_less_oob_helper+0xa80/0xc50
[   19.270469]  krealloc_large_less_oob+0x20/0x38
[   19.270515]  kunit_try_run_case+0x170/0x3f0
[   19.270608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.270661]  kthread+0x328/0x630
[   19.270701]  ret_from_fork+0x10/0x20
[   19.270747] 
[   19.270766] The buggy address belongs to the physical page:
[   19.270805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c4
[   19.270868] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.270918] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.270967] page_type: f8(unknown)
[   19.271004] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.271061] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.271110] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.271512] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.271579] head: 0bfffe0000000002 ffffc1ffc3193101 00000000ffffffff 00000000ffffffff
[   19.271941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.271994] page dumped because: kasan: bad access detected
[   19.272298] 
[   19.272450] Memory state around the buggy address:
[   19.272697]  fff00000c64c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.272975]  fff00000c64c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.273130] >fff00000c64c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.273340]                                                     ^
[   19.273418]  fff00000c64c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.273552]  fff00000c64c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.273612] ==================================================================
[   19.219695] ==================================================================
[   19.219798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.219860] Write of size 1 at addr fff00000c454ceeb by task kunit_try_catch/158
[   19.220146] 
[   19.220333] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.220427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.220750] Hardware name: linux,dummy-virt (DT)
[   19.220874] Call trace:
[   19.220984]  show_stack+0x20/0x38 (C)
[   19.221081]  dump_stack_lvl+0x8c/0xd0
[   19.221256]  print_report+0x118/0x608
[   19.221347]  kasan_report+0xdc/0x128
[   19.221456]  __asan_report_store1_noabort+0x20/0x30
[   19.221541]  krealloc_less_oob_helper+0xa58/0xc50
[   19.221769]  krealloc_less_oob+0x20/0x38
[   19.221965]  kunit_try_run_case+0x170/0x3f0
[   19.222095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.222265]  kthread+0x328/0x630
[   19.222341]  ret_from_fork+0x10/0x20
[   19.222388] 
[   19.222572] Allocated by task 158:
[   19.222698]  kasan_save_stack+0x3c/0x68
[   19.222822]  kasan_save_track+0x20/0x40
[   19.222984]  kasan_save_alloc_info+0x40/0x58
[   19.223104]  __kasan_krealloc+0x118/0x178
[   19.223181]  krealloc_noprof+0x128/0x360
[   19.223217]  krealloc_less_oob_helper+0x168/0xc50
[   19.223264]  krealloc_less_oob+0x20/0x38
[   19.223308]  kunit_try_run_case+0x170/0x3f0
[   19.223344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.223386]  kthread+0x328/0x630
[   19.223444]  ret_from_fork+0x10/0x20
[   19.223485] 
[   19.223505] The buggy address belongs to the object at fff00000c454ce00
[   19.223505]  which belongs to the cache kmalloc-256 of size 256
[   19.223561] The buggy address is located 34 bytes to the right of
[   19.223561]  allocated 201-byte region [fff00000c454ce00, fff00000c454cec9)
[   19.223712] 
[   19.223822] The buggy address belongs to the physical page:
[   19.223887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   19.223940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.223985] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.224034] page_type: f5(slab)
[   19.224071] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.224121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.224365] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.224519] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.224602] head: 0bfffe0000000001 ffffc1ffc3115301 00000000ffffffff 00000000ffffffff
[   19.224977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.225129] page dumped because: kasan: bad access detected
[   19.225321] 
[   19.225392] Memory state around the buggy address:
[   19.225453]  fff00000c454cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.225495]  fff00000c454ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.225854] >fff00000c454ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.225994]                                                           ^
[   19.226110]  fff00000c454cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.226230]  fff00000c454cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.226329] ==================================================================
[   19.206791] ==================================================================
[   19.206842] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.206991] Write of size 1 at addr fff00000c454ceda by task kunit_try_catch/158
[   19.207043] 
[   19.207262] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.207379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.207405] Hardware name: linux,dummy-virt (DT)
[   19.207436] Call trace:
[   19.207457]  show_stack+0x20/0x38 (C)
[   19.207581]  dump_stack_lvl+0x8c/0xd0
[   19.207641]  print_report+0x118/0x608
[   19.207711]  kasan_report+0xdc/0x128
[   19.207983]  __asan_report_store1_noabort+0x20/0x30
[   19.208101]  krealloc_less_oob_helper+0xa80/0xc50
[   19.208274]  krealloc_less_oob+0x20/0x38
[   19.208351]  kunit_try_run_case+0x170/0x3f0
[   19.208400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.208549]  kthread+0x328/0x630
[   19.208591]  ret_from_fork+0x10/0x20
[   19.208887] 
[   19.208937] Allocated by task 158:
[   19.209087]  kasan_save_stack+0x3c/0x68
[   19.209230]  kasan_save_track+0x20/0x40
[   19.209354]  kasan_save_alloc_info+0x40/0x58
[   19.209396]  __kasan_krealloc+0x118/0x178
[   19.209651]  krealloc_noprof+0x128/0x360
[   19.209800]  krealloc_less_oob_helper+0x168/0xc50
[   19.209881]  krealloc_less_oob+0x20/0x38
[   19.209939]  kunit_try_run_case+0x170/0x3f0
[   19.209975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.210017]  kthread+0x328/0x630
