Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.515758] ==================================================================
[   16.515843] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.515925] Write of size 1 at addr fff00000c78a60c9 by task kunit_try_catch/162
[   16.515973] 
[   16.516004] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.516081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.516115] Hardware name: linux,dummy-virt (DT)
[   16.516153] Call trace:
[   16.516182]  show_stack+0x20/0x38 (C)
[   16.516231]  dump_stack_lvl+0x8c/0xd0
[   16.516277]  print_report+0x118/0x5d0
[   16.516323]  kasan_report+0xdc/0x128
[   16.516368]  __asan_report_store1_noabort+0x20/0x30
[   16.516418]  krealloc_less_oob_helper+0xa48/0xc50
[   16.516465]  krealloc_large_less_oob+0x20/0x38
[   16.516511]  kunit_try_run_case+0x170/0x3f0
[   16.516558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.516609]  kthread+0x328/0x630
[   16.516649]  ret_from_fork+0x10/0x20
[   16.516695] 
[   16.516725] The buggy address belongs to the physical page:
[   16.516756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   16.516807] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.516858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.517632] page_type: f8(unknown)
[   16.517721] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.517843] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.517957] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.518043] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.518149] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff
[   16.518216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.518311] page dumped because: kasan: bad access detected
[   16.518369] 
[   16.518386] Memory state around the buggy address:
[   16.518417]  fff00000c78a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.518457]  fff00000c78a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.518497] >fff00000c78a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.518532]                                               ^
[   16.518565]  fff00000c78a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.518604]  fff00000c78a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.518640] ==================================================================
[   16.471046] ==================================================================
[   16.471166] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.471230] Write of size 1 at addr fff00000c0b980d0 by task kunit_try_catch/158
[   16.471277] 
[   16.471307] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.471389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.471414] Hardware name: linux,dummy-virt (DT)
[   16.471443] Call trace:
[   16.471625]  show_stack+0x20/0x38 (C)
[   16.471755]  dump_stack_lvl+0x8c/0xd0
[   16.471811]  print_report+0x118/0x5d0
[   16.471956]  kasan_report+0xdc/0x128
[   16.472006]  __asan_report_store1_noabort+0x20/0x30
[   16.472061]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.472268]  krealloc_less_oob+0x20/0x38
[   16.472444]  kunit_try_run_case+0x170/0x3f0
[   16.472522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.472580]  kthread+0x328/0x630
[   16.472620]  ret_from_fork+0x10/0x20
[   16.472687] 
[   16.472729] Allocated by task 158:
[   16.472757]  kasan_save_stack+0x3c/0x68
[   16.472798]  kasan_save_track+0x20/0x40
[   16.472834]  kasan_save_alloc_info+0x40/0x58
[   16.472884]  __kasan_krealloc+0x118/0x178
[   16.472930]  krealloc_noprof+0x128/0x360
[   16.472975]  krealloc_less_oob_helper+0x168/0xc50
[   16.473013]  krealloc_less_oob+0x20/0x38
[   16.473056]  kunit_try_run_case+0x170/0x3f0
[   16.473100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.473141]  kthread+0x328/0x630
[   16.473178]  ret_from_fork+0x10/0x20
[   16.473229] 
[   16.473247] The buggy address belongs to the object at fff00000c0b98000
[   16.473247]  which belongs to the cache kmalloc-256 of size 256
[   16.473316] The buggy address is located 7 bytes to the right of
[   16.473316]  allocated 201-byte region [fff00000c0b98000, fff00000c0b980c9)
[   16.473376] 
[   16.473396] The buggy address belongs to the physical page:
[   16.473432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b98
[   16.473491] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.473550] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.473604] page_type: f5(slab)
[   16.473659] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.473707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.473764] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.473810] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.473857] head: 0bfffe0000000001 ffffc1ffc302e601 00000000ffffffff 00000000ffffffff
[   16.474290] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.474566] page dumped because: kasan: bad access detected
[   16.474656] 
[   16.474724] Memory state around the buggy address:
[   16.474756]  fff00000c0b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.474969]  fff00000c0b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.475171] >fff00000c0b98080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.475333]                                                  ^
[   16.475423]  fff00000c0b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.475574]  fff00000c0b98180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.475627] ==================================================================
[   16.526662] ==================================================================
[   16.526833] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.526934] Write of size 1 at addr fff00000c78a60ea by task kunit_try_catch/162
[   16.527022] 
[   16.527048] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.527120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.527203] Hardware name: linux,dummy-virt (DT)
[   16.527278] Call trace:
[   16.527327]  show_stack+0x20/0x38 (C)
[   16.527375]  dump_stack_lvl+0x8c/0xd0
[   16.527420]  print_report+0x118/0x5d0
[   16.527464]  kasan_report+0xdc/0x128
[   16.527507]  __asan_report_store1_noabort+0x20/0x30
[   16.527556]  krealloc_less_oob_helper+0xae4/0xc50
[   16.527602]  krealloc_large_less_oob+0x20/0x38
[   16.527666]  kunit_try_run_case+0x170/0x3f0
[   16.527714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.527771]  kthread+0x328/0x630
[   16.527811]  ret_from_fork+0x10/0x20
[   16.527856] 
[   16.527885] The buggy address belongs to the physical page:
[   16.527923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   16.527974] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.528078] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.528209] page_type: f8(unknown)
[   16.528350] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.528476] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.528526] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.528572] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.528619] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff
[   16.528674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.528714] page dumped because: kasan: bad access detected
[   16.528743] 
[   16.528760] Memory state around the buggy address:
[   16.528789]  fff00000c78a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.528829]  fff00000c78a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.528898] >fff00000c78a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.528934]                                                           ^
[   16.528997]  fff00000c78a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.529076]  fff00000c78a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.529184] ==================================================================
[   16.529717] ==================================================================
[   16.529786] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.529831] Write of size 1 at addr fff00000c78a60eb by task kunit_try_catch/162
[   16.529890] 
[   16.529919] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.529993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.530018] Hardware name: linux,dummy-virt (DT)
[   16.530046] Call trace:
[   16.530065]  show_stack+0x20/0x38 (C)
[   16.530110]  dump_stack_lvl+0x8c/0xd0
[   16.530168]  print_report+0x118/0x5d0
[   16.530219]  kasan_report+0xdc/0x128
[   16.530263]  __asan_report_store1_noabort+0x20/0x30
