Hay
Date
July 9, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.567611] ==================================================================
[   16.567662] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.567730] Write of size 1 at addr fff00000c461ceea by task kunit_try_catch/158
[   16.567787] 
[   16.567821] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.567900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.567934] Hardware name: linux,dummy-virt (DT)
[   16.567965] Call trace:
[   16.567987]  show_stack+0x20/0x38 (C)
[   16.568043]  dump_stack_lvl+0x8c/0xd0
[   16.568105]  print_report+0x118/0x608
[   16.568165]  kasan_report+0xdc/0x128
[   16.568209]  __asan_report_store1_noabort+0x20/0x30
[   16.568259]  krealloc_less_oob_helper+0xae4/0xc50
[   16.568306]  krealloc_less_oob+0x20/0x38
[   16.568350]  kunit_try_run_case+0x170/0x3f0
[   16.568396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.568446]  kthread+0x328/0x630
[   16.568487]  ret_from_fork+0x10/0x20
[   16.568534] 
[   16.568560] Allocated by task 158:
[   16.568587]  kasan_save_stack+0x3c/0x68
[   16.568627]  kasan_save_track+0x20/0x40
[   16.568663]  kasan_save_alloc_info+0x40/0x58
[   16.568701]  __kasan_krealloc+0x118/0x178
[   16.568737]  krealloc_noprof+0x128/0x360
[   16.568772]  krealloc_less_oob_helper+0x168/0xc50
[   16.568809]  krealloc_less_oob+0x20/0x38
[   16.568844]  kunit_try_run_case+0x170/0x3f0
[   16.568880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.568920]  kthread+0x328/0x630
[   16.568951]  ret_from_fork+0x10/0x20
[   16.568984] 
[   16.569002] The buggy address belongs to the object at fff00000c461ce00
[   16.569002]  which belongs to the cache kmalloc-256 of size 256
[   16.569055] The buggy address is located 33 bytes to the right of
[   16.569055]  allocated 201-byte region [fff00000c461ce00, fff00000c461cec9)
[   16.569476] 
[   16.569509] The buggy address belongs to the physical page:
[   16.569550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10461c
[   16.569807] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.570081] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.570598] page_type: f5(slab)
[   16.570770] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.570855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.570998] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.571212] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.571349] head: 0bfffe0000000001 ffffc1ffc3118701 00000000ffffffff 00000000ffffffff
[   16.571715] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.571784] page dumped because: kasan: bad access detected
[   16.571948] 
[   16.572037] Memory state around the buggy address:
[   16.572311]  fff00000c461cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572395]  fff00000c461ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.572436] >fff00000c461ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.572479]                                                           ^
[   16.572517]  fff00000c461cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572796]  fff00000c461cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.573080] ==================================================================
[   16.630827] ==================================================================
[   16.631206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.631461] Write of size 1 at addr fff00000c77220ea by task kunit_try_catch/162
[   16.631524] 
[   16.631721] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.631816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.631964] Hardware name: linux,dummy-virt (DT)
[   16.632043] Call trace:
[   16.632145]  show_stack+0x20/0x38 (C)
[   16.632227]  dump_stack_lvl+0x8c/0xd0
[   16.632370]  print_report+0x118/0x608
[   16.632419]  kasan_report+0xdc/0x128
[   16.632463]  __asan_report_store1_noabort+0x20/0x30
[   16.632776]  krealloc_less_oob_helper+0xae4/0xc50
[   16.632907]  krealloc_large_less_oob+0x20/0x38
[   16.633032]  kunit_try_run_case+0x170/0x3f0
[   16.633220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.633390]  kthread+0x328/0x630
[   16.633847]  ret_from_fork+0x10/0x20
[   16.633934] 
[   16.633963] The buggy address belongs to the physical page:
[   16.633995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   16.634047] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.634093] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.634154] page_type: f8(unknown)
[   16.634202] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.634260] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.634317] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.634366] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.634413] head: 0bfffe0000000002 ffffc1ffc31dc801 00000000ffffffff 00000000ffffffff
[   16.634469] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.634507] page dumped because: kasan: bad access detected
[   16.634546] 
[   16.634563] Memory state around the buggy address:
[   16.634592]  fff00000c7721f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.634633]  fff00000c7722000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.634673] >fff00000c7722080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.634721]                                                           ^
[   16.634757]  fff00000c7722100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.634798]  fff00000c7722180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.634849] ==================================================================
[   16.538510] ==================================================================
[   16.538659] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.538755] Write of size 1 at addr fff00000c461cec9 by task kunit_try_catch/158
[   16.539085] 
[   16.539361] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.539450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.539524] Hardware name: linux,dummy-virt (DT)
[   16.539571] Call trace:
[   16.539600]  show_stack+0x20/0x38 (C)
[   16.539693]  dump_stack_lvl+0x8c/0xd0
[   16.539978]  print_report+0x118/0x608
[   16.540195]  kasan_report+0xdc/0x128
[   16.540341]  __asan_report_store1_noabort+0x20/0x30
[   16.540525]  krealloc_less_oob_helper+0xa48/0xc50
[   16.540684]  krealloc_less_oob+0x20/0x38
[   16.540773]  kunit_try_run_case+0x170/0x3f0
[   16.540841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.541110]  kthread+0x328/0x630
[   16.541356]  ret_from_fork+0x10/0x20
[   16.541466] 
[   16.541530] Allocated by task 158:
[   16.541666]  kasan_save_stack+0x3c/0x68
[   16.541743]  kasan_save_track+0x20/0x40
[   16.542158]  kasan_save_alloc_info+0x40/0x58
[   16.542242]  __kasan_krealloc+0x118/0x178
[   16.542397]  krealloc_noprof+0x128/0x360
[   16.542468]  krealloc_less_oob_helper+0x168/0xc50
[   16.542521]  krealloc_less_oob+0x20/0x38
[   16.542559]  kunit_try_run_case+0x170/0x3f0
[   16.542596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.542638]  kthread+0x328/0x630
[   16.542670]  ret_from_fork+0x10/0x20
[   16.542759] 
[   16.542780] The buggy address belongs to the object at fff00000c461ce00
[   16.542780]  which belongs to the cache kmalloc-256 of size 256
[   16.542863] The buggy address is located 0 bytes to the right of
[   16.542863]  allocated 201-byte region [fff00000c461ce00, fff00000c461cec9)
[   16.542926] 
[   16.542947] The buggy address belongs to the physical page:
[   16.542985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10461c
[   16.543041] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.543104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.543190] page_type: f5(slab)
[   16.543248] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.543305] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.543353] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.543409] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.543457] head: 0bfffe0000000001 ffffc1ffc3118701 00000000ffffffff 00000000ffffffff
[   16.543512] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.543550] page dumped because: kasan: bad access detected
[   16.543588] 
[   16.543621] Memory state around the buggy address:
[   16.543653]  fff00000c461cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.544234]  fff00000c461ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.544294] >fff00000c461ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.544538]                                               ^
