Hay
Date
July 18, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.228779] ==================================================================
[   15.228966] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.229126] Write of size 1 at addr fff00000c17356da by task kunit_try_catch/158
[   15.229355] 
[   15.229487] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.229587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.229615] Hardware name: linux,dummy-virt (DT)
[   15.229646] Call trace:
[   15.229668]  show_stack+0x20/0x38 (C)
[   15.229720]  dump_stack_lvl+0x8c/0xd0
[   15.229839]  print_report+0x118/0x5d0
[   15.229896]  kasan_report+0xdc/0x128
[   15.229943]  __asan_report_store1_noabort+0x20/0x30
[   15.229995]  krealloc_less_oob_helper+0xa80/0xc50
[   15.230044]  krealloc_less_oob+0x20/0x38
[   15.230091]  kunit_try_run_case+0x170/0x3f0
[   15.230157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.230218]  kthread+0x328/0x630
[   15.230260]  ret_from_fork+0x10/0x20
[   15.230341] 
[   15.230373] Allocated by task 158:
[   15.230401]  kasan_save_stack+0x3c/0x68
[   15.230457]  kasan_save_track+0x20/0x40
[   15.230495]  kasan_save_alloc_info+0x40/0x58
[   15.230541]  __kasan_krealloc+0x118/0x178
[   15.230578]  krealloc_noprof+0x128/0x360
[   15.230629]  krealloc_less_oob_helper+0x168/0xc50
[   15.230668]  krealloc_less_oob+0x20/0x38
[   15.230705]  kunit_try_run_case+0x170/0x3f0
[   15.230751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.230793]  kthread+0x328/0x630
[   15.230843]  ret_from_fork+0x10/0x20
[   15.230878] 
[   15.230898] The buggy address belongs to the object at fff00000c1735600
[   15.230898]  which belongs to the cache kmalloc-256 of size 256
[   15.230955] The buggy address is located 17 bytes to the right of
[   15.230955]  allocated 201-byte region [fff00000c1735600, fff00000c17356c9)
[   15.231019] 
[   15.231039] The buggy address belongs to the physical page:
[   15.231076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734
[   15.231154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.231201] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.231250] page_type: f5(slab)
[   15.231300] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.231799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.232243] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.232335] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.232410] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff
[   15.232482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.232544] page dumped because: kasan: bad access detected
[   15.232799] 
[   15.232933] Memory state around the buggy address:
[   15.233065]  fff00000c1735580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233473]  fff00000c1735600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.233728] >fff00000c1735680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.233845]                                                     ^
[   15.233905]  fff00000c1735700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.234064]  fff00000c1735780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.234370] ==================================================================
[   15.245953] ==================================================================
[   15.246096] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.246390] Write of size 1 at addr fff00000c17356eb by task kunit_try_catch/158
[   15.246454] 
[   15.246531] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.246618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.246645] Hardware name: linux,dummy-virt (DT)
[   15.246840] Call trace:
[   15.247130]  show_stack+0x20/0x38 (C)
[   15.247300]  dump_stack_lvl+0x8c/0xd0
[   15.247365]  print_report+0x118/0x5d0
[   15.247418]  kasan_report+0xdc/0x128
[   15.247515]  __asan_report_store1_noabort+0x20/0x30
[   15.247587]  krealloc_less_oob_helper+0xa58/0xc50
[   15.247637]  krealloc_less_oob+0x20/0x38
[   15.247710]  kunit_try_run_case+0x170/0x3f0
[   15.247926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.248196]  kthread+0x328/0x630
[   15.248282]  ret_from_fork+0x10/0x20
[   15.248406] 
[   15.248443] Allocated by task 158:
[   15.248510]  kasan_save_stack+0x3c/0x68
[   15.248552]  kasan_save_track+0x20/0x40
[   15.249049]  kasan_save_alloc_info+0x40/0x58
[   15.249112]  __kasan_krealloc+0x118/0x178
[   15.249177]  krealloc_noprof+0x128/0x360
[   15.249235]  krealloc_less_oob_helper+0x168/0xc50
[   15.249308]  krealloc_less_oob+0x20/0x38
[   15.249486]  kunit_try_run_case+0x170/0x3f0
[   15.249526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.249746]  kthread+0x328/0x630
[   15.249970]  ret_from_fork+0x10/0x20
[   15.250039] 
[   15.250099] The buggy address belongs to the object at fff00000c1735600
[   15.250099]  which belongs to the cache kmalloc-256 of size 256
[   15.250538] The buggy address is located 34 bytes to the right of
[   15.250538]  allocated 201-byte region [fff00000c1735600, fff00000c17356c9)
[   15.250864] 
[   15.250924] The buggy address belongs to the physical page:
[   15.251000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734
[   15.251077] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.251921] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.252024] page_type: f5(slab)