[   16.530312]  krealloc_less_oob_helper+0xa58/0xc50
[   16.530358]  krealloc_large_less_oob+0x20/0x38
[   16.530404]  kunit_try_run_case+0x170/0x3f0
[   16.530448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.530536]  kthread+0x328/0x630
[   16.530604]  ret_from_fork+0x10/0x20
[   16.530650] 
[   16.530668] The buggy address belongs to the physical page:
[   16.530697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   16.530747] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.530791] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.530837] page_type: f8(unknown)
[   16.530882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.530979] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.531030] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.531077] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.531164] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff
[   16.531259] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.531306] page dumped because: kasan: bad access detected
[   16.531335] 
[   16.531369] Memory state around the buggy address:
[   16.531427]  fff00000c78a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.531474]  fff00000c78a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.531535] >fff00000c78a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.531571]                                                           ^
[   16.531606]  fff00000c78a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.531645]  fff00000c78a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.531754] ==================================================================
[   16.523952] ==================================================================
[   16.523998] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.524095] Write of size 1 at addr fff00000c78a60da by task kunit_try_catch/162
[   16.524180] 
[   16.524236] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.524338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.524364] Hardware name: linux,dummy-virt (DT)
[   16.524416] Call trace:
[   16.524455]  show_stack+0x20/0x38 (C)
[   16.524540]  dump_stack_lvl+0x8c/0xd0
[   16.524588]  print_report+0x118/0x5d0
[   16.524633]  kasan_report+0xdc/0x128
[   16.524677]  __asan_report_store1_noabort+0x20/0x30
[   16.524726]  krealloc_less_oob_helper+0xa80/0xc50
[   16.524772]  krealloc_large_less_oob+0x20/0x38
[   16.524817]  kunit_try_run_case+0x170/0x3f0
[   16.524874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.524925]  kthread+0x328/0x630
[   16.524964]  ret_from_fork+0x10/0x20
[   16.525036] 
[   16.525083] The buggy address belongs to the physical page:
[   16.525141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   16.525197] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.525300] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.525396] page_type: f8(unknown)
[   16.525442] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.525491] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.525790] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.525837] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.525894] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff
[   16.525970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.526017] page dumped because: kasan: bad access detected
[   16.526125] 
[   16.526144] Memory state around the buggy address:
[   16.526174]  fff00000c78a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.526271]  fff00000c78a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.526339] >fff00000c78a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.526377]                                                     ^
[   16.526412]  fff00000c78a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.526479]  fff00000c78a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.526516] ==================================================================
[   16.519562] ==================================================================
[   16.519609] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.519657] Write of size 1 at addr fff00000c78a60d0 by task kunit_try_catch/162
[   16.519704] 
[   16.519733] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.519908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.520088] Hardware name: linux,dummy-virt (DT)
[   16.520136] Call trace:
[   16.520194]  show_stack+0x20/0x38 (C)
[   16.520241]  dump_stack_lvl+0x8c/0xd0
[   16.520286]  print_report+0x118/0x5d0
[   16.520331]  kasan_report+0xdc/0x128
[   16.520375]  __asan_report_store1_noabort+0x20/0x30
[   16.520424]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.520470]  krealloc_large_less_oob+0x20/0x38
[   16.520516]  kunit_try_run_case+0x170/0x3f0
[   16.520591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.520641]  kthread+0x328/0x630
[   16.520682]  ret_from_fork+0x10/0x20
[   16.520800] 
[   16.520905] The buggy address belongs to the physical page:
[   16.520960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   16.521288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.521367] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.521490] page_type: f8(unknown)
[   16.521576] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.521634] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.521760] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.521807] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.522160] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff
[   16.522314] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.522470] page dumped because: kasan: bad access detected
[   16.522582] 
[   16.522637] Memory state around the buggy address:
[   16.522666]  fff00000c78a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.522971]  fff00000c78a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.523018] >fff00000c78a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.523125]                                                  ^
[   16.523224]  fff00000c78a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.523336]  fff00000c78a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.523422] ==================================================================
[   16.461593] ==================================================================
[   16.461659] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.461718] Write of size 1 at addr fff00000c0b980c9 by task kunit_try_catch/158
[   16.461766] 
[   16.461799] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.461891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.462126] Hardware name: linux,dummy-virt (DT)
[   16.462900] Call trace:
[   16.462942]  show_stack+0x20/0x38 (C)
[   16.462996]  dump_stack_lvl+0x8c/0xd0
[   16.463044]  print_report+0x118/0x5d0
[   16.463173]  kasan_report+0xdc/0x128
[   16.463230]  __asan_report_store1_noabort+0x20/0x30
[   16.463280]  krealloc_less_oob_helper+0xa48/0xc50
[   16.463824]  krealloc_less_oob+0x20/0x38
[   16.463880]  kunit_try_run_case+0x170/0x3f0
[   16.464234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.464398]  kthread+0x328/0x630
[   16.464488]  ret_from_fork+0x10/0x20
[   16.464666] 
[   16.464752] Allocated by task 158:
[   16.464939]  kasan_save_stack+0x3c/0x68
[   16.465011]  kasan_save_track+0x20/0x40
[   16.465048]  kasan_save_alloc_info+0x40/0x58
[   16.465448]  __kasan_krealloc+0x118/0x178
[   16.465575]  krealloc_noprof+0x128/0x360
[   16.465986]  krealloc_less_oob_helper+0x168/0xc50
[   16.466117]  krealloc_less_oob+0x20/0x38
[   16.466217]  kunit_try_run_case+0x170/0x3f0
[   16.466326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.466370]  kthread+0x328/0x630
[   16.466657]  ret_from_fork+0x10/0x20
[   16.466776] 
[   16.466855] The buggy address belongs to the object at fff00000c0b98000
[   16.466855]  which belongs to the cache kmalloc-256 of size 256
[   16.467057] The buggy address is located 0 bytes to the right of
[   16.467057]  allocated 201-byte region [fff00000c0b98000, fff00000c0b980c9)
[   16.467212] 
[   16.467354] The buggy address belongs to the physical page:
[   16.467411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b98
[   16.467466] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.467538] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.467850] page_type: f5(slab)