[   19.210057]  ret_from_fork+0x10/0x20
[   19.210102] 
[   19.210120] The buggy address belongs to the object at fff00000c454ce00
[   19.210120]  which belongs to the cache kmalloc-256 of size 256
[   19.210197] The buggy address is located 17 bytes to the right of
[   19.210197]  allocated 201-byte region [fff00000c454ce00, fff00000c454cec9)
[   19.210261] 
[   19.210289] The buggy address belongs to the physical page:
[   19.210326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c
[   19.210380] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.210428] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.210484] page_type: f5(slab)
[   19.210522] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.210579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.210628] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.210685] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.210733] head: 0bfffe0000000001 ffffc1ffc3115301 00000000ffffffff 00000000ffffffff
[   19.210802] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.210841] page dumped because: kasan: bad access detected
[   19.210870] 
[   19.210899] Memory state around the buggy address:
[   19.210929]  fff00000c454cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.210970]  fff00000c454ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.211011] >fff00000c454ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.211056]                                                     ^
[   19.211092]  fff00000c454cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211165]  fff00000c454cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211201] ==================================================================
[   19.254228] ==================================================================
[   19.254283] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.254529] Write of size 1 at addr fff00000c64c60c9 by task kunit_try_catch/162
[   19.254917] 
[   19.255021] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.255109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.255291] Hardware name: linux,dummy-virt (DT)
[   19.255345] Call trace:
[   19.255406]  show_stack+0x20/0x38 (C)
[   19.255579]  dump_stack_lvl+0x8c/0xd0
[   19.255628]  print_report+0x118/0x608
[   19.256073]  kasan_report+0xdc/0x128
[   19.256203]  __asan_report_store1_noabort+0x20/0x30
[   19.256410]  krealloc_less_oob_helper+0xa48/0xc50
[   19.256617]  krealloc_large_less_oob+0x20/0x38
[   19.256710]  kunit_try_run_case+0x170/0x3f0
[   19.256858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.256971]  kthread+0x328/0x630
[   19.257133]  ret_from_fork+0x10/0x20
[   19.257438] 
[   19.257501] The buggy address belongs to the physical page:
[   19.257669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c4
[   19.257803] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.257986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.258038] page_type: f8(unknown)
[   19.258272] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.258582] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.258804] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.259091] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.259313] head: 0bfffe0000000002 ffffc1ffc3193101 00000000ffffffff 00000000ffffffff
[   19.259470] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.259609] page dumped because: kasan: bad access detected
[   19.259902] 
[   19.259976] Memory state around the buggy address:
[   19.260008]  fff00000c64c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.260056]  fff00000c64c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.260098] >fff00000c64c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.260373]                                               ^
[   19.260485]  fff00000c64c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.260656]  fff00000c64c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.260814] ==================================================================

[   12.398182] ==================================================================
[   12.398473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.399000] Write of size 1 at addr ffff8881029760eb by task kunit_try_catch/180
[   12.399679] 
[   12.399797] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.399838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.399849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.399868] Call Trace:
[   12.399882]  <TASK>
[   12.399896]  dump_stack_lvl+0x73/0xb0
[   12.399924]  print_report+0xd1/0x650
[   12.400271]  ? __virt_addr_valid+0x1db/0x2d0
[   12.400298]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.400322]  ? kasan_addr_to_slab+0x11/0xa0
[   12.400342]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.400367]  kasan_report+0x141/0x180
[   12.400388]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.400417]  __asan_report_store1_noabort+0x1b/0x30
[   12.400442]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.400468]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.400492]  ? finish_task_switch.isra.0+0x153/0x700
[   12.400647]  ? __switch_to+0x47/0xf50
[   12.400672]  ? __schedule+0x10cc/0x2b60
[   12.400693]  ? __pfx_read_tsc+0x10/0x10
[   12.400717]  krealloc_large_less_oob+0x1c/0x30
[   12.400740]  kunit_try_run_case+0x1a5/0x480
[   12.400764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.400786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.400808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.400831]  ? __kthread_parkme+0x82/0x180
[   12.400851]  ? preempt_count_sub+0x50/0x80
[   12.400873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.400897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.400954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.400997]  kthread+0x337/0x6f0
[   12.401018]  ? trace_preempt_on+0x20/0xc0
[   12.401043]  ? __pfx_kthread+0x10/0x10
[   12.401064]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.401086]  ? calculate_sigpending+0x7b/0xa0
[   12.401110]  ? __pfx_kthread+0x10/0x10
[   12.401131]  ret_from_fork+0x116/0x1d0
[   12.401149]  ? __pfx_kthread+0x10/0x10
[   12.401169]  ret_from_fork_asm+0x1a/0x30
[   12.401200]  </TASK>
[   12.401210] 
[   12.414322] The buggy address belongs to the physical page:
[   12.414541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102974
[   12.415326] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.416056] flags: 0x200000000000040(head|node=0|zone=2)
[   12.416565] page_type: f8(unknown)
[   12.416815] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.417464] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.418007] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.418622] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.418856] head: 0200000000000002 ffffea00040a5d01 00000000ffffffff 00000000ffffffff
[   12.419358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.420065] page dumped because: kasan: bad access detected
[   12.420467] 
[   12.420703] Memory state around the buggy address:
[   12.421089]  ffff888102975f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.421415]  ffff888102976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.422212] >ffff888102976080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.422671]                                                           ^
[   12.422871]  ffff888102976100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.423084]  ffff888102976180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.423315] ==================================================================
[   12.375524] ==================================================================
[   12.375771] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.376993] Write of size 1 at addr ffff8881029760ea by task kunit_try_catch/180
[   12.377317] 
[   12.377429] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.377554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.377566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.377585] Call Trace:
[   12.377679]  <TASK>
[   12.377696]  dump_stack_lvl+0x73/0xb0
[   12.377732]  print_report+0xd1/0x650
[   12.377754]  ? __virt_addr_valid+0x1db/0x2d0
[   12.377776]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.377801]  ? kasan_addr_to_slab+0x11/0xa0
[   12.377821]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.377845]  kasan_report+0x141/0x180
[   12.377866]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.377895]  __asan_report_store1_noabort+0x1b/0x30
[   12.377979]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.378008]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.378033]  ? finish_task_switch.isra.0+0x153/0x700
[   12.378055]  ? __switch_to+0x47/0xf50
[   12.378080]  ? __schedule+0x10cc/0x2b60
[   12.378101]  ? __pfx_read_tsc+0x10/0x10
[   12.378125]  krealloc_large_less_oob+0x1c/0x30
[   12.378148]  kunit_try_run_case+0x1a5/0x480
[   12.378172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.378194]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.378257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.378281]  ? __kthread_parkme+0x82/0x180
[   12.378301]  ? preempt_count_sub+0x50/0x80
[   12.378324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.378347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.378371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.378396]  kthread+0x337/0x6f0
[   12.378414]  ? trace_preempt_on+0x20/0xc0
[   12.378437]  ? __pfx_kthread+0x10/0x10
[   12.378457]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.378477]  ? calculate_sigpending+0x7b/0xa0
[   12.378500]  ? __pfx_kthread+0x10/0x10
[   12.378521]  ret_from_fork+0x116/0x1d0
[   12.378539]  ? __pfx_kthread+0x10/0x10
[   12.378558]  ret_from_fork_asm+0x1a/0x30
[   12.378589]  </TASK>
[   12.378609] 
[   12.389452] The buggy address belongs to the physical page:
[   12.389851] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102974
[   12.390303] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.390792] flags: 0x200000000000040(head|node=0|zone=2)
[   12.391075] page_type: f8(unknown)
[   12.391377] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.391742] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.392223] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.392851] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.393321] head: 0200000000000002 ffffea00040a5d01 00000000ffffffff 00000000ffffffff
[   12.393806] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.394288] page dumped because: kasan: bad access detected
[   12.394586] 
[   12.394696] Memory state around the buggy address:
[   12.394861]  ffff888102975f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.395465]  ffff888102976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.395817] >ffff888102976080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.396464]                                                           ^
[   12.396810]  ffff888102976100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.397265]  ffff888102976180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.397547] ==================================================================
[   12.182582] ==================================================================
[   12.182838] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.183178] Write of size 1 at addr ffff8881003454da by task kunit_try_catch/176
[   12.183514] 
[   12.183725] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.183785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.183797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.183816] Call Trace:
[   12.183830]  <TASK>
[   12.183855]  dump_stack_lvl+0x73/0xb0
[   12.183884]  print_report+0xd1/0x650
[   12.183965]  ? __virt_addr_valid+0x1db/0x2d0
[   12.184008]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.184033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.184056]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.184091]  kasan_report+0x141/0x180
[   12.184113]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.184142]  __asan_report_store1_noabort+0x1b/0x30
[   12.184178]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.184205]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.184256]  ? finish_task_switch.isra.0+0x153/0x700
[   12.184292]  ? __switch_to+0x47/0xf50
[   12.184329]  ? __schedule+0x10cc/0x2b60
[   12.184364]  ? __pfx_read_tsc+0x10/0x10
[   12.184388]  krealloc_less_oob+0x1c/0x30
[   12.184421]  kunit_try_run_case+0x1a5/0x480