[   15.252074] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.252182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.252355] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.252448] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.252498] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff
[   15.252950] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.253028] page dumped because: kasan: bad access detected
[   15.253060] 
[   15.253079] Memory state around the buggy address:
[   15.253121]  fff00000c1735580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253164]  fff00000c1735600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.253205] >fff00000c1735680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.253241]                                                           ^
[   15.253280]  fff00000c1735700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253430]  fff00000c1735780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253664] ==================================================================
[   15.286741] ==================================================================
[   15.286795] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.286846] Write of size 1 at addr fff00000c77560c9 by task kunit_try_catch/162
[   15.287041] 
[   15.287227] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.287460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.287643] Hardware name: linux,dummy-virt (DT)
[   15.287706] Call trace:
[   15.287738]  show_stack+0x20/0x38 (C)
[   15.287859]  dump_stack_lvl+0x8c/0xd0
[   15.287947]  print_report+0x118/0x5d0
[   15.288166]  kasan_report+0xdc/0x128
[   15.288232]  __asan_report_store1_noabort+0x20/0x30
[   15.288555]  krealloc_less_oob_helper+0xa48/0xc50
[   15.288730]  krealloc_large_less_oob+0x20/0x38
[   15.288928]  kunit_try_run_case+0x170/0x3f0
[   15.289125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.289193]  kthread+0x328/0x630
[   15.289309]  ret_from_fork+0x10/0x20
[   15.289683] 
[   15.289736] The buggy address belongs to the physical page:
[   15.289769] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.289825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.290272] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.290345] page_type: f8(unknown)
[   15.290728] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.290825] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.290950] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.290999] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.291318] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.291438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.291545] page dumped because: kasan: bad access detected
[   15.291870] 
[   15.291914] Memory state around the buggy address:
[   15.292013]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.292116]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.292274] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.292505]                                               ^
[   15.292565]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.292679]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.292748] ==================================================================
[   15.217324] ==================================================================
[   15.217646] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.217755] Write of size 1 at addr fff00000c17356d0 by task kunit_try_catch/158
[   15.217863] 
[   15.218160] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.218460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.218749] Hardware name: linux,dummy-virt (DT)
[   15.218883] Call trace:
[   15.218987]  show_stack+0x20/0x38 (C)
[   15.219070]  dump_stack_lvl+0x8c/0xd0
[   15.219153]  print_report+0x118/0x5d0
[   15.219508]  kasan_report+0xdc/0x128
[   15.219677]  __asan_report_store1_noabort+0x20/0x30
[   15.219737]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.219906]  krealloc_less_oob+0x20/0x38
[   15.220013]  kunit_try_run_case+0x170/0x3f0
[   15.220069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.220136]  kthread+0x328/0x630
[   15.220194]  ret_from_fork+0x10/0x20
[   15.220255] 
[   15.220275] Allocated by task 158:
[   15.220304]  kasan_save_stack+0x3c/0x68
[   15.220365]  kasan_save_track+0x20/0x40
[   15.220687]  kasan_save_alloc_info+0x40/0x58
[   15.220873]  __kasan_krealloc+0x118/0x178
[   15.220953]  krealloc_noprof+0x128/0x360
[   15.221325]  krealloc_less_oob_helper+0x168/0xc50
[   15.221473]  krealloc_less_oob+0x20/0x38
[   15.221831]  kunit_try_run_case+0x170/0x3f0
[   15.221882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.222203]  kthread+0x328/0x630
[   15.222362]  ret_from_fork+0x10/0x20
[   15.222432] 
[   15.222459] The buggy address belongs to the object at fff00000c1735600
[   15.222459]  which belongs to the cache kmalloc-256 of size 256
[   15.222911] The buggy address is located 7 bytes to the right of
[   15.222911]  allocated 201-byte region [fff00000c1735600, fff00000c17356c9)
[   15.223119] 
[   15.223398] The buggy address belongs to the physical page:
[   15.223758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734
[   15.223883] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.224019] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.224107] page_type: f5(slab)