[   16.467907] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.467956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.468038] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.468115] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.468223] head: 0bfffe0000000001 ffffc1ffc302e601 00000000ffffffff 00000000ffffffff
[   16.468342] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.468440] page dumped because: kasan: bad access detected
[   16.468563] 
[   16.468712] Memory state around the buggy address:
[   16.468890]  fff00000c0b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.469061]  fff00000c0b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.469199] >fff00000c0b98080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.469412]                                               ^
[   16.469600]  fff00000c0b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.469776]  fff00000c0b98180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.469887] ==================================================================
[   16.492372] ==================================================================
[   16.492434] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.492488] Write of size 1 at addr fff00000c0b980eb by task kunit_try_catch/158
[   16.492731] 
[   16.492782] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.492941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.492999] Hardware name: linux,dummy-virt (DT)
[   16.493031] Call trace:
[   16.493052]  show_stack+0x20/0x38 (C)
[   16.493146]  dump_stack_lvl+0x8c/0xd0
[   16.493193]  print_report+0x118/0x5d0
[   16.493238]  kasan_report+0xdc/0x128
[   16.493282]  __asan_report_store1_noabort+0x20/0x30
[   16.493331]  krealloc_less_oob_helper+0xa58/0xc50
[   16.493377]  krealloc_less_oob+0x20/0x38
[   16.493421]  kunit_try_run_case+0x170/0x3f0
[   16.493466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.493527]  kthread+0x328/0x630
[   16.493568]  ret_from_fork+0x10/0x20
[   16.493615] 
[   16.493642] Allocated by task 158:
[   16.493684]  kasan_save_stack+0x3c/0x68
[   16.493729]  kasan_save_track+0x20/0x40
[   16.493765]  kasan_save_alloc_info+0x40/0x58
[   16.493803]  __kasan_krealloc+0x118/0x178
[   16.493840]  krealloc_noprof+0x128/0x360
[   16.493886]  krealloc_less_oob_helper+0x168/0xc50
[   16.493923]  krealloc_less_oob+0x20/0x38
[   16.493957]  kunit_try_run_case+0x170/0x3f0
[   16.493993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.494178]  kthread+0x328/0x630
[   16.494282]  ret_from_fork+0x10/0x20
[   16.494318] 
[   16.494346] The buggy address belongs to the object at fff00000c0b98000
[   16.494346]  which belongs to the cache kmalloc-256 of size 256
[   16.494400] The buggy address is located 34 bytes to the right of
[   16.494400]  allocated 201-byte region [fff00000c0b98000, fff00000c0b980c9)
[   16.494461] 
[   16.494706] The buggy address belongs to the physical page:
[   16.494793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b98
[   16.494899] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.494991] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.495056] page_type: f5(slab)
[   16.495093] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.495178] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.495397] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.495603] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.495658] head: 0bfffe0000000001 ffffc1ffc302e601 00000000ffffffff 00000000ffffffff
[   16.495721] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.495761] page dumped because: kasan: bad access detected
[   16.495965] 
[   16.496089] Memory state around the buggy address:
[   16.496197]  fff00000c0b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.496428]  fff00000c0b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.496496] >fff00000c0b98080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.498883]                                                           ^
[   16.498933]  fff00000c0b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498976]  fff00000c0b98180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.499013] ==================================================================
[   16.483517] ==================================================================
[   16.483578] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.483635] Write of size 1 at addr fff00000c0b980ea by task kunit_try_catch/158
[   16.483786] 
[   16.483949] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.484101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.484240] Hardware name: linux,dummy-virt (DT)
[   16.484386] Call trace:
[   16.484527]  show_stack+0x20/0x38 (C)
[   16.484726]  dump_stack_lvl+0x8c/0xd0
[   16.484822]  print_report+0x118/0x5d0
[   16.484880]  kasan_report+0xdc/0x128
[   16.485150]  __asan_report_store1_noabort+0x20/0x30
[   16.485313]  krealloc_less_oob_helper+0xae4/0xc50
[   16.485458]  krealloc_less_oob+0x20/0x38
[   16.485504]  kunit_try_run_case+0x170/0x3f0
[   16.485690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.485840]  kthread+0x328/0x630
[   16.485895]  ret_from_fork+0x10/0x20
[   16.486225] 
[   16.486324] Allocated by task 158:
[   16.486365]  kasan_save_stack+0x3c/0x68
[   16.486421]  kasan_save_track+0x20/0x40
[   16.486466]  kasan_save_alloc_info+0x40/0x58
[   16.486547]  __kasan_krealloc+0x118/0x178
[   16.486587]  krealloc_noprof+0x128/0x360
[   16.486624]  krealloc_less_oob_helper+0x168/0xc50
[   16.486672]  krealloc_less_oob+0x20/0x38
[   16.486708]  kunit_try_run_case+0x170/0x3f0
[   16.486744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.486786]  kthread+0x328/0x630
[   16.486817]  ret_from_fork+0x10/0x20
[   16.486850] 
[   16.487249] The buggy address belongs to the object at fff00000c0b98000
[   16.487249]  which belongs to the cache kmalloc-256 of size 256
[   16.487346] The buggy address is located 33 bytes to the right of
[   16.487346]  allocated 201-byte region [fff00000c0b98000, fff00000c0b980c9)
[   16.487591] 
[   16.487681] The buggy address belongs to the physical page:
[   16.487917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b98
[   16.488164] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.488316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.488520] page_type: f5(slab)
[   16.488576] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.488728] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.488975] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.489200] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489286] head: 0bfffe0000000001 ffffc1ffc302e601 00000000ffffffff 00000000ffffffff
[   16.489405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.489598] page dumped because: kasan: bad access detected
[   16.489755] 
[   16.489826] Memory state around the buggy address:
[   16.489994]  fff00000c0b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490070]  fff00000c0b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.490194] >fff00000c0b98080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.490252]                                                           ^
[   16.490289]  fff00000c0b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490584]  fff00000c0b98180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490742] ==================================================================
[   16.476620] ==================================================================
[   16.476707] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.476852] Write of size 1 at addr fff00000c0b980da by task kunit_try_catch/158
[   16.476915] 
[   16.477015] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.477289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.477377] Hardware name: linux,dummy-virt (DT)
[   16.477410] Call trace:
[   16.477431]  show_stack+0x20/0x38 (C)
[   16.477499]  dump_stack_lvl+0x8c/0xd0
[   16.477554]  print_report+0x118/0x5d0
[   16.477598]  kasan_report+0xdc/0x128
[   16.477642]  __asan_report_store1_noabort+0x20/0x30
[   16.477851]  krealloc_less_oob_helper+0xa80/0xc50
[   16.477990]  krealloc_less_oob+0x20/0x38
[   16.478040]  kunit_try_run_case+0x170/0x3f0
[   16.478129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.478354]  kthread+0x328/0x630
[   16.478480]  ret_from_fork+0x10/0x20
[   16.478558] 
[   16.478649] Allocated by task 158:
[   16.478679]  kasan_save_stack+0x3c/0x68
[   16.478721]  kasan_save_track+0x20/0x40
[   16.478757]  kasan_save_alloc_info+0x40/0x58