[   16.545274]  fff00000c461cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.545413]  fff00000c461cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.545475] ==================================================================
[   16.610237] ==================================================================
[   16.610299] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.610352] Write of size 1 at addr fff00000c77220c9 by task kunit_try_catch/162
[   16.610626] 
[   16.610670] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.610751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.610863] Hardware name: linux,dummy-virt (DT)
[   16.610909] Call trace:
[   16.610931]  show_stack+0x20/0x38 (C)
[   16.610997]  dump_stack_lvl+0x8c/0xd0
[   16.611195]  print_report+0x118/0x608
[   16.611257]  kasan_report+0xdc/0x128
[   16.611471]  __asan_report_store1_noabort+0x20/0x30
[   16.611624]  krealloc_less_oob_helper+0xa48/0xc50
[   16.611676]  krealloc_large_less_oob+0x20/0x38
[   16.611741]  kunit_try_run_case+0x170/0x3f0
[   16.611885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.611937]  kthread+0x328/0x630
[   16.612308]  ret_from_fork+0x10/0x20
[   16.612463] 
[   16.612487] The buggy address belongs to the physical page:
[   16.612751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   16.612910] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.613038] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.613272] page_type: f8(unknown)
[   16.613381] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.613829] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.613969] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.614042] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.614241] head: 0bfffe0000000002 ffffc1ffc31dc801 00000000ffffffff 00000000ffffffff
[   16.614597] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.614781] page dumped because: kasan: bad access detected
[   16.614898] 
[   16.615001] Memory state around the buggy address:
[   16.615201]  fff00000c7721f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.615852]  fff00000c7722000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.615917] >fff00000c7722080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.615955]                                               ^
[   16.616147]  fff00000c7722100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.616512]  fff00000c7722180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.616565] ==================================================================
[   16.622688] ==================================================================
[   16.622734] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.623381] Write of size 1 at addr fff00000c77220da by task kunit_try_catch/162
[   16.623596] 
[   16.623640] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.624148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.624208] Hardware name: linux,dummy-virt (DT)
[   16.624238] Call trace:
[   16.624466]  show_stack+0x20/0x38 (C)
[   16.624670]  dump_stack_lvl+0x8c/0xd0
[   16.624826]  print_report+0x118/0x608
[   16.624941]  kasan_report+0xdc/0x128
[   16.625303]  __asan_report_store1_noabort+0x20/0x30
[   16.625406]  krealloc_less_oob_helper+0xa80/0xc50
[   16.625490]  krealloc_large_less_oob+0x20/0x38
[   16.625653]  kunit_try_run_case+0x170/0x3f0
[   16.625740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.625964]  kthread+0x328/0x630
[   16.626152]  ret_from_fork+0x10/0x20
[   16.626499] 
[   16.626559] The buggy address belongs to the physical page:
[   16.626600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   16.626652] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.626937] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.627459] page_type: f8(unknown)
[   16.627637] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.627689] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.627752] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.627805] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.627852] head: 0bfffe0000000002 ffffc1ffc31dc801 00000000ffffffff 00000000ffffffff
[   16.628162] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.628278] page dumped because: kasan: bad access detected
[   16.628417] 
[   16.628480] Memory state around the buggy address:
[   16.628632]  fff00000c7721f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.628866]  fff00000c7722000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.628933] >fff00000c7722080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.629469]                                                     ^
[   16.629664]  fff00000c7722100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.629751]  fff00000c7722180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.629876] ==================================================================
[   16.618422] ==================================================================
[   16.618475] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.618527] Write of size 1 at addr fff00000c77220d0 by task kunit_try_catch/162
[   16.618862] 
[   16.619175] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.619290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.619329] Hardware name: linux,dummy-virt (DT)
[   16.619534] Call trace:
[   16.619567]  show_stack+0x20/0x38 (C)
[   16.619639]  dump_stack_lvl+0x8c/0xd0
[   16.619691]  print_report+0x118/0x608
[   16.620043]  kasan_report+0xdc/0x128
[   16.620221]  __asan_report_store1_noabort+0x20/0x30
[   16.620367]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.620420]  krealloc_large_less_oob+0x20/0x38
[   16.620492]  kunit_try_run_case+0x170/0x3f0
[   16.620665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.620725]  kthread+0x328/0x630
[   16.620767]  ret_from_fork+0x10/0x20
[   16.620837] 
[   16.620858] The buggy address belongs to the physical page:
[   16.620888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   16.620965] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.621010] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.621062] page_type: f8(unknown)
[   16.621110] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.621170] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.621234] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.621291] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.621337] head: 0bfffe0000000002 ffffc1ffc31dc801 00000000ffffffff 00000000ffffffff
[   16.621392] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.621449] page dumped because: kasan: bad access detected
[   16.621486] 
[   16.621503] Memory state around the buggy address:
[   16.621538]  fff00000c7721f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.621579]  fff00000c7722000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.621620] >fff00000c7722080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.621655]                                                  ^
[   16.621691]  fff00000c7722100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.621746]  fff00000c7722180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.621790] ==================================================================
[   16.547695] ==================================================================
[   16.547805] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.547898] Write of size 1 at addr fff00000c461ced0 by task kunit_try_catch/158
[   16.547957] 
[   16.547997] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.548483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.548560] Hardware name: linux,dummy-virt (DT)
[   16.548592] Call trace:
[   16.548621]  show_stack+0x20/0x38 (C)
[   16.549062]  dump_stack_lvl+0x8c/0xd0
[   16.549303]  print_report+0x118/0x608
[   16.549494]  kasan_report+0xdc/0x128
[   16.549592]  __asan_report_store1_noabort+0x20/0x30
[   16.549953]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.550066]  krealloc_less_oob+0x20/0x38
[   16.550355]  kunit_try_run_case+0x170/0x3f0
[   16.550571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.550637]  kthread+0x328/0x630
[   16.550788]  ret_from_fork+0x10/0x20
[   16.551036] 
[   16.551150] Allocated by task 158:
[   16.551180]  kasan_save_stack+0x3c/0x68
[   16.551590]  kasan_save_track+0x20/0x40