[   15.224463] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.224646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.224772] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.224822] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.225278] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff
[   15.225418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.225481] page dumped because: kasan: bad access detected
[   15.225513] 
[   15.225547] Memory state around the buggy address:
[   15.225702]  fff00000c1735580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.225899]  fff00000c1735600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.225969] >fff00000c1735680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.226077]                                                  ^
[   15.226163]  fff00000c1735700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.226205]  fff00000c1735780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.226678] ==================================================================
[   15.204816] ==================================================================
[   15.205274] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.205501] Write of size 1 at addr fff00000c17356c9 by task kunit_try_catch/158
[   15.205630] 
[   15.205786] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.205928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.205955] Hardware name: linux,dummy-virt (DT)
[   15.206005] Call trace:
[   15.206035]  show_stack+0x20/0x38 (C)
[   15.206236]  dump_stack_lvl+0x8c/0xd0
[   15.206432]  print_report+0x118/0x5d0
[   15.206623]  kasan_report+0xdc/0x128
[   15.206793]  __asan_report_store1_noabort+0x20/0x30
[   15.206869]  krealloc_less_oob_helper+0xa48/0xc50
[   15.206925]  krealloc_less_oob+0x20/0x38
[   15.207020]  kunit_try_run_case+0x170/0x3f0
[   15.207072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.207133]  kthread+0x328/0x630
[   15.207175]  ret_from_fork+0x10/0x20
[   15.207229] 
[   15.207249] Allocated by task 158:
[   15.207283]  kasan_save_stack+0x3c/0x68
[   15.207339]  kasan_save_track+0x20/0x40
[   15.207625]  kasan_save_alloc_info+0x40/0x58
[   15.208019]  __kasan_krealloc+0x118/0x178
[   15.208089]  krealloc_noprof+0x128/0x360
[   15.208266]  krealloc_less_oob_helper+0x168/0xc50
[   15.208647]  krealloc_less_oob+0x20/0x38
[   15.208808]  kunit_try_run_case+0x170/0x3f0
[   15.208934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.209110]  kthread+0x328/0x630
[   15.209145]  ret_from_fork+0x10/0x20
[   15.209309] 
[   15.209384] The buggy address belongs to the object at fff00000c1735600
[   15.209384]  which belongs to the cache kmalloc-256 of size 256
[   15.209629] The buggy address is located 0 bytes to the right of
[   15.209629]  allocated 201-byte region [fff00000c1735600, fff00000c17356c9)
[   15.210063] 
[   15.210090] The buggy address belongs to the physical page:
[   15.210338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734
[   15.210494] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.210666] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.210818] page_type: f5(slab)
[   15.210906] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.210981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.211286] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.211441] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.211566] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff
[   15.211747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.211846] page dumped because: kasan: bad access detected
[   15.212035] 
[   15.212114] Memory state around the buggy address:
[   15.212214]  fff00000c1735580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.212371]  fff00000c1735600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.212549] >fff00000c1735680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.212656]                                               ^
[   15.212775]  fff00000c1735700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.212983]  fff00000c1735780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.213176] ==================================================================
[   15.296813] ==================================================================
[   15.296848] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.296893] Write of size 1 at addr fff00000c77560da by task kunit_try_catch/162
[   15.296948] 
[   15.296975] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.297052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.297078] Hardware name: linux,dummy-virt (DT)
[   15.297108] Call trace:
[   15.297141]  show_stack+0x20/0x38 (C)
[   15.297197]  dump_stack_lvl+0x8c/0xd0
[   15.297248]  print_report+0x118/0x5d0
[   15.297294]  kasan_report+0xdc/0x128
[   15.297639]  __asan_report_store1_noabort+0x20/0x30
[   15.297932]  krealloc_less_oob_helper+0xa80/0xc50
[   15.297994]  krealloc_large_less_oob+0x20/0x38
[   15.298471]  kunit_try_run_case+0x170/0x3f0
[   15.298954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.299296]  kthread+0x328/0x630
[   15.299555]  ret_from_fork+0x10/0x20
[   15.299763] 
[   15.299896] The buggy address belongs to the physical page:
[   15.300070] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.300468] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.300524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.300700] page_type: f8(unknown)