[   16.478939]  __kasan_krealloc+0x118/0x178
[   16.479084]  krealloc_noprof+0x128/0x360
[   16.479144]  krealloc_less_oob_helper+0x168/0xc50
[   16.479262]  krealloc_less_oob+0x20/0x38
[   16.479309]  kunit_try_run_case+0x170/0x3f0
[   16.479346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.479405]  kthread+0x328/0x630
[   16.479544]  ret_from_fork+0x10/0x20
[   16.479774] 
[   16.479826] The buggy address belongs to the object at fff00000c0b98000
[   16.479826]  which belongs to the cache kmalloc-256 of size 256
[   16.479952] The buggy address is located 17 bytes to the right of
[   16.479952]  allocated 201-byte region [fff00000c0b98000, fff00000c0b980c9)
[   16.480042] 
[   16.480062] The buggy address belongs to the physical page:
[   16.480092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b98
[   16.480144] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.480346] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.480562] page_type: f5(slab)
[   16.480647] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.480794] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.480845] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.481115] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.481262] head: 0bfffe0000000001 ffffc1ffc302e601 00000000ffffffff 00000000ffffffff
[   16.481438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.481585] page dumped because: kasan: bad access detected
[   16.481653] 
[   16.481671] Memory state around the buggy address:
[   16.481702]  fff00000c0b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.482005]  fff00000c0b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.482073] >fff00000c0b98080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.482162]                                                     ^
[   16.482391]  fff00000c0b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.482474]  fff00000c0b98180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.482510] ==================================================================

[   11.893932] ==================================================================
[   11.894405] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.894788] Write of size 1 at addr ffff8881003520c9 by task kunit_try_catch/175
[   11.895231] 
[   11.895355] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.895404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.895415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.895437] Call Trace:
[   11.895448]  <TASK>
[   11.895466]  dump_stack_lvl+0x73/0xb0
[   11.895496]  print_report+0xd1/0x610
[   11.895518]  ? __virt_addr_valid+0x1db/0x2d0
[   11.895542]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.895565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.895587]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.895610]  kasan_report+0x141/0x180
[   11.895632]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.895661]  __asan_report_store1_noabort+0x1b/0x30
[   11.895685]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.895710]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.895734]  ? finish_task_switch.isra.0+0x153/0x700
[   11.895756]  ? __switch_to+0x47/0xf50
[   11.895782]  ? __schedule+0x10cc/0x2b60
[   11.895805]  ? __pfx_read_tsc+0x10/0x10
[   11.895829]  krealloc_less_oob+0x1c/0x30
[   11.895850]  kunit_try_run_case+0x1a5/0x480
[   11.895875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.895896]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.895920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.895943]  ? __kthread_parkme+0x82/0x180
[   11.895964]  ? preempt_count_sub+0x50/0x80
[   11.895987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.896010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.896033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.896067]  kthread+0x337/0x6f0
[   11.896100]  ? trace_preempt_on+0x20/0xc0
[   11.896123]  ? __pfx_kthread+0x10/0x10
[   11.896143]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.896164]  ? calculate_sigpending+0x7b/0xa0
[   11.896189]  ? __pfx_kthread+0x10/0x10
[   11.896212]  ret_from_fork+0x116/0x1d0
[   11.896230]  ? __pfx_kthread+0x10/0x10
[   11.896250]  ret_from_fork_asm+0x1a/0x30
[   11.896282]  </TASK>
[   11.896293] 
[   11.906535] Allocated by task 175:
[   11.907116]  kasan_save_stack+0x45/0x70
[   11.907345]  kasan_save_track+0x18/0x40
[   11.907529]  kasan_save_alloc_info+0x3b/0x50
[   11.907935]  __kasan_krealloc+0x190/0x1f0
[   11.908386]  krealloc_noprof+0xf3/0x340
[   11.908719]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.909228]  krealloc_less_oob+0x1c/0x30
[   11.909531]  kunit_try_run_case+0x1a5/0x480
[   11.909885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.910257]  kthread+0x337/0x6f0
[   11.910424]  ret_from_fork+0x116/0x1d0
[   11.910786]  ret_from_fork_asm+0x1a/0x30
[   11.911250] 
[   11.911364] The buggy address belongs to the object at ffff888100352000
[   11.911364]  which belongs to the cache kmalloc-256 of size 256
[   11.912317] The buggy address is located 0 bytes to the right of
[   11.912317]  allocated 201-byte region [ffff888100352000, ffff8881003520c9)
[   11.913355] 
[   11.913450] The buggy address belongs to the physical page:
[   11.914092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100352
[   11.914551] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.915262] flags: 0x200000000000040(head|node=0|zone=2)
[   11.915584] page_type: f5(slab)
[   11.915904] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.916170] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.916473] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.917320] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.917985] head: 0200000000000001 ffffea000400d481 00000000ffffffff 00000000ffffffff
[   11.918472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.919152] page dumped because: kasan: bad access detected
[   11.919629] 
[   11.919744] Memory state around the buggy address:
[   11.920260]  ffff888100351f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.920883]  ffff888100352000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.921218] >ffff888100352080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.921505]                                               ^
[   11.922182]  ffff888100352100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.922656]  ffff888100352180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.923350] ==================================================================
[   11.945687] ==================================================================
[   11.945935] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.946334] Write of size 1 at addr ffff8881003520da by task kunit_try_catch/175
[   11.946853] 
[   11.947059] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.947102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.947113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.947134] Call Trace:
[   11.947151]  <TASK>
[   11.947168]  dump_stack_lvl+0x73/0xb0
[   11.947196]  print_report+0xd1/0x610
[   11.947218]  ? __virt_addr_valid+0x1db/0x2d0
[   11.947240]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.947263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.947284]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.947308]  kasan_report+0x141/0x180
[   11.947329]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.947358]  __asan_report_store1_noabort+0x1b/0x30
[   11.947382]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.947407]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.947430]  ? finish_task_switch.isra.0+0x153/0x700
[   11.947452]  ? __switch_to+0x47/0xf50
[   11.947479]  ? __schedule+0x10cc/0x2b60
[   11.947502]  ? __pfx_read_tsc+0x10/0x10
[   11.947526]  krealloc_less_oob+0x1c/0x30
[   11.947547]  kunit_try_run_case+0x1a5/0x480
[   11.947571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.947596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.947621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.947644]  ? __kthread_parkme+0x82/0x180
[   11.947664]  ? preempt_count_sub+0x50/0x80
[   11.947687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.947709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.947732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.947755]  kthread+0x337/0x6f0
[   11.947773]  ? trace_preempt_on+0x20/0xc0