[   16.551678]  kasan_save_alloc_info+0x40/0x58
[   16.551829]  __kasan_krealloc+0x118/0x178
[   16.552104]  krealloc_noprof+0x128/0x360
[   16.552177]  krealloc_less_oob_helper+0x168/0xc50
[   16.552292]  krealloc_less_oob+0x20/0x38
[   16.552389]  kunit_try_run_case+0x170/0x3f0
[   16.552710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.552847]  kthread+0x328/0x630
[   16.552954]  ret_from_fork+0x10/0x20
[   16.553080] 
[   16.553182] The buggy address belongs to the object at fff00000c461ce00
[   16.553182]  which belongs to the cache kmalloc-256 of size 256
[   16.553561] The buggy address is located 7 bytes to the right of
[   16.553561]  allocated 201-byte region [fff00000c461ce00, fff00000c461cec9)
[   16.553684] 
[   16.553806] The buggy address belongs to the physical page:
[   16.553864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10461c
[   16.554277] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.554370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.554543] page_type: f5(slab)
[   16.554602] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.554971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.555059] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.555405] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.555513] head: 0bfffe0000000001 ffffc1ffc3118701 00000000ffffffff 00000000ffffffff
[   16.555611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.555652] page dumped because: kasan: bad access detected
[   16.555826] 
[   16.555885] Memory state around the buggy address:
[   16.555918]  fff00000c461cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.556086]  fff00000c461ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.556376] >fff00000c461ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.556502]                                                  ^
[   16.556542]  fff00000c461cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.556811]  fff00000c461cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.556920] ==================================================================
[   16.635062] ==================================================================
[   16.635111] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.635167] Write of size 1 at addr fff00000c77220eb by task kunit_try_catch/162
[   16.635214] 
[   16.635485] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.635847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.635907] Hardware name: linux,dummy-virt (DT)
[   16.636033] Call trace:
[   16.636272]  show_stack+0x20/0x38 (C)
[   16.636559]  dump_stack_lvl+0x8c/0xd0
[   16.636795]  print_report+0x118/0x608
[   16.636936]  kasan_report+0xdc/0x128
[   16.637306]  __asan_report_store1_noabort+0x20/0x30
[   16.637741]  krealloc_less_oob_helper+0xa58/0xc50
[   16.637825]  krealloc_large_less_oob+0x20/0x38
[   16.637984]  kunit_try_run_case+0x170/0x3f0
[   16.638043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.639221]  kthread+0x328/0x630
[   16.639300]  ret_from_fork+0x10/0x20
[   16.639739] 
[   16.639828] The buggy address belongs to the physical page:
[   16.639859] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   16.639916] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.640156] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.640336] page_type: f8(unknown)
[   16.640435] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.640484] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.640623] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.640691] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.640834] head: 0bfffe0000000002 ffffc1ffc31dc801 00000000ffffffff 00000000ffffffff
[   16.640924] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.641159] page dumped because: kasan: bad access detected
[   16.641383] 
[   16.641431] Memory state around the buggy address:
[   16.641487]  fff00000c7721f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.641534]  fff00000c7722000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.641806] >fff00000c7722080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.642005]                                                           ^
[   16.642081]  fff00000c7722100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.642145]  fff00000c7722180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.642292] ==================================================================
[   16.557919] ==================================================================
[   16.558310] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.558373] Write of size 1 at addr fff00000c461ceda by task kunit_try_catch/158
[   16.558563] 
[   16.558674] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.558878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.558905] Hardware name: linux,dummy-virt (DT)
[   16.558937] Call trace:
[   16.558959]  show_stack+0x20/0x38 (C)
[   16.559017]  dump_stack_lvl+0x8c/0xd0
[   16.559064]  print_report+0x118/0x608
[   16.559110]  kasan_report+0xdc/0x128
[   16.559166]  __asan_report_store1_noabort+0x20/0x30
[   16.559216]  krealloc_less_oob_helper+0xa80/0xc50
[   16.559263]  krealloc_less_oob+0x20/0x38
[   16.559307]  kunit_try_run_case+0x170/0x3f0
[   16.559352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.559402]  kthread+0x328/0x630
[   16.559443]  ret_from_fork+0x10/0x20
[   16.559489] 
[   16.559506] Allocated by task 158:
[   16.559533]  kasan_save_stack+0x3c/0x68
[   16.559571]  kasan_save_track+0x20/0x40
[   16.559782]  kasan_save_alloc_info+0x40/0x58
[   16.560093]  __kasan_krealloc+0x118/0x178
[   16.560316]  krealloc_noprof+0x128/0x360
[   16.560365]  krealloc_less_oob_helper+0x168/0xc50
[   16.560715]  krealloc_less_oob+0x20/0x38
[   16.560870]  kunit_try_run_case+0x170/0x3f0
[   16.561258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.561389]  kthread+0x328/0x630
[   16.561884]  ret_from_fork+0x10/0x20
[   16.562242] 
[   16.562300] The buggy address belongs to the object at fff00000c461ce00
[   16.562300]  which belongs to the cache kmalloc-256 of size 256
[   16.562463] The buggy address is located 17 bytes to the right of
[   16.562463]  allocated 201-byte region [fff00000c461ce00, fff00000c461cec9)
[   16.562588] 
[   16.562750] The buggy address belongs to the physical page:
[   16.562944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10461c
[   16.563054] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.563163] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.563281] page_type: f5(slab)
[   16.563634] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.563722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.563855] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.563973] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.564165] head: 0bfffe0000000001 ffffc1ffc3118701 00000000ffffffff 00000000ffffffff
[   16.564395] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.564659] page dumped because: kasan: bad access detected
[   16.564742] 
[   16.564860] Memory state around the buggy address:
[   16.564967]  fff00000c461cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.565027]  fff00000c461ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.565199] >fff00000c461ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.565412]                                                     ^
[   16.565456]  fff00000c461cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.565910]  fff00000c461cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.566033] ==================================================================
[   16.574592] ==================================================================
[   16.574791] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.574864] Write of size 1 at addr fff00000c461ceeb by task kunit_try_catch/158
[   16.574958] 
[   16.575103] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.575200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.575253] Hardware name: linux,dummy-virt (DT)
[   16.575403] Call trace:
[   16.575460]  show_stack+0x20/0x38 (C)
[   16.575615]  dump_stack_lvl+0x8c/0xd0
[   16.575673]  print_report+0x118/0x608
[   16.575850]  kasan_report+0xdc/0x128
[   16.575964]  __asan_report_store1_noabort+0x20/0x30
[   16.576146]  krealloc_less_oob_helper+0xa58/0xc50
[   16.576378]  krealloc_less_oob+0x20/0x38
[   16.576602]  kunit_try_run_case+0x170/0x3f0