[   12.184445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.184467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.184508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.184532]  ? __kthread_parkme+0x82/0x180
[   12.184552]  ? preempt_count_sub+0x50/0x80
[   12.184575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.184610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.184634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.184659]  kthread+0x337/0x6f0
[   12.184677]  ? trace_preempt_on+0x20/0xc0
[   12.184700]  ? __pfx_kthread+0x10/0x10
[   12.184721]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.184742]  ? calculate_sigpending+0x7b/0xa0
[   12.184765]  ? __pfx_kthread+0x10/0x10
[   12.184786]  ret_from_fork+0x116/0x1d0
[   12.184804]  ? __pfx_kthread+0x10/0x10
[   12.184824]  ret_from_fork_asm+0x1a/0x30
[   12.184855]  </TASK>
[   12.184864] 
[   12.196544] Allocated by task 176:
[   12.197394]  kasan_save_stack+0x45/0x70
[   12.197740]  kasan_save_track+0x18/0x40
[   12.198257]  kasan_save_alloc_info+0x3b/0x50
[   12.198635]  __kasan_krealloc+0x190/0x1f0
[   12.199024]  krealloc_noprof+0xf3/0x340
[   12.199415]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.199682]  krealloc_less_oob+0x1c/0x30
[   12.199887]  kunit_try_run_case+0x1a5/0x480
[   12.200339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.200737]  kthread+0x337/0x6f0
[   12.201167]  ret_from_fork+0x116/0x1d0
[   12.201505]  ret_from_fork_asm+0x1a/0x30
[   12.201870] 
[   12.201980] The buggy address belongs to the object at ffff888100345400
[   12.201980]  which belongs to the cache kmalloc-256 of size 256
[   12.202461] The buggy address is located 17 bytes to the right of
[   12.202461]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   12.203620] 
[   12.203729] The buggy address belongs to the physical page:
[   12.204298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   12.204809] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.205336] flags: 0x200000000000040(head|node=0|zone=2)
[   12.205773] page_type: f5(slab)
[   12.206174] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.206654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.207323] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.207801] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.208333] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   12.208849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.209268] page dumped because: kasan: bad access detected
[   12.209520] 
[   12.209649] Memory state around the buggy address:
[   12.209849]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.210235]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.210576] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.211088]                                                     ^
[   12.211376]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.211723]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.212118] ==================================================================
[   12.157022] ==================================================================
[   12.157414] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.157764] Write of size 1 at addr ffff8881003454d0 by task kunit_try_catch/176
[   12.158279] 
[   12.158373] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.158412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.158469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.158510] Call Trace:
[   12.158521]  <TASK>
[   12.158576]  dump_stack_lvl+0x73/0xb0
[   12.158662]  print_report+0xd1/0x650
[   12.158683]  ? __virt_addr_valid+0x1db/0x2d0
[   12.158717]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.158741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.158764]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.158788]  kasan_report+0x141/0x180
[   12.158809]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.158838]  __asan_report_store1_noabort+0x1b/0x30
[   12.158863]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.158889]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.158913]  ? finish_task_switch.isra.0+0x153/0x700
[   12.159149]  ? __switch_to+0x47/0xf50
[   12.159177]  ? __schedule+0x10cc/0x2b60
[   12.159199]  ? __pfx_read_tsc+0x10/0x10
[   12.159223]  krealloc_less_oob+0x1c/0x30
[   12.159245]  kunit_try_run_case+0x1a5/0x480
[   12.159268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.159291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.159314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.159337]  ? __kthread_parkme+0x82/0x180
[   12.159357]  ? preempt_count_sub+0x50/0x80
[   12.159379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.159404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.159427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.159452]  kthread+0x337/0x6f0
[   12.159470]  ? trace_preempt_on+0x20/0xc0
[   12.159493]  ? __pfx_kthread+0x10/0x10
[   12.159526]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.159547]  ? calculate_sigpending+0x7b/0xa0
[   12.159571]  ? __pfx_kthread+0x10/0x10
[   12.159592]  ret_from_fork+0x116/0x1d0
[   12.159622]  ? __pfx_kthread+0x10/0x10
[   12.159642]  ret_from_fork_asm+0x1a/0x30
[   12.159673]  </TASK>
[   12.159683] 
[   12.169541] Allocated by task 176:
[   12.169710]  kasan_save_stack+0x45/0x70
[   12.169868]  kasan_save_track+0x18/0x40
[   12.170401]  kasan_save_alloc_info+0x3b/0x50
[   12.170701]  __kasan_krealloc+0x190/0x1f0
[   12.170874]  krealloc_noprof+0xf3/0x340
[   12.171157]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.171531]  krealloc_less_oob+0x1c/0x30
[   12.171824]  kunit_try_run_case+0x1a5/0x480
[   12.172280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.172572]  kthread+0x337/0x6f0
[   12.172796]  ret_from_fork+0x116/0x1d0
[   12.172988]  ret_from_fork_asm+0x1a/0x30
[   12.173245] 
[   12.173418] The buggy address belongs to the object at ffff888100345400
[   12.173418]  which belongs to the cache kmalloc-256 of size 256
[   12.173912] The buggy address is located 7 bytes to the right of
[   12.173912]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   12.174440] 
[   12.174808] The buggy address belongs to the physical page:
[   12.175050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   12.175550] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.176025] flags: 0x200000000000040(head|node=0|zone=2)
[   12.176228] page_type: f5(slab)
[   12.176445] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.176807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.177286] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.177670] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.178134] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   12.178631] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.179094] page dumped because: kasan: bad access detected
[   12.179302] 
[   12.179426] Memory state around the buggy address:
[   12.179726]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.180083]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.180473] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.180765]                                                  ^
[   12.181179]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.181549]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.181847] ==================================================================
[   12.329311] ==================================================================
[   12.330147] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.330560] Write of size 1 at addr ffff8881029760d0 by task kunit_try_catch/180
[   12.331254] 
[   12.331684] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.331732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.331745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.331766] Call Trace:
[   12.331777]  <TASK>
[   12.331792]  dump_stack_lvl+0x73/0xb0
[   12.331824]  print_report+0xd1/0x650
[   12.331847]  ? __virt_addr_valid+0x1db/0x2d0
[   12.331870]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.331894]  ? kasan_addr_to_slab+0x11/0xa0
[   12.331915]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.331954]  kasan_report+0x141/0x180
[   12.331975]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.332003]  __asan_report_store1_noabort+0x1b/0x30
[   12.332029]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.332055]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.332079]  ? finish_task_switch.isra.0+0x153/0x700
[   12.332102]  ? __switch_to+0x47/0xf50
[   12.332127]  ? __schedule+0x10cc/0x2b60
[   12.332148]  ? __pfx_read_tsc+0x10/0x10
[   12.332172]  krealloc_large_less_oob+0x1c/0x30
[   12.332194]  kunit_try_run_case+0x1a5/0x480
[   12.332219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.332241]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.332264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.332287]  ? __kthread_parkme+0x82/0x180
[   12.332307]  ? preempt_count_sub+0x50/0x80
[   12.332329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.332353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.332379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.332404]  kthread+0x337/0x6f0
[   12.332422]  ? trace_preempt_on+0x20/0xc0
[   12.332445]  ? __pfx_kthread+0x10/0x10
[   12.332465]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.332486]  ? calculate_sigpending+0x7b/0xa0
[   12.332578]  ? __pfx_kthread+0x10/0x10
[   12.332613]  ret_from_fork+0x116/0x1d0
[   12.332631]  ? __pfx_kthread+0x10/0x10
[   12.332651]  ret_from_fork_asm+0x1a/0x30
[   12.332683]  </TASK>
[   12.332693] 
[   12.344678] The buggy address belongs to the physical page:
[   12.345211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102974
[   12.345553] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.346202] flags: 0x200000000000040(head|node=0|zone=2)
[   12.346453] page_type: f8(unknown)
[   12.346669] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.347007] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.347339] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.347994] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.348478] head: 0200000000000002 ffffea00040a5d01 00000000ffffffff 00000000ffffffff
[   12.348892] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.349322] page dumped because: kasan: bad access detected
[   12.349564] 
[   12.349782] Memory state around the buggy address:
[   12.350225]  ffff888102975f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.350700]  ffff888102976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.351070] >ffff888102976080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.351497]                                                  ^
[   12.351809]  ffff888102976100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.352318]  ffff888102976180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.352699] ==================================================================
[   12.353233] ==================================================================
[   12.353549] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.353855] Write of size 1 at addr ffff8881029760da by task kunit_try_catch/180
[   12.354661] 
[   12.354942] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.354987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.354999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.355181] Call Trace:
[   12.355201]  <TASK>
[   12.355219]  dump_stack_lvl+0x73/0xb0
[   12.355251]  print_report+0xd1/0x650
[   12.355274]  ? __virt_addr_valid+0x1db/0x2d0
[   12.355296]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.355319]  ? kasan_addr_to_slab+0x11/0xa0
[   12.355339]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.355363]  kasan_report+0x141/0x180
[   12.355384]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.355413]  __asan_report_store1_noabort+0x1b/0x30
[   12.355438]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.355463]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.355487]  ? finish_task_switch.isra.0+0x153/0x700
[   12.355510]  ? __switch_to+0x47/0xf50
[   12.355535]  ? __schedule+0x10cc/0x2b60
[   12.355556]  ? __pfx_read_tsc+0x10/0x10
[   12.355581]  krealloc_large_less_oob+0x1c/0x30
[   12.355617]  kunit_try_run_case+0x1a5/0x480
[   12.355641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.355664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.355687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.355710]  ? __kthread_parkme+0x82/0x180