[   11.947796]  ? __pfx_kthread+0x10/0x10
[   11.947815]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.947835]  ? calculate_sigpending+0x7b/0xa0
[   11.947859]  ? __pfx_kthread+0x10/0x10
[   11.947879]  ret_from_fork+0x116/0x1d0
[   11.947896]  ? __pfx_kthread+0x10/0x10
[   11.947916]  ret_from_fork_asm+0x1a/0x30
[   11.947948]  </TASK>
[   11.947957] 
[   11.955803] Allocated by task 175:
[   11.956164]  kasan_save_stack+0x45/0x70
[   11.956368]  kasan_save_track+0x18/0x40
[   11.956547]  kasan_save_alloc_info+0x3b/0x50
[   11.956700]  __kasan_krealloc+0x190/0x1f0
[   11.956835]  krealloc_noprof+0xf3/0x340
[   11.956965]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.957133]  krealloc_less_oob+0x1c/0x30
[   11.957267]  kunit_try_run_case+0x1a5/0x480
[   11.957408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.957576]  kthread+0x337/0x6f0
[   11.957691]  ret_from_fork+0x116/0x1d0
[   11.957996]  ret_from_fork_asm+0x1a/0x30
[   11.958294] 
[   11.958385] The buggy address belongs to the object at ffff888100352000
[   11.958385]  which belongs to the cache kmalloc-256 of size 256
[   11.959187] The buggy address is located 17 bytes to the right of
[   11.959187]  allocated 201-byte region [ffff888100352000, ffff8881003520c9)
[   11.959556] 
[   11.959631] The buggy address belongs to the physical page:
[   11.959802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100352
[   11.960036] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.960265] flags: 0x200000000000040(head|node=0|zone=2)
[   11.960606] page_type: f5(slab)
[   11.960871] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.961240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.961626] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.962067] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.962623] head: 0200000000000001 ffffea000400d481 00000000ffffffff 00000000ffffffff
[   11.963132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.963432] page dumped because: kasan: bad access detected
[   11.963625] 
[   11.963694] Memory state around the buggy address:
[   11.963876]  ffff888100351f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.964225]  ffff888100352000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.964496] >ffff888100352080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.964956]                                                     ^
[   11.965252]  ffff888100352100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.965460]  ffff888100352180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.965665] ==================================================================
[   12.098448] ==================================================================
[   12.100014] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.101082] Write of size 1 at addr ffff888102b320d0 by task kunit_try_catch/179
[   12.101406] 
[   12.101518] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.101562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.101572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.101593] Call Trace:
[   12.101611]  <TASK>
[   12.101627]  dump_stack_lvl+0x73/0xb0
[   12.101656]  print_report+0xd1/0x610
[   12.101678]  ? __virt_addr_valid+0x1db/0x2d0
[   12.101701]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.101724]  ? kasan_addr_to_slab+0x11/0xa0
[   12.101744]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.101767]  kasan_report+0x141/0x180
[   12.101788]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.101817]  __asan_report_store1_noabort+0x1b/0x30
[   12.101841]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.101867]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.101890]  ? finish_task_switch.isra.0+0x153/0x700
[   12.101912]  ? __switch_to+0x47/0xf50
[   12.101939]  ? __schedule+0x10cc/0x2b60
[   12.101963]  ? __pfx_read_tsc+0x10/0x10
[   12.101986]  krealloc_large_less_oob+0x1c/0x30
[   12.102008]  kunit_try_run_case+0x1a5/0x480
[   12.102032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.102064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.102088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.102110]  ? __kthread_parkme+0x82/0x180
[   12.102130]  ? preempt_count_sub+0x50/0x80
[   12.102153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.102176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.102200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.102226]  kthread+0x337/0x6f0
[   12.102244]  ? trace_preempt_on+0x20/0xc0
[   12.102268]  ? __pfx_kthread+0x10/0x10
[   12.102288]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.102309]  ? calculate_sigpending+0x7b/0xa0
[   12.102332]  ? __pfx_kthread+0x10/0x10
[   12.102352]  ret_from_fork+0x116/0x1d0
[   12.102370]  ? __pfx_kthread+0x10/0x10
[   12.102389]  ret_from_fork_asm+0x1a/0x30
[   12.102421]  </TASK>
[   12.102431] 
[   12.117130] The buggy address belongs to the physical page:
[   12.117448] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30
[   12.117841] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.118186] flags: 0x200000000000040(head|node=0|zone=2)
[   12.118475] page_type: f8(unknown)
[   12.118624] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.118986] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.119326] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.119705] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.119991] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff
[   12.120319] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.120683] page dumped because: kasan: bad access detected
[   12.120934] 
[   12.121017] Memory state around the buggy address:
[   12.121277]  ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.121515]  ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.121851] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.122116]                                                  ^
[   12.122389]  ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.122672]  ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.123022] ==================================================================
[   11.985935] ==================================================================
[   11.986521] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.986875] Write of size 1 at addr ffff8881003520eb by task kunit_try_catch/175
[   11.988167] 
[   11.988328] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.988376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.988387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.988409] Call Trace:
[   11.988428]  <TASK>
[   11.988448]  dump_stack_lvl+0x73/0xb0
[   11.988479]  print_report+0xd1/0x610
[   11.988501]  ? __virt_addr_valid+0x1db/0x2d0
[   11.988523]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.988547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.988569]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.988593]  kasan_report+0x141/0x180
[   11.988614]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.988643]  __asan_report_store1_noabort+0x1b/0x30
[   11.988667]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.988693]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.988717]  ? finish_task_switch.isra.0+0x153/0x700
[   11.988740]  ? __switch_to+0x47/0xf50
[   11.988766]  ? __schedule+0x10cc/0x2b60
[   11.988789]  ? __pfx_read_tsc+0x10/0x10
[   11.988813]  krealloc_less_oob+0x1c/0x30
[   11.988835]  kunit_try_run_case+0x1a5/0x480
[   11.988860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.988883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.988907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.988929]  ? __kthread_parkme+0x82/0x180
[   11.988949]  ? preempt_count_sub+0x50/0x80
[   11.988973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.988996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.989019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.989042]  kthread+0x337/0x6f0
[   11.989072]  ? trace_preempt_on+0x20/0xc0
[   11.989095]  ? __pfx_kthread+0x10/0x10
[   11.989115]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.989136]  ? calculate_sigpending+0x7b/0xa0
[   11.989160]  ? __pfx_kthread+0x10/0x10
[   11.989185]  ret_from_fork+0x116/0x1d0
[   11.989207]  ? __pfx_kthread+0x10/0x10
[   11.989230]  ret_from_fork_asm+0x1a/0x30
[   11.989284]  </TASK>
[   11.989294] 
[   11.997605] Allocated by task 175:
[   11.997737]  kasan_save_stack+0x45/0x70