[   16.576673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.576875]  kthread+0x328/0x630
[   16.577032]  ret_from_fork+0x10/0x20
[   16.577324] 
[   16.577345] Allocated by task 158:
[   16.577373]  kasan_save_stack+0x3c/0x68
[   16.577451]  kasan_save_track+0x20/0x40
[   16.577964]  kasan_save_alloc_info+0x40/0x58
[   16.578055]  __kasan_krealloc+0x118/0x178
[   16.578227]  krealloc_noprof+0x128/0x360
[   16.578723]  krealloc_less_oob_helper+0x168/0xc50
[   16.578834]  krealloc_less_oob+0x20/0x38
[   16.578930]  kunit_try_run_case+0x170/0x3f0
[   16.578969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.579196]  kthread+0x328/0x630
[   16.579755]  ret_from_fork+0x10/0x20
[   16.579815] 
[   16.579977] The buggy address belongs to the object at fff00000c461ce00
[   16.579977]  which belongs to the cache kmalloc-256 of size 256
[   16.580050] The buggy address is located 34 bytes to the right of
[   16.580050]  allocated 201-byte region [fff00000c461ce00, fff00000c461cec9)
[   16.580349] 
[   16.580570] The buggy address belongs to the physical page:
[   16.580712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10461c
[   16.580866] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.580972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.581066] page_type: f5(slab)
[   16.581105] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.581323] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.581377] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.581757] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.581890] head: 0bfffe0000000001 ffffc1ffc3118701 00000000ffffffff 00000000ffffffff
[   16.582006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.582128] page dumped because: kasan: bad access detected
[   16.582259] 
[   16.582339] Memory state around the buggy address:
[   16.582427]  fff00000c461cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.582552]  fff00000c461ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.582593] >fff00000c461ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.582965]                                                           ^
[   16.583099]  fff00000c461cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.583204]  fff00000c461cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.583274] ==================================================================

[   12.467956] ==================================================================
[   12.468257] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.469327] Write of size 1 at addr ffff888102a320eb by task kunit_try_catch/179
[   12.469677] 
[   12.469793] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.469992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.470005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.470037] Call Trace:
[   12.470050]  <TASK>
[   12.470075]  dump_stack_lvl+0x73/0xb0
[   12.470104]  print_report+0xd1/0x650
[   12.470125]  ? __virt_addr_valid+0x1db/0x2d0
[   12.470147]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.470171]  ? kasan_addr_to_slab+0x11/0xa0
[   12.470191]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.470215]  kasan_report+0x141/0x180
[   12.470236]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.470265]  __asan_report_store1_noabort+0x1b/0x30
[   12.470289]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.470315]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.470340]  ? finish_task_switch.isra.0+0x153/0x700
[   12.470362]  ? __switch_to+0x47/0xf50
[   12.470386]  ? __schedule+0x10cc/0x2b60
[   12.470408]  ? __pfx_read_tsc+0x10/0x10
[   12.470432]  krealloc_large_less_oob+0x1c/0x30
[   12.470455]  kunit_try_run_case+0x1a5/0x480
[   12.470479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.470501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.470524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.470547]  ? __kthread_parkme+0x82/0x180
[   12.470567]  ? preempt_count_sub+0x50/0x80
[   12.470589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.470613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.470637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.470661]  kthread+0x337/0x6f0
[   12.470679]  ? trace_preempt_on+0x20/0xc0
[   12.470716]  ? __pfx_kthread+0x10/0x10
[   12.470736]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.470757]  ? calculate_sigpending+0x7b/0xa0
[   12.470780]  ? __pfx_kthread+0x10/0x10
[   12.470802]  ret_from_fork+0x116/0x1d0
[   12.470820]  ? __pfx_kthread+0x10/0x10
[   12.470841]  ret_from_fork_asm+0x1a/0x30
[   12.470871]  </TASK>
[   12.470880] 
[   12.481672] The buggy address belongs to the physical page:
[   12.482021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   12.482610] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.483048] flags: 0x200000000000040(head|node=0|zone=2)
[   12.483292] page_type: f8(unknown)
[   12.483459] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.483798] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.484444] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.484779] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.485313] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   12.486080] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.486587] page dumped because: kasan: bad access detected
[   12.486960] 
[   12.487055] Memory state around the buggy address:
[   12.487636]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.487969]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.488435] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.488896]                                                           ^
[   12.489342]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.489650]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.489967] ==================================================================
[   12.402648] ==================================================================
[   12.402969] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.403527] Write of size 1 at addr ffff888102a320d0 by task kunit_try_catch/179
[   12.403891] 
[   12.403999] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.404098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.404110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.404129] Call Trace:
[   12.404140]  <TASK>
[   12.404153]  dump_stack_lvl+0x73/0xb0
[   12.404182]  print_report+0xd1/0x650
[   12.404203]  ? __virt_addr_valid+0x1db/0x2d0
[   12.404226]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.404250]  ? kasan_addr_to_slab+0x11/0xa0
[   12.404270]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.404294]  kasan_report+0x141/0x180
[   12.404321]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.404349]  __asan_report_store1_noabort+0x1b/0x30
[   12.404374]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.404424]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.404450]  ? finish_task_switch.isra.0+0x153/0x700
[   12.404472]  ? __switch_to+0x47/0xf50
[   12.404512]  ? __schedule+0x10cc/0x2b60
[   12.404534]  ? __pfx_read_tsc+0x10/0x10
[   12.404571]  krealloc_large_less_oob+0x1c/0x30
[   12.404594]  kunit_try_run_case+0x1a5/0x480
[   12.404631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.404653]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.404689]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.404735]  ? __kthread_parkme+0x82/0x180
[   12.404755]  ? preempt_count_sub+0x50/0x80
[   12.404778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.404815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.404851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.404889]  kthread+0x337/0x6f0
[   12.404908]  ? trace_preempt_on+0x20/0xc0
[   12.404932]  ? __pfx_kthread+0x10/0x10
[   12.404952]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.404973]  ? calculate_sigpending+0x7b/0xa0
[   12.404995]  ? __pfx_kthread+0x10/0x10
[   12.405016]  ret_from_fork+0x116/0x1d0
[   12.405052]  ? __pfx_kthread+0x10/0x10
[   12.405072]  ret_from_fork_asm+0x1a/0x30
[   12.405102]  </TASK>
[   12.405111] 
[   12.413363] The buggy address belongs to the physical page:
[   12.413620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   12.413970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.414195] flags: 0x200000000000040(head|node=0|zone=2)
[   12.414596] page_type: f8(unknown)