[   12.355730]  ? preempt_count_sub+0x50/0x80
[   12.355753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.355777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.355803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.355828]  kthread+0x337/0x6f0
[   12.355846]  ? trace_preempt_on+0x20/0xc0
[   12.355870]  ? __pfx_kthread+0x10/0x10
[   12.355890]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.355910]  ? calculate_sigpending+0x7b/0xa0
[   12.355979]  ? __pfx_kthread+0x10/0x10
[   12.356001]  ret_from_fork+0x116/0x1d0
[   12.356019]  ? __pfx_kthread+0x10/0x10
[   12.356039]  ret_from_fork_asm+0x1a/0x30
[   12.356070]  </TASK>
[   12.356079] 
[   12.366911] The buggy address belongs to the physical page:
[   12.367281] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102974
[   12.367734] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.368333] flags: 0x200000000000040(head|node=0|zone=2)
[   12.368550] page_type: f8(unknown)
[   12.368752] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.369060] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.369383] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.370247] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.370723] head: 0200000000000002 ffffea00040a5d01 00000000ffffffff 00000000ffffffff
[   12.371195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.371488] page dumped because: kasan: bad access detected
[   12.371907] 
[   12.372272] Memory state around the buggy address:
[   12.372479]  ffff888102975f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.372917]  ffff888102976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.373394] >ffff888102976080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.373752]                                                     ^
[   12.374180]  ffff888102976100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.374548]  ffff888102976180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.374942] ==================================================================
[   12.304522] ==================================================================
[   12.305306] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.305877] Write of size 1 at addr ffff8881029760c9 by task kunit_try_catch/180
[   12.306329] 
[   12.306450] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.306492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.306542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.306562] Call Trace:
[   12.306574]  <TASK>
[   12.306589]  dump_stack_lvl+0x73/0xb0
[   12.306632]  print_report+0xd1/0x650
[   12.306654]  ? __virt_addr_valid+0x1db/0x2d0
[   12.306676]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.306699]  ? kasan_addr_to_slab+0x11/0xa0
[   12.306719]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.306743]  kasan_report+0x141/0x180
[   12.306764]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.306793]  __asan_report_store1_noabort+0x1b/0x30
[   12.306818]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.306844]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.306868]  ? finish_task_switch.isra.0+0x153/0x700
[   12.306891]  ? __switch_to+0x47/0xf50
[   12.306915]  ? __schedule+0x10cc/0x2b60
[   12.306936]  ? __pfx_read_tsc+0x10/0x10
[   12.306959]  krealloc_large_less_oob+0x1c/0x30
[   12.306982]  kunit_try_run_case+0x1a5/0x480
[   12.307005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.307027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.307050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.307073]  ? __kthread_parkme+0x82/0x180
[   12.307093]  ? preempt_count_sub+0x50/0x80
[   12.307116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.307139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.307163]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.307188]  kthread+0x337/0x6f0
[   12.307206]  ? trace_preempt_on+0x20/0xc0
[   12.307229]  ? __pfx_kthread+0x10/0x10
[   12.307248]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.307269]  ? calculate_sigpending+0x7b/0xa0
[   12.307293]  ? __pfx_kthread+0x10/0x10
[   12.307545]  ret_from_fork+0x116/0x1d0
[   12.307564]  ? __pfx_kthread+0x10/0x10
[   12.307584]  ret_from_fork_asm+0x1a/0x30
[   12.307626]  </TASK>
[   12.307636] 
[   12.319613] The buggy address belongs to the physical page:
[   12.319881] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102974
[   12.320428] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.320995] flags: 0x200000000000040(head|node=0|zone=2)
[   12.321353] page_type: f8(unknown)
[   12.321685] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.322195] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.322527] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.322872] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.323430] head: 0200000000000002 ffffea00040a5d01 00000000ffffffff 00000000ffffffff
[   12.324019] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.324333] page dumped because: kasan: bad access detected
[   12.324785] 
[   12.324903] Memory state around the buggy address:
[   12.325359]  ffff888102975f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.325893]  ffff888102976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.326235] >ffff888102976080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.326762]                                               ^
[   12.327181]  ffff888102976100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.327538]  ffff888102976180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.327852] ==================================================================
[   12.212634] ==================================================================
[   12.213026] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.213409] Write of size 1 at addr ffff8881003454ea by task kunit_try_catch/176
[   12.213771] 
[   12.213881] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.213983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.213996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.214015] Call Trace:
[   12.214031]  <TASK>
[   12.214046]  dump_stack_lvl+0x73/0xb0
[   12.214075]  print_report+0xd1/0x650
[   12.214109]  ? __virt_addr_valid+0x1db/0x2d0