[   11.997906]  kasan_save_track+0x18/0x40
[   11.998476]  kasan_save_alloc_info+0x3b/0x50
[   11.999101]  __kasan_krealloc+0x190/0x1f0
[   11.999316]  krealloc_noprof+0xf3/0x340
[   11.999512]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.000073]  krealloc_less_oob+0x1c/0x30
[   12.000460]  kunit_try_run_case+0x1a5/0x480
[   12.000697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.001236]  kthread+0x337/0x6f0
[   12.001411]  ret_from_fork+0x116/0x1d0
[   12.001655]  ret_from_fork_asm+0x1a/0x30
[   12.001975] 
[   12.002089] The buggy address belongs to the object at ffff888100352000
[   12.002089]  which belongs to the cache kmalloc-256 of size 256
[   12.002529] The buggy address is located 34 bytes to the right of
[   12.002529]  allocated 201-byte region [ffff888100352000, ffff8881003520c9)
[   12.004146] 
[   12.004320] The buggy address belongs to the physical page:
[   12.004697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100352
[   12.005152] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.005547] flags: 0x200000000000040(head|node=0|zone=2)
[   12.005901] page_type: f5(slab)
[   12.006088] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.006371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.006712] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.007044] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.007393] head: 0200000000000001 ffffea000400d481 00000000ffffffff 00000000ffffffff
[   12.008024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.008426] page dumped because: kasan: bad access detected
[   12.008616] 
[   12.008724] Memory state around the buggy address:
[   12.009024]  ffff888100351f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.009315]  ffff888100352000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.009611] >ffff888100352080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.009937]                                                           ^
[   12.010221]  ffff888100352100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.010665]  ffff888100352180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.010940] ==================================================================
[   11.924593] ==================================================================
[   11.924899] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.925245] Write of size 1 at addr ffff8881003520d0 by task kunit_try_catch/175
[   11.925600] 
[   11.925692] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.925738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.925749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.925771] Call Trace:
[   11.925784]  <TASK>
[   11.925802]  dump_stack_lvl+0x73/0xb0
[   11.925830]  print_report+0xd1/0x610
[   11.925851]  ? __virt_addr_valid+0x1db/0x2d0
[   11.925874]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.925897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.925920]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.925944]  kasan_report+0x141/0x180
[   11.925966]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.925995]  __asan_report_store1_noabort+0x1b/0x30
[   11.926020]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.926045]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.926079]  ? finish_task_switch.isra.0+0x153/0x700
[   11.926102]  ? __switch_to+0x47/0xf50
[   11.926128]  ? __schedule+0x10cc/0x2b60
[   11.926150]  ? __pfx_read_tsc+0x10/0x10
[   11.926174]  krealloc_less_oob+0x1c/0x30
[   11.926194]  kunit_try_run_case+0x1a5/0x480
[   11.926222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.926243]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.926280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.926309]  ? __kthread_parkme+0x82/0x180
[   11.926329]  ? preempt_count_sub+0x50/0x80
[   11.926352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.926375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.926398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.926421]  kthread+0x337/0x6f0
[   11.926439]  ? trace_preempt_on+0x20/0xc0
[   11.926462]  ? __pfx_kthread+0x10/0x10
[   11.926482]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.926502]  ? calculate_sigpending+0x7b/0xa0
[   11.926526]  ? __pfx_kthread+0x10/0x10
[   11.926546]  ret_from_fork+0x116/0x1d0
[   11.926563]  ? __pfx_kthread+0x10/0x10
[   11.926583]  ret_from_fork_asm+0x1a/0x30
[   11.926626]  </TASK>
[   11.926635] 
[   11.934726] Allocated by task 175:
[   11.934857]  kasan_save_stack+0x45/0x70
[   11.935001]  kasan_save_track+0x18/0x40
[   11.935196]  kasan_save_alloc_info+0x3b/0x50
[   11.935567]  __kasan_krealloc+0x190/0x1f0
[   11.935768]  krealloc_noprof+0xf3/0x340
[   11.935959]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.936319]  krealloc_less_oob+0x1c/0x30
[   11.936503]  kunit_try_run_case+0x1a5/0x480
[   11.936735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.937147]  kthread+0x337/0x6f0
[   11.937307]  ret_from_fork+0x116/0x1d0
[   11.937490]  ret_from_fork_asm+0x1a/0x30
[   11.937677] 
[   11.937747] The buggy address belongs to the object at ffff888100352000
[   11.937747]  which belongs to the cache kmalloc-256 of size 256
[   11.938115] The buggy address is located 7 bytes to the right of
[   11.938115]  allocated 201-byte region [ffff888100352000, ffff8881003520c9)
[   11.938646] 
[   11.938717] The buggy address belongs to the physical page:
[   11.938892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100352
[   11.939314] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.939902] flags: 0x200000000000040(head|node=0|zone=2)
[   11.940195] page_type: f5(slab)
[   11.940484] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.940786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.941189] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.941462] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.941694] head: 0200000000000001 ffffea000400d481 00000000ffffffff 00000000ffffffff
[   11.941925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.942402] page dumped because: kasan: bad access detected
[   11.942823] 
[   11.942918] Memory state around the buggy address:
[   11.943149]  ffff888100351f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.943469]  ffff888100352000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.943872] >ffff888100352080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.944184]                                                  ^
[   11.944433]  ffff888100352100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.944752]  ffff888100352180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.945152] ==================================================================
[   12.075644] ==================================================================
[   12.076744] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.077007] Write of size 1 at addr ffff888102b320c9 by task kunit_try_catch/179
[   12.077243] 
[   12.077337] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.077383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.077394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.077416] Call Trace:
[   12.077429]  <TASK>
[   12.077447]  dump_stack_lvl+0x73/0xb0
[   12.077476]  print_report+0xd1/0x610
[   12.077499]  ? __virt_addr_valid+0x1db/0x2d0
[   12.077522]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.077545]  ? kasan_addr_to_slab+0x11/0xa0
[   12.077565]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.077588]  kasan_report+0x141/0x180
[   12.077610]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.077639]  __asan_report_store1_noabort+0x1b/0x30
[   12.077663]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.077689]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.077712]  ? finish_task_switch.isra.0+0x153/0x700
[   12.077735]  ? __switch_to+0x47/0xf50
[   12.077761]  ? __schedule+0x10cc/0x2b60
[   12.077784]  ? __pfx_read_tsc+0x10/0x10
[   12.077808]  krealloc_large_less_oob+0x1c/0x30
[   12.077830]  kunit_try_run_case+0x1a5/0x480
[   12.077855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.077877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.077901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.077924]  ? __kthread_parkme+0x82/0x180
[   12.077944]  ? preempt_count_sub+0x50/0x80
[   12.077967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.077989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.078012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.078035]  kthread+0x337/0x6f0