[   12.414786] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.415547] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.416462] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.416876] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.417465] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   12.417960] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.418307] page dumped because: kasan: bad access detected
[   12.418685] 
[   12.418774] Memory state around the buggy address:
[   12.418930]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.419838]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.420749] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.421630]                                                  ^
[   12.422310]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.422692]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.422922] ==================================================================
[   12.311162] ==================================================================
[   12.311478] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.311843] Write of size 1 at addr ffff888100aa1aeb by task kunit_try_catch/175
[   12.312152] 
[   12.312253] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.312291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.312302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.312325] Call Trace:
[   12.312338]  <TASK>
[   12.312353]  dump_stack_lvl+0x73/0xb0
[   12.312379]  print_report+0xd1/0x650
[   12.312400]  ? __virt_addr_valid+0x1db/0x2d0
[   12.312421]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.312445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.312467]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.312492]  kasan_report+0x141/0x180
[   12.312513]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.312541]  __asan_report_store1_noabort+0x1b/0x30
[   12.312566]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.312591]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.312615]  ? finish_task_switch.isra.0+0x153/0x700
[   12.312638]  ? __switch_to+0x47/0xf50
[   12.312662]  ? __schedule+0x10cc/0x2b60
[   12.312683]  ? __pfx_read_tsc+0x10/0x10
[   12.312717]  krealloc_less_oob+0x1c/0x30
[   12.312738]  kunit_try_run_case+0x1a5/0x480
[   12.312761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.312783]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.312806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.312829]  ? __kthread_parkme+0x82/0x180
[   12.312850]  ? preempt_count_sub+0x50/0x80
[   12.312873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.312896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.312920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.312944]  kthread+0x337/0x6f0
[   12.312962]  ? trace_preempt_on+0x20/0xc0
[   12.312985]  ? __pfx_kthread+0x10/0x10
[   12.313005]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.313310]  ? calculate_sigpending+0x7b/0xa0
[   12.313346]  ? __pfx_kthread+0x10/0x10
[   12.313368]  ret_from_fork+0x116/0x1d0
[   12.313387]  ? __pfx_kthread+0x10/0x10
[   12.313407]  ret_from_fork_asm+0x1a/0x30
[   12.313438]  </TASK>
[   12.313447] 
[   12.321228] Allocated by task 175:
[   12.321430]  kasan_save_stack+0x45/0x70
[   12.321637]  kasan_save_track+0x18/0x40
[   12.321812]  kasan_save_alloc_info+0x3b/0x50
[   12.322100]  __kasan_krealloc+0x190/0x1f0
[   12.322258]  krealloc_noprof+0xf3/0x340
[   12.322392]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.322597]  krealloc_less_oob+0x1c/0x30
[   12.322804]  kunit_try_run_case+0x1a5/0x480
[   12.323191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.323423]  kthread+0x337/0x6f0
[   12.323593]  ret_from_fork+0x116/0x1d0
[   12.323818]  ret_from_fork_asm+0x1a/0x30
[   12.324151] 
[   12.324272] The buggy address belongs to the object at ffff888100aa1a00
[   12.324272]  which belongs to the cache kmalloc-256 of size 256
[   12.324769] The buggy address is located 34 bytes to the right of
[   12.324769]  allocated 201-byte region [ffff888100aa1a00, ffff888100aa1ac9)
[   12.325384] 
[   12.325458] The buggy address belongs to the physical page:
[   12.325630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   12.325982] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.326303] flags: 0x200000000000040(head|node=0|zone=2)
[   12.327754] page_type: f5(slab)
[   12.327907] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.328131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.328363] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.328587] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.328824] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff
[   12.329944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.330601] page dumped because: kasan: bad access detected
[   12.331786] 
[   12.332106] Memory state around the buggy address:
[   12.332985]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.334011]  ffff888100aa1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.334289] >ffff888100aa1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.334507]                                                           ^
[   12.334718]  ffff888100aa1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.334931]  ffff888100aa1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.335977] ==================================================================
[   12.423223] ==================================================================
[   12.423612] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.424019] Write of size 1 at addr ffff888102a320da by task kunit_try_catch/179
[   12.424293] 
[   12.424382] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.424422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.424432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.424450] Call Trace:
[   12.424463]  <TASK>
[   12.424476]  dump_stack_lvl+0x73/0xb0
[   12.424504]  print_report+0xd1/0x650
[   12.424526]  ? __virt_addr_valid+0x1db/0x2d0
[   12.424548]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.424572]  ? kasan_addr_to_slab+0x11/0xa0
[   12.424846]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.424889]  kasan_report+0x141/0x180
[   12.424913]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.424941]  __asan_report_store1_noabort+0x1b/0x30
[   12.424966]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.424992]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.425016]  ? finish_task_switch.isra.0+0x153/0x700
[   12.425323]  ? __switch_to+0x47/0xf50
[   12.425349]  ? __schedule+0x10cc/0x2b60
[   12.425370]  ? __pfx_read_tsc+0x10/0x10
[   12.425393]  krealloc_large_less_oob+0x1c/0x30
[   12.425417]  kunit_try_run_case+0x1a5/0x480
[   12.425440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.425463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.425485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.425510]  ? __kthread_parkme+0x82/0x180
[   12.425529]  ? preempt_count_sub+0x50/0x80
[   12.425552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.425576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.425599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.425624]  kthread+0x337/0x6f0
[   12.425642]  ? trace_preempt_on+0x20/0xc0
[   12.425665]  ? __pfx_kthread+0x10/0x10
[   12.425685]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.425719]  ? calculate_sigpending+0x7b/0xa0
[   12.425742]  ? __pfx_kthread+0x10/0x10
[   12.425762]  ret_from_fork+0x116/0x1d0
[   12.425780]  ? __pfx_kthread+0x10/0x10
[   12.425800]  ret_from_fork_asm+0x1a/0x30
[   12.425830]  </TASK>
[   12.425839] 
[   12.437088] The buggy address belongs to the physical page:
[   12.437360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   12.437699] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.438295] flags: 0x200000000000040(head|node=0|zone=2)
[   12.438626] page_type: f8(unknown)
[   12.438894] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.439490] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.439908] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.440386] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.440741] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   12.441060] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.441400] page dumped because: kasan: bad access detected
[   12.441645] 
[   12.441749] Memory state around the buggy address:
[   12.442211]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.442506]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.442921] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.443455]                                                     ^
[   12.443826]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.444257]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.444692] ==================================================================
[   12.289654] ==================================================================
[   12.289988] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.290481] Write of size 1 at addr ffff888100aa1aea by task kunit_try_catch/175
[   12.290772] 
[   12.290857] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.290895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.290906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.290925] Call Trace:
[   12.290936]  <TASK>
[   12.290949]  dump_stack_lvl+0x73/0xb0
[   12.290974]  print_report+0xd1/0x650
[   12.290995]  ? __virt_addr_valid+0x1db/0x2d0
[   12.291101]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.291127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.291152]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.291176]  kasan_report+0x141/0x180
[   12.291198]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.291226]  __asan_report_store1_noabort+0x1b/0x30
[   12.291251]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.291276]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.291301]  ? finish_task_switch.isra.0+0x153/0x700
[   12.291323]  ? __switch_to+0x47/0xf50
[   12.291347]  ? __schedule+0x10cc/0x2b60
[   12.291368]  ? __pfx_read_tsc+0x10/0x10
[   12.291391]  krealloc_less_oob+0x1c/0x30
[   12.291412]  kunit_try_run_case+0x1a5/0x480
[   12.291436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.291458]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.291481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.291506]  ? __kthread_parkme+0x82/0x180
[   12.291525]  ? preempt_count_sub+0x50/0x80
[   12.291549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.291574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.291599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.291624]  kthread+0x337/0x6f0
[   12.291642]  ? trace_preempt_on+0x20/0xc0
[   12.291667]  ? __pfx_kthread+0x10/0x10
[   12.291687]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.291719]  ? calculate_sigpending+0x7b/0xa0
[   12.291745]  ? __pfx_kthread+0x10/0x10
[   12.291767]  ret_from_fork+0x116/0x1d0
[   12.291786]  ? __pfx_kthread+0x10/0x10
[   12.291807]  ret_from_fork_asm+0x1a/0x30
[   12.291838]  </TASK>
[   12.291848] 
[   12.299946] Allocated by task 175:
[   12.300302]  kasan_save_stack+0x45/0x70
[   12.300496]  kasan_save_track+0x18/0x40
[   12.300663]  kasan_save_alloc_info+0x3b/0x50
[   12.300884]  __kasan_krealloc+0x190/0x1f0
[   12.301089]  krealloc_noprof+0xf3/0x340
[   12.301254]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.301463]  krealloc_less_oob+0x1c/0x30
[   12.301602]  kunit_try_run_case+0x1a5/0x480
[   12.301813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.302079]  kthread+0x337/0x6f0
[   12.302248]  ret_from_fork+0x116/0x1d0
[   12.302392]  ret_from_fork_asm+0x1a/0x30
[   12.302563] 
[   12.302655] The buggy address belongs to the object at ffff888100aa1a00
[   12.302655]  which belongs to the cache kmalloc-256 of size 256
[   12.303285] The buggy address is located 33 bytes to the right of
[   12.303285]  allocated 201-byte region [ffff888100aa1a00, ffff888100aa1ac9)
[   12.303781] 
[   12.303880] The buggy address belongs to the physical page:
[   12.304179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   12.304476] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.304712] flags: 0x200000000000040(head|node=0|zone=2)
[   12.304885] page_type: f5(slab)
[   12.305002] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.305417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.305767] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.306298] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.306644] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff
[   12.306923] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.307234] page dumped because: kasan: bad access detected
[   12.307491] 
[   12.307584] Memory state around the buggy address:
[   12.307816]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.308207]  ffff888100aa1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.308521] >ffff888100aa1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.308794]                                                           ^
[   12.309111]  ffff888100aa1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.309402]  ffff888100aa1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.309679] ==================================================================
[   12.445369] ==================================================================
[   12.445674] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.446036] Write of size 1 at addr ffff888102a320ea by task kunit_try_catch/179
[   12.446920] 
[   12.447034] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.447075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.447086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.447104] Call Trace:
[   12.447208]  <TASK>
[   12.447227]  dump_stack_lvl+0x73/0xb0
[   12.447257]  print_report+0xd1/0x650
[   12.447359]  ? __virt_addr_valid+0x1db/0x2d0
[   12.447385]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.447409]  ? kasan_addr_to_slab+0x11/0xa0
[   12.447429]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.447454]  kasan_report+0x141/0x180
[   12.447475]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.447504]  __asan_report_store1_noabort+0x1b/0x30
[   12.447529]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.447554]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.447579]  ? finish_task_switch.isra.0+0x153/0x700
[   12.447601]  ? __switch_to+0x47/0xf50
[   12.447624]  ? __schedule+0x10cc/0x2b60
[   12.447646]  ? __pfx_read_tsc+0x10/0x10
[   12.447669]  krealloc_large_less_oob+0x1c/0x30
[   12.447692]  kunit_try_run_case+0x1a5/0x480
[   12.447727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.447749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.447772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.447795]  ? __kthread_parkme+0x82/0x180
[   12.447816]  ? preempt_count_sub+0x50/0x80
[   12.447839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.447863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.447886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.447911]  kthread+0x337/0x6f0
[   12.447929]  ? trace_preempt_on+0x20/0xc0
[   12.447952]  ? __pfx_kthread+0x10/0x10
[   12.447971]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.447992]  ? calculate_sigpending+0x7b/0xa0
[   12.448015]  ? __pfx_kthread+0x10/0x10
[   12.448062]  ret_from_fork+0x116/0x1d0
[   12.448090]  ? __pfx_kthread+0x10/0x10
[   12.448110]  ret_from_fork_asm+0x1a/0x30
[   12.448140]  </TASK>
[   12.448150] 
[   12.459364] The buggy address belongs to the physical page:
[   12.459630] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   12.459961] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.460722] flags: 0x200000000000040(head|node=0|zone=2)
[   12.461077] page_type: f8(unknown)
[   12.461438] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.461802] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.462361] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.462835] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.463316] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   12.463788] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.464236] page dumped because: kasan: bad access detected
[   12.464486] 
[   12.464570] Memory state around the buggy address:
[   12.464814]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.465479]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.465786] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.466417]                                                           ^
[   12.466843]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.467256]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.467574] ==================================================================
[   12.228764] ==================================================================