[   12.214131]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.214155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.214190]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.214214]  kasan_report+0x141/0x180
[   12.214235]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.214273]  __asan_report_store1_noabort+0x1b/0x30
[   12.214297]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.214335]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.214359]  ? finish_task_switch.isra.0+0x153/0x700
[   12.214381]  ? __switch_to+0x47/0xf50
[   12.214406]  ? __schedule+0x10cc/0x2b60
[   12.214427]  ? __pfx_read_tsc+0x10/0x10
[   12.214451]  krealloc_less_oob+0x1c/0x30
[   12.214472]  kunit_try_run_case+0x1a5/0x480
[   12.214513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.214542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.214566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.214589]  ? __kthread_parkme+0x82/0x180
[   12.214625]  ? preempt_count_sub+0x50/0x80
[   12.214648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.214672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.214696]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.214729]  kthread+0x337/0x6f0
[   12.214747]  ? trace_preempt_on+0x20/0xc0
[   12.214770]  ? __pfx_kthread+0x10/0x10
[   12.214801]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.214822]  ? calculate_sigpending+0x7b/0xa0
[   12.214845]  ? __pfx_kthread+0x10/0x10
[   12.214866]  ret_from_fork+0x116/0x1d0
[   12.214884]  ? __pfx_kthread+0x10/0x10
[   12.214904]  ret_from_fork_asm+0x1a/0x30
[   12.215110]  </TASK>
[   12.215120] 
[   12.223262] Allocated by task 176:
[   12.223452]  kasan_save_stack+0x45/0x70
[   12.223718]  kasan_save_track+0x18/0x40
[   12.224013]  kasan_save_alloc_info+0x3b/0x50
[   12.224261]  __kasan_krealloc+0x190/0x1f0
[   12.224464]  krealloc_noprof+0xf3/0x340
[   12.224683]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.224903]  krealloc_less_oob+0x1c/0x30
[   12.225164]  kunit_try_run_case+0x1a5/0x480
[   12.225389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.225566]  kthread+0x337/0x6f0
[   12.225726]  ret_from_fork+0x116/0x1d0
[   12.225981]  ret_from_fork_asm+0x1a/0x30
[   12.226185] 
[   12.226278] The buggy address belongs to the object at ffff888100345400
[   12.226278]  which belongs to the cache kmalloc-256 of size 256
[   12.226776] The buggy address is located 33 bytes to the right of
[   12.226776]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   12.227479] 
[   12.227632] The buggy address belongs to the physical page:
[   12.227888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   12.228337] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.228659] flags: 0x200000000000040(head|node=0|zone=2)
[   12.229005] page_type: f5(slab)
[   12.229172] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.229515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.229856] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.230257] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.230625] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   12.231196] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.231567] page dumped because: kasan: bad access detected
[   12.231818] 
[   12.231887] Memory state around the buggy address:
[   12.232206]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.232535]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.232838] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.233084]                                                           ^
[   12.233440]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.233802]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.234160] ==================================================================
[   12.234726] ==================================================================
[   12.235359] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.235748] Write of size 1 at addr ffff8881003454eb by task kunit_try_catch/176
[   12.236048] 
[   12.236218] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.236266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.236277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.236297] Call Trace:
[   12.236317]  <TASK>
[   12.236337]  dump_stack_lvl+0x73/0xb0
[   12.236369]  print_report+0xd1/0x650
[   12.236392]  ? __virt_addr_valid+0x1db/0x2d0
[   12.236415]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.236439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.236463]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.236513]  kasan_report+0x141/0x180
[   12.236535]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.236564]  __asan_report_store1_noabort+0x1b/0x30
[   12.236609]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.236635]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.236660]  ? finish_task_switch.isra.0+0x153/0x700
[   12.236683]  ? __switch_to+0x47/0xf50
[   12.236709]  ? __schedule+0x10cc/0x2b60
[   12.236731]  ? __pfx_read_tsc+0x10/0x10
[   12.236756]  krealloc_less_oob+0x1c/0x30
[   12.236777]  kunit_try_run_case+0x1a5/0x480
[   12.236802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.236825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.236849]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.236872]  ? __kthread_parkme+0x82/0x180
[   12.236893]  ? preempt_count_sub+0x50/0x80
[   12.236977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.237017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.237042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.237066]  kthread+0x337/0x6f0
[   12.237085]  ? trace_preempt_on+0x20/0xc0
[   12.237109]  ? __pfx_kthread+0x10/0x10
[   12.237130]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.237152]  ? calculate_sigpending+0x7b/0xa0
[   12.237176]  ? __pfx_kthread+0x10/0x10
[   12.237197]  ret_from_fork+0x116/0x1d0
[   12.237215]  ? __pfx_kthread+0x10/0x10
[   12.237235]  ret_from_fork_asm+0x1a/0x30
[   12.237266]  </TASK>
[   12.237276] 
[   12.245154] Allocated by task 176:
[   12.245335]  kasan_save_stack+0x45/0x70
[   12.245584]  kasan_save_track+0x18/0x40
[   12.245820]  kasan_save_alloc_info+0x3b/0x50
[   12.246107]  __kasan_krealloc+0x190/0x1f0
[   12.246268]  krealloc_noprof+0xf3/0x340