[   12.078064]  ? trace_preempt_on+0x20/0xc0
[   12.078088]  ? __pfx_kthread+0x10/0x10
[   12.078107]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.078128]  ? calculate_sigpending+0x7b/0xa0
[   12.078152]  ? __pfx_kthread+0x10/0x10
[   12.078172]  ret_from_fork+0x116/0x1d0
[   12.078190]  ? __pfx_kthread+0x10/0x10
[   12.078209]  ret_from_fork_asm+0x1a/0x30
[   12.078247]  </TASK>
[   12.078256] 
[   12.088357] The buggy address belongs to the physical page:
[   12.088868] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30
[   12.089346] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.089780] flags: 0x200000000000040(head|node=0|zone=2)
[   12.090204] page_type: f8(unknown)
[   12.090503] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.090969] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.091300] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.091841] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.092300] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff
[   12.092815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.093353] page dumped because: kasan: bad access detected
[   12.093878] 
[   12.093976] Memory state around the buggy address:
[   12.094204]  ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.094506]  ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.095487] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.096224]                                               ^
[   12.097085]  ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.097557]  ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.097853] ==================================================================
[   12.124008] ==================================================================
[   12.124526] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.125193] Write of size 1 at addr ffff888102b320da by task kunit_try_catch/179
[   12.125520] 
[   12.125644] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.125687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.125698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.125729] Call Trace:
[   12.125741]  <TASK>
[   12.125758]  dump_stack_lvl+0x73/0xb0
[   12.125800]  print_report+0xd1/0x610
[   12.125822]  ? __virt_addr_valid+0x1db/0x2d0
[   12.125845]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.125868]  ? kasan_addr_to_slab+0x11/0xa0
[   12.125888]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.125920]  kasan_report+0x141/0x180
[   12.125941]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.125980]  __asan_report_store1_noabort+0x1b/0x30
[   12.126004]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.126030]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.126063]  ? finish_task_switch.isra.0+0x153/0x700
[   12.126086]  ? __switch_to+0x47/0xf50
[   12.126112]  ? __schedule+0x10cc/0x2b60
[   12.126135]  ? __pfx_read_tsc+0x10/0x10
[   12.126159]  krealloc_large_less_oob+0x1c/0x30
[   12.126181]  kunit_try_run_case+0x1a5/0x480
[   12.126206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.126241]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.126265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.126288]  ? __kthread_parkme+0x82/0x180
[   12.126318]  ? preempt_count_sub+0x50/0x80
[   12.126341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.126364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.126387]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.126410]  kthread+0x337/0x6f0
[   12.126428]  ? trace_preempt_on+0x20/0xc0
[   12.126451]  ? __pfx_kthread+0x10/0x10
[   12.126470]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.126493]  ? calculate_sigpending+0x7b/0xa0
[   12.126516]  ? __pfx_kthread+0x10/0x10
[   12.126537]  ret_from_fork+0x116/0x1d0
[   12.126554]  ? __pfx_kthread+0x10/0x10
[   12.126573]  ret_from_fork_asm+0x1a/0x30
[   12.126619]  </TASK>
[   12.126629] 
[   12.134444] The buggy address belongs to the physical page:
[   12.134637] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30
[   12.134945] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.135446] flags: 0x200000000000040(head|node=0|zone=2)
[   12.135680] page_type: f8(unknown)
[   12.135841] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.136081] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.136423] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.137026] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.137348] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff
[   12.137705] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.138025] page dumped because: kasan: bad access detected
[   12.138271] 
[   12.138375] Memory state around the buggy address:
[   12.138595]  ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.138897]  ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.139209] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.139463]                                                     ^
[   12.139650]  ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.139887]  ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.140230] ==================================================================
[   12.157623] ==================================================================
[   12.158268] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.159110] Write of size 1 at addr ffff888102b320eb by task kunit_try_catch/179
[   12.159417] 
[   12.159562] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.159606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.159617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.159638] Call Trace:
[   12.159656]  <TASK>
[   12.159674]  dump_stack_lvl+0x73/0xb0
[   12.159705]  print_report+0xd1/0x610
[   12.159729]  ? __virt_addr_valid+0x1db/0x2d0
[   12.159762]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.159785]  ? kasan_addr_to_slab+0x11/0xa0
[   12.159805]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.159839]  kasan_report+0x141/0x180
[   12.159860]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.159889]  __asan_report_store1_noabort+0x1b/0x30
[   12.159922]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.159948]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.159982]  ? finish_task_switch.isra.0+0x153/0x700
[   12.160005]  ? __switch_to+0x47/0xf50
[   12.160031]  ? __schedule+0x10cc/0x2b60
[   12.160064]  ? __pfx_read_tsc+0x10/0x10
[   12.160087]  krealloc_large_less_oob+0x1c/0x30
[   12.160118]  kunit_try_run_case+0x1a5/0x480
[   12.160143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.160178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.160203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.160226]  ? __kthread_parkme+0x82/0x180
[   12.160245]  ? preempt_count_sub+0x50/0x80
[   12.160278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.160301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.160324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.160359]  kthread+0x337/0x6f0
[   12.160377]  ? trace_preempt_on+0x20/0xc0
[   12.160400]  ? __pfx_kthread+0x10/0x10
[   12.160419]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.160440]  ? calculate_sigpending+0x7b/0xa0
[   12.160463]  ? __pfx_kthread+0x10/0x10
[   12.160484]  ret_from_fork+0x116/0x1d0
[   12.160501]  ? __pfx_kthread+0x10/0x10
[   12.160520]  ret_from_fork_asm+0x1a/0x30
[   12.160553]  </TASK>
[   12.160563] 
[   12.168255] The buggy address belongs to the physical page:
[   12.168504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30
[   12.168837] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.169076] flags: 0x200000000000040(head|node=0|zone=2)
[   12.169323] page_type: f8(unknown)
[   12.169524] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.169862] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.170194] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.170429] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.171133] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff
[   12.171468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.171734] page dumped because: kasan: bad access detected
[   12.171906] 
[   12.171975] Memory state around the buggy address:
[   12.172254]  ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.172567]  ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.173042] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.173388]                                                           ^