[   12.229228] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.229549] Write of size 1 at addr ffff888100aa1ac9 by task kunit_try_catch/175
[   12.229843] 
[   12.229952] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.229994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.230004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.230024] Call Trace:
[   12.230035]  <TASK>
[   12.230052]  dump_stack_lvl+0x73/0xb0
[   12.230079]  print_report+0xd1/0x650
[   12.230100]  ? __virt_addr_valid+0x1db/0x2d0
[   12.230121]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.230144]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.230165]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.230188]  kasan_report+0x141/0x180
[   12.230208]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.230235]  __asan_report_store1_noabort+0x1b/0x30
[   12.230258]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.230283]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.230306]  ? finish_task_switch.isra.0+0x153/0x700
[   12.230328]  ? __switch_to+0x47/0xf50
[   12.230352]  ? __schedule+0x10cc/0x2b60
[   12.230373]  ? __pfx_read_tsc+0x10/0x10
[   12.230396]  krealloc_less_oob+0x1c/0x30
[   12.230416]  kunit_try_run_case+0x1a5/0x480
[   12.230439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.230460]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.230483]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.230504]  ? __kthread_parkme+0x82/0x180
[   12.230524]  ? preempt_count_sub+0x50/0x80
[   12.230545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.230568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.230589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.230612]  kthread+0x337/0x6f0
[   12.230629]  ? trace_preempt_on+0x20/0xc0
[   12.230652]  ? __pfx_kthread+0x10/0x10
[   12.230671]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.230691]  ? calculate_sigpending+0x7b/0xa0
[   12.230750]  ? __pfx_kthread+0x10/0x10
[   12.230792]  ret_from_fork+0x116/0x1d0
[   12.230810]  ? __pfx_kthread+0x10/0x10
[   12.230859]  ret_from_fork_asm+0x1a/0x30
[   12.230890]  </TASK>
[   12.230899] 
[   12.238269] Allocated by task 175:
[   12.238450]  kasan_save_stack+0x45/0x70
[   12.238657]  kasan_save_track+0x18/0x40
[   12.238853]  kasan_save_alloc_info+0x3b/0x50
[   12.239114]  __kasan_krealloc+0x190/0x1f0
[   12.239288]  krealloc_noprof+0xf3/0x340
[   12.239461]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.239685]  krealloc_less_oob+0x1c/0x30
[   12.239833]  kunit_try_run_case+0x1a5/0x480
[   12.239978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.240282]  kthread+0x337/0x6f0
[   12.240458]  ret_from_fork+0x116/0x1d0
[   12.240647]  ret_from_fork_asm+0x1a/0x30
[   12.240849] 
[   12.240928] The buggy address belongs to the object at ffff888100aa1a00
[   12.240928]  which belongs to the cache kmalloc-256 of size 256
[   12.241531] The buggy address is located 0 bytes to the right of
[   12.241531]  allocated 201-byte region [ffff888100aa1a00, ffff888100aa1ac9)
[   12.241916] 
[   12.242091] The buggy address belongs to the physical page:
[   12.242350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   12.242716] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.243135] flags: 0x200000000000040(head|node=0|zone=2)
[   12.243392] page_type: f5(slab)
[   12.243564] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.243923] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.244288] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.244526] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.244795] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff
[   12.245208] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.245547] page dumped because: kasan: bad access detected
[   12.245808] 
[   12.245901] Memory state around the buggy address:
[   12.246261]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.246510]  ffff888100aa1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.246846] >ffff888100aa1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.247174]                                               ^
[   12.247435]  ffff888100aa1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.247762]  ffff888100aa1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.248115] ==================================================================
[   12.269465] ==================================================================
[   12.269818] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.270364] Write of size 1 at addr ffff888100aa1ada by task kunit_try_catch/175
[   12.270666] 
[   12.270793] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.270832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.270843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.270862] Call Trace:
[   12.270875]  <TASK>
[   12.270889]  dump_stack_lvl+0x73/0xb0
[   12.270917]  print_report+0xd1/0x650
[   12.270939]  ? __virt_addr_valid+0x1db/0x2d0
[   12.270960]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.270983]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.271006]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.271110]  kasan_report+0x141/0x180
[   12.271132]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.271161]  __asan_report_store1_noabort+0x1b/0x30
[   12.271186]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.271212]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.271236]  ? finish_task_switch.isra.0+0x153/0x700
[   12.271258]  ? __switch_to+0x47/0xf50
[   12.271282]  ? __schedule+0x10cc/0x2b60
[   12.271303]  ? __pfx_read_tsc+0x10/0x10
[   12.271326]  krealloc_less_oob+0x1c/0x30
[   12.271349]  kunit_try_run_case+0x1a5/0x480
[   12.271372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.271395]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.271418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.271441]  ? __kthread_parkme+0x82/0x180
[   12.271460]  ? preempt_count_sub+0x50/0x80
[   12.271483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.271507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.271530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.271555]  kthread+0x337/0x6f0
[   12.271573]  ? trace_preempt_on+0x20/0xc0
[   12.271596]  ? __pfx_kthread+0x10/0x10
[   12.271616]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.271637]  ? calculate_sigpending+0x7b/0xa0
[   12.271660]  ? __pfx_kthread+0x10/0x10
[   12.271681]  ret_from_fork+0x116/0x1d0
[   12.271698]  ? __pfx_kthread+0x10/0x10
[   12.271729]  ret_from_fork_asm+0x1a/0x30
[   12.271760]  </TASK>
[   12.271770] 
[   12.279331] Allocated by task 175:
[   12.279460]  kasan_save_stack+0x45/0x70
[   12.279604]  kasan_save_track+0x18/0x40
[   12.279755]  kasan_save_alloc_info+0x3b/0x50
[   12.279967]  __kasan_krealloc+0x190/0x1f0
[   12.280406]  krealloc_noprof+0xf3/0x340
[   12.280613]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.280857]  krealloc_less_oob+0x1c/0x30
[   12.281123]  kunit_try_run_case+0x1a5/0x480
[   12.281274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.281450]  kthread+0x337/0x6f0
[   12.281613]  ret_from_fork+0x116/0x1d0
[   12.281810]  ret_from_fork_asm+0x1a/0x30
[   12.282006] 
[   12.282175] The buggy address belongs to the object at ffff888100aa1a00
[   12.282175]  which belongs to the cache kmalloc-256 of size 256
[   12.282686] The buggy address is located 17 bytes to the right of
[   12.282686]  allocated 201-byte region [ffff888100aa1a00, ffff888100aa1ac9)
[   12.283247] 
[   12.283320] The buggy address belongs to the physical page:
[   12.283491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   12.283856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.284277] flags: 0x200000000000040(head|node=0|zone=2)
[   12.284517] page_type: f5(slab)
[   12.284688] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.284939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.285412] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.285769] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.286196] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff
[   12.286536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.286874] page dumped because: kasan: bad access detected
[   12.287117] 
[   12.287188] Memory state around the buggy address:
[   12.287342]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.287661]  ffff888100aa1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.287998] >ffff888100aa1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.288387]                                                     ^
[   12.288617]  ffff888100aa1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.288915]  ffff888100aa1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.289262] ==================================================================
[   12.249194] ==================================================================
[   12.249481] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.249741] Write of size 1 at addr ffff888100aa1ad0 by task kunit_try_catch/175
[   12.250071] 
[   12.250180] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.250219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.250229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.250248] Call Trace:
[   12.250259]  <TASK>
[   12.250272]  dump_stack_lvl+0x73/0xb0
[   12.250297]  print_report+0xd1/0x650
[   12.250317]  ? __virt_addr_valid+0x1db/0x2d0
[   12.250338]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.250360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.250381]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.250403]  kasan_report+0x141/0x180
[   12.250424]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.250451]  __asan_report_store1_noabort+0x1b/0x30
[   12.250474]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.250498]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.250521]  ? finish_task_switch.isra.0+0x153/0x700
[   12.250541]  ? __switch_to+0x47/0xf50
[   12.250565]  ? __schedule+0x10cc/0x2b60
[   12.250586]  ? __pfx_read_tsc+0x10/0x10
[   12.250608]  krealloc_less_oob+0x1c/0x30
[   12.250628]  kunit_try_run_case+0x1a5/0x480
[   12.250650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.250671]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.250692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.250853]  ? __kthread_parkme+0x82/0x180
[   12.250877]  ? preempt_count_sub+0x50/0x80
[   12.250899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.250923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.250948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.250972]  kthread+0x337/0x6f0
[   12.250990]  ? trace_preempt_on+0x20/0xc0
[   12.251340]  ? __pfx_kthread+0x10/0x10
[   12.251368]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.251390]  ? calculate_sigpending+0x7b/0xa0
[   12.251413]  ? __pfx_kthread+0x10/0x10
[   12.251434]  ret_from_fork+0x116/0x1d0
[   12.251452]  ? __pfx_kthread+0x10/0x10
[   12.251472]  ret_from_fork_asm+0x1a/0x30
[   12.251502]  </TASK>
[   12.251511] 
[   12.259071] Allocated by task 175:
[   12.259246]  kasan_save_stack+0x45/0x70
[   12.259457]  kasan_save_track+0x18/0x40
[   12.259655]  kasan_save_alloc_info+0x3b/0x50
[   12.259877]  __kasan_krealloc+0x190/0x1f0
[   12.260267]  krealloc_noprof+0xf3/0x340
[   12.260474]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.260671]  krealloc_less_oob+0x1c/0x30
[   12.260871]  kunit_try_run_case+0x1a5/0x480
[   12.261155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.261377]  kthread+0x337/0x6f0
[   12.261539]  ret_from_fork+0x116/0x1d0
[   12.261725]  ret_from_fork_asm+0x1a/0x30
[   12.261906] 
[   12.262005] The buggy address belongs to the object at ffff888100aa1a00
[   12.262005]  which belongs to the cache kmalloc-256 of size 256
[   12.262544] The buggy address is located 7 bytes to the right of
[   12.262544]  allocated 201-byte region [ffff888100aa1a00, ffff888100aa1ac9)
[   12.263076] 
[   12.263183] The buggy address belongs to the physical page:
[   12.263437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   12.263783] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.264153] flags: 0x200000000000040(head|node=0|zone=2)
[   12.264388] page_type: f5(slab)
[   12.264530] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.264775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.265006] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.265546] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.265898] head: 0200000000000001 ffffea000402a801 00000000ffffffff 00000000ffffffff
[   12.266321] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.266658] page dumped because: kasan: bad access detected
[   12.266918] 
[   12.267072] Memory state around the buggy address:
[   12.267278]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.267557]  ffff888100aa1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.267856] >ffff888100aa1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.268203]                                                  ^
[   12.268447]  ffff888100aa1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.268681]  ffff888100aa1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.268902] ==================================================================
[   12.384802] ==================================================================
[   12.385347] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.386070] Write of size 1 at addr ffff888102a320c9 by task kunit_try_catch/179
[   12.386581] 
[   12.386714] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.386758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.386769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.386790] Call Trace:
[   12.386801]  <TASK>
[   12.386818]  dump_stack_lvl+0x73/0xb0
[   12.386850]  print_report+0xd1/0x650
[   12.386873]  ? __virt_addr_valid+0x1db/0x2d0
[   12.386896]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.386920]  ? kasan_addr_to_slab+0x11/0xa0
[   12.386941]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.386965]  kasan_report+0x141/0x180
[   12.386986]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.387015]  __asan_report_store1_noabort+0x1b/0x30
[   12.387040]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.387066]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.387103]  ? finish_task_switch.isra.0+0x153/0x700
[   12.387128]  ? __switch_to+0x47/0xf50
[   12.387154]  ? __schedule+0x10cc/0x2b60
[   12.387175]  ? __pfx_read_tsc+0x10/0x10
[   12.387200]  krealloc_large_less_oob+0x1c/0x30
[   12.387223]  kunit_try_run_case+0x1a5/0x480
[   12.387248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.387270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.387294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.387317]  ? __kthread_parkme+0x82/0x180
[   12.387338]  ? preempt_count_sub+0x50/0x80
[   12.387360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.387384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.387408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.387433]  kthread+0x337/0x6f0
[   12.387452]  ? trace_preempt_on+0x20/0xc0
[   12.387475]  ? __pfx_kthread+0x10/0x10
[   12.387495]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.387516]  ? calculate_sigpending+0x7b/0xa0
[   12.387540]  ? __pfx_kthread+0x10/0x10
[   12.387561]  ret_from_fork+0x116/0x1d0
[   12.387579]  ? __pfx_kthread+0x10/0x10
[   12.387599]  ret_from_fork_asm+0x1a/0x30
[   12.387630]  </TASK>
[   12.387639] 
[   12.395576] The buggy address belongs to the physical page:
[   12.395864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   12.396247] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.396582] flags: 0x200000000000040(head|node=0|zone=2)
[   12.396816] page_type: f8(unknown)
[   12.396992] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.397406] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.397763] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.398234] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.398764] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   12.399132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.399459] page dumped because: kasan: bad access detected
[   12.399715] 
[   12.399804] Memory state around the buggy address:
[   12.399953]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.400161]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.400555] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.400905]                                               ^
[   12.401282]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.401687]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.402014] ==================================================================