[   12.246476]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.246713]  krealloc_less_oob+0x1c/0x30
[   12.247007]  kunit_try_run_case+0x1a5/0x480
[   12.247196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.247457]  kthread+0x337/0x6f0
[   12.247673]  ret_from_fork+0x116/0x1d0
[   12.247835]  ret_from_fork_asm+0x1a/0x30
[   12.248206] 
[   12.248331] The buggy address belongs to the object at ffff888100345400
[   12.248331]  which belongs to the cache kmalloc-256 of size 256
[   12.248859] The buggy address is located 34 bytes to the right of
[   12.248859]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   12.249384] 
[   12.249460] The buggy address belongs to the physical page:
[   12.249751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   12.250191] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.250507] flags: 0x200000000000040(head|node=0|zone=2)
[   12.250725] page_type: f5(slab)
[   12.250892] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.251321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.251647] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.252004] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.252518] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   12.252881] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.253265] page dumped because: kasan: bad access detected
[   12.253527] 
[   12.253634] Memory state around the buggy address:
[   12.253845]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.254216]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.254552] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.254781]                                                           ^
[   12.255102]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.255423]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.255710] ==================================================================
[   12.130405] ==================================================================
[   12.131226] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.131610] Write of size 1 at addr ffff8881003454c9 by task kunit_try_catch/176
[   12.132023] 
[   12.132125] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.132268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.132280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.132300] Call Trace:
[   12.132312]  <TASK>
[   12.132341]  dump_stack_lvl+0x73/0xb0
[   12.132374]  print_report+0xd1/0x650
[   12.132397]  ? __virt_addr_valid+0x1db/0x2d0
[   12.132420]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.132475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.132498]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.132558]  kasan_report+0x141/0x180
[   12.132579]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.132625]  __asan_report_store1_noabort+0x1b/0x30
[   12.132651]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.132677]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.132701]  ? finish_task_switch.isra.0+0x153/0x700
[   12.132724]  ? __switch_to+0x47/0xf50
[   12.132751]  ? __schedule+0x10cc/0x2b60
[   12.132773]  ? __pfx_read_tsc+0x10/0x10
[   12.132797]  krealloc_less_oob+0x1c/0x30
[   12.132818]  kunit_try_run_case+0x1a5/0x480
[   12.132843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.132865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.132889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.132913]  ? __kthread_parkme+0x82/0x180
[   12.132994]  ? preempt_count_sub+0x50/0x80
[   12.133018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.133042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.133067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.133092]  kthread+0x337/0x6f0
[   12.133110]  ? trace_preempt_on+0x20/0xc0
[   12.133135]  ? __pfx_kthread+0x10/0x10
[   12.133156]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.133177]  ? calculate_sigpending+0x7b/0xa0
[   12.133201]  ? __pfx_kthread+0x10/0x10
[   12.133222]  ret_from_fork+0x116/0x1d0
[   12.133241]  ? __pfx_kthread+0x10/0x10
[   12.133260]  ret_from_fork_asm+0x1a/0x30
[   12.133292]  </TASK>
[   12.133302] 
[   12.142691] Allocated by task 176:
[   12.142925]  kasan_save_stack+0x45/0x70
[   12.143356]  kasan_save_track+0x18/0x40
[   12.143497]  kasan_save_alloc_info+0x3b/0x50
[   12.143770]  __kasan_krealloc+0x190/0x1f0
[   12.143966]  krealloc_noprof+0xf3/0x340
[   12.144393]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.144834]  krealloc_less_oob+0x1c/0x30
[   12.145185]  kunit_try_run_case+0x1a5/0x480
[   12.145340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.145722]  kthread+0x337/0x6f0
[   12.146050]  ret_from_fork+0x116/0x1d0
[   12.146222]  ret_from_fork_asm+0x1a/0x30
[   12.146388] 
[   12.146488] The buggy address belongs to the object at ffff888100345400
[   12.146488]  which belongs to the cache kmalloc-256 of size 256
[   12.147654] The buggy address is located 0 bytes to the right of
[   12.147654]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   12.148278] 
[   12.148512] The buggy address belongs to the physical page:
[   12.148869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   12.149505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.149972] flags: 0x200000000000040(head|node=0|zone=2)
[   12.150222] page_type: f5(slab)
[   12.150488] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.150841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.151327] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.151771] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.152273] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   12.152595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.152940] page dumped because: kasan: bad access detected
[   12.153524] 
[   12.153674] Memory state around the buggy address:
[   12.153913]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.154381]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.154778] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.155231]                                               ^
[   12.155522]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.155822]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.156185] ==================================================================