[   12.173599]  ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.173919]  ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.174277] ==================================================================
[   12.140735] ==================================================================
[   12.141352] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.141859] Write of size 1 at addr ffff888102b320ea by task kunit_try_catch/179
[   12.142097] 
[   12.142184] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.142227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.142238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.142258] Call Trace:
[   12.142273]  <TASK>
[   12.142289]  dump_stack_lvl+0x73/0xb0
[   12.142317]  print_report+0xd1/0x610
[   12.142338]  ? __virt_addr_valid+0x1db/0x2d0
[   12.142360]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.142383]  ? kasan_addr_to_slab+0x11/0xa0
[   12.142403]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.142426]  kasan_report+0x141/0x180
[   12.142459]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.142487]  __asan_report_store1_noabort+0x1b/0x30
[   12.142523]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.142548]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.142572]  ? finish_task_switch.isra.0+0x153/0x700
[   12.142604]  ? __switch_to+0x47/0xf50
[   12.142631]  ? __schedule+0x10cc/0x2b60
[   12.142653]  ? __pfx_read_tsc+0x10/0x10
[   12.142677]  krealloc_large_less_oob+0x1c/0x30
[   12.142699]  kunit_try_run_case+0x1a5/0x480
[   12.142723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.142754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.142778]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.142800]  ? __kthread_parkme+0x82/0x180
[   12.142829]  ? preempt_count_sub+0x50/0x80
[   12.142852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.142875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.142898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.142921]  kthread+0x337/0x6f0
[   12.142948]  ? trace_preempt_on+0x20/0xc0
[   12.142970]  ? __pfx_kthread+0x10/0x10
[   12.142990]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.143022]  ? calculate_sigpending+0x7b/0xa0
[   12.143045]  ? __pfx_kthread+0x10/0x10
[   12.143076]  ret_from_fork+0x116/0x1d0
[   12.143093]  ? __pfx_kthread+0x10/0x10
[   12.143121]  ret_from_fork_asm+0x1a/0x30
[   12.143153]  </TASK>
[   12.143162] 
[   12.150862] The buggy address belongs to the physical page:
[   12.151142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b30
[   12.151423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.151835] flags: 0x200000000000040(head|node=0|zone=2)
[   12.152104] page_type: f8(unknown)
[   12.152315] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.152639] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.152959] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.153273] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.153621] head: 0200000000000002 ffffea00040acc01 00000000ffffffff 00000000ffffffff
[   12.153958] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.154293] page dumped because: kasan: bad access detected
[   12.154530] 
[   12.154654] Memory state around the buggy address:
[   12.154873]  ffff888102b31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.155183]  ffff888102b32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.155400] >ffff888102b32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.155614]                                                           ^
[   12.155870]  ffff888102b32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.156215]  ffff888102b32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.156533] ==================================================================
[   11.966350] ==================================================================
[   11.966823] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.967188] Write of size 1 at addr ffff8881003520ea by task kunit_try_catch/175
[   11.967515] 
[   11.967619] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.967660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.967670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.967692] Call Trace:
[   11.967708]  <TASK>
[   11.967726]  dump_stack_lvl+0x73/0xb0
[   11.967755]  print_report+0xd1/0x610
[   11.967777]  ? __virt_addr_valid+0x1db/0x2d0
[   11.967799]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.967841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.967863]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.967887]  kasan_report+0x141/0x180
[   11.967908]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.967937]  __asan_report_store1_noabort+0x1b/0x30
[   11.967961]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.967986]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.968010]  ? finish_task_switch.isra.0+0x153/0x700
[   11.968033]  ? __switch_to+0x47/0xf50
[   11.968069]  ? __schedule+0x10cc/0x2b60
[   11.968091]  ? __pfx_read_tsc+0x10/0x10
[   11.968115]  krealloc_less_oob+0x1c/0x30
[   11.968136]  kunit_try_run_case+0x1a5/0x480
[   11.968159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.968180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.968204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.968226]  ? __kthread_parkme+0x82/0x180
[   11.968246]  ? preempt_count_sub+0x50/0x80
[   11.968268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.968291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.968314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.968337]  kthread+0x337/0x6f0
[   11.968355]  ? trace_preempt_on+0x20/0xc0
[   11.968378]  ? __pfx_kthread+0x10/0x10
[   11.968397]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.968418]  ? calculate_sigpending+0x7b/0xa0
[   11.968442]  ? __pfx_kthread+0x10/0x10
[   11.968462]  ret_from_fork+0x116/0x1d0
[   11.968480]  ? __pfx_kthread+0x10/0x10
[   11.968499]  ret_from_fork_asm+0x1a/0x30
[   11.968532]  </TASK>
[   11.968541] 
[   11.975726] Allocated by task 175:
[   11.975856]  kasan_save_stack+0x45/0x70
[   11.976209]  kasan_save_track+0x18/0x40
[   11.976562]  kasan_save_alloc_info+0x3b/0x50
[   11.976774]  __kasan_krealloc+0x190/0x1f0
[   11.976968]  krealloc_noprof+0xf3/0x340
[   11.977141]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.977301]  krealloc_less_oob+0x1c/0x30
[   11.977438]  kunit_try_run_case+0x1a5/0x480
[   11.977764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.978033]  kthread+0x337/0x6f0
[   11.978210]  ret_from_fork+0x116/0x1d0
[   11.978377]  ret_from_fork_asm+0x1a/0x30
[   11.978516] 
[   11.978627] The buggy address belongs to the object at ffff888100352000
[   11.978627]  which belongs to the cache kmalloc-256 of size 256
[   11.979304] The buggy address is located 33 bytes to the right of
[   11.979304]  allocated 201-byte region [ffff888100352000, ffff8881003520c9)
[   11.979808] 
[   11.979902] The buggy address belongs to the physical page:
[   11.980172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100352
[   11.980578] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.980936] flags: 0x200000000000040(head|node=0|zone=2)
[   11.981225] page_type: f5(slab)
[   11.981349] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.981579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.981921] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.982381] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.982610] head: 0200000000000001 ffffea000400d481 00000000ffffffff 00000000ffffffff
[   11.982840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.983389] page dumped because: kasan: bad access detected
[   11.983882] 
[   11.984008] Memory state around the buggy address:
[   11.984227]  ffff888100351f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.984444]  ffff888100352000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.984659] >ffff888100352080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.984870]                                                           ^
[   11.985080]  ffff888100352100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.985293]  ffff888100352180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.985506] ==================================================================