[   15.300964] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.301027] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.301150] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.301238] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.301324] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.301661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.301784] page dumped because: kasan: bad access detected
[   15.301859] 
[   15.301901] Memory state around the buggy address:
[   15.302036]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.302102]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.302166] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.302324]                                                     ^
[   15.302574]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.302659]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.302791] ==================================================================
[   15.293669] ==================================================================
[   15.293716] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.293763] Write of size 1 at addr fff00000c77560d0 by task kunit_try_catch/162
[   15.293811] 
[   15.293841] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.293919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.293944] Hardware name: linux,dummy-virt (DT)
[   15.293974] Call trace:
[   15.293995]  show_stack+0x20/0x38 (C)
[   15.294041]  dump_stack_lvl+0x8c/0xd0
[   15.294086]  print_report+0x118/0x5d0
[   15.294131]  kasan_report+0xdc/0x128
[   15.294175]  __asan_report_store1_noabort+0x20/0x30
[   15.294225]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.294272]  krealloc_large_less_oob+0x20/0x38
[   15.294318]  kunit_try_run_case+0x170/0x3f0
[   15.294383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.294765]  kthread+0x328/0x630
[   15.294864]  ret_from_fork+0x10/0x20
[   15.295310] 
[   15.295369] The buggy address belongs to the physical page:
[   15.295584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.295665] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.295713] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.295893] page_type: f8(unknown)
[   15.295942] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.296094] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.296156] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.296261] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.296318] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.296380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.296419] page dumped because: kasan: bad access detected
[   15.296450] 
[   15.296468] Memory state around the buggy address:
[   15.296498]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.296540]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.296581] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.296617]                                                  ^
[   15.296673]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.296717]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.296755] ==================================================================
[   15.310848] ==================================================================
[   15.310896] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.310943] Write of size 1 at addr fff00000c77560eb by task kunit_try_catch/162
[   15.310992] 
[   15.311033] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.311122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.311149] Hardware name: linux,dummy-virt (DT)
[   15.311184] Call trace:
[   15.311207]  show_stack+0x20/0x38 (C)
[   15.311255]  dump_stack_lvl+0x8c/0xd0
[   15.311300]  print_report+0x118/0x5d0
[   15.311364]  kasan_report+0xdc/0x128
[   15.311410]  __asan_report_store1_noabort+0x20/0x30
[   15.311461]  krealloc_less_oob_helper+0xa58/0xc50
[   15.311519]  krealloc_large_less_oob+0x20/0x38
[   15.311567]  kunit_try_run_case+0x170/0x3f0
[   15.311619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.311680]  kthread+0x328/0x630
[   15.311722]  ret_from_fork+0x10/0x20
[   15.311769] 
[   15.311788] The buggy address belongs to the physical page:
[   15.311827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.311886] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.311940] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.311988] page_type: f8(unknown)
[   15.312026] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.312076] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.312124] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.312171] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.312219] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.312272] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.312319] page dumped because: kasan: bad access detected
[   15.312731] 
[   15.312760] Memory state around the buggy address:
[   15.312794]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.312993]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.313045] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.313082]                                                           ^
[   15.313365]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.313465]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.313507] ==================================================================
[   15.304170] ==================================================================
[   15.304599] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.304708] Write of size 1 at addr fff00000c77560ea by task kunit_try_catch/162
[   15.304762] 
[   15.304796] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.305038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.305237] Hardware name: linux,dummy-virt (DT)
[   15.305280] Call trace:
[   15.305382]  show_stack+0x20/0x38 (C)
[   15.305468]  dump_stack_lvl+0x8c/0xd0
[   15.305579]  print_report+0x118/0x5d0
[   15.305725]  kasan_report+0xdc/0x128
[   15.305869]  __asan_report_store1_noabort+0x20/0x30
[   15.306027]  krealloc_less_oob_helper+0xae4/0xc50
[   15.306241]  krealloc_large_less_oob+0x20/0x38
[   15.306403]  kunit_try_run_case+0x170/0x3f0
[   15.306511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.306637]  kthread+0x328/0x630
[   15.306733]  ret_from_fork+0x10/0x20
[   15.306914] 
[   15.306935] The buggy address belongs to the physical page:
[   15.306985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.307228] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.307514] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.307628] page_type: f8(unknown)
[   15.307794] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.307847] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.307930] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.308118] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.308619] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.308736] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.308856] page dumped because: kasan: bad access detected
[   15.309035] 
[   15.309146] Memory state around the buggy address:
[   15.309362]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.309638]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.309770] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.309847]                                                           ^
[   15.309934]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.310038]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.310127] ==================================================================
[   15.235595] ==================================================================
[   15.235704] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.235758] Write of size 1 at addr fff00000c17356ea by task kunit_try_catch/158
[   15.235806] 
[   15.236136] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.236426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.236567] Hardware name: linux,dummy-virt (DT)
[   15.236665] Call trace:
[   15.236693]  show_stack+0x20/0x38 (C)
[   15.236748]  dump_stack_lvl+0x8c/0xd0
[   15.236963]  print_report+0x118/0x5d0
[   15.237142]  kasan_report+0xdc/0x128
[   15.237258]  __asan_report_store1_noabort+0x20/0x30
[   15.237401]  krealloc_less_oob_helper+0xae4/0xc50
[   15.237566]  krealloc_less_oob+0x20/0x38
[   15.237687]  kunit_try_run_case+0x170/0x3f0
[   15.237737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.238118]  kthread+0x328/0x630
[   15.238240]  ret_from_fork+0x10/0x20
[   15.238379] 
[   15.238440] Allocated by task 158:
[   15.238518]  kasan_save_stack+0x3c/0x68
[   15.238873]  kasan_save_track+0x20/0x40
[   15.238948]  kasan_save_alloc_info+0x40/0x58
[   15.239011]  __kasan_krealloc+0x118/0x178
[   15.239189]  krealloc_noprof+0x128/0x360
[   15.239418]  krealloc_less_oob_helper+0x168/0xc50
[   15.239523]  krealloc_less_oob+0x20/0x38
[   15.239662]  kunit_try_run_case+0x170/0x3f0
[   15.239779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.239897]  kthread+0x328/0x630
[   15.240009]  ret_from_fork+0x10/0x20
[   15.240064] 
[   15.240084] The buggy address belongs to the object at fff00000c1735600
[   15.240084]  which belongs to the cache kmalloc-256 of size 256
[   15.240481] The buggy address is located 33 bytes to the right of
[   15.240481]  allocated 201-byte region [fff00000c1735600, fff00000c17356c9)
[   15.240637] 
[   15.240717] The buggy address belongs to the physical page:
[   15.240841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734
[   15.240944] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.241038] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.241379] page_type: f5(slab)
[   15.241471] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.241598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.241715] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.242165] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.242247] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff
[   15.242481] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.242574] page dumped because: kasan: bad access detected
[   15.242763] 
[   15.242807] Memory state around the buggy address:
[   15.243180]  fff00000c1735580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.243396]  fff00000c1735600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.243468] >fff00000c1735680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.243640]                                                           ^
[   15.243717]  fff00000c1735700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.243825]  fff00000c1735780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.244108] ==================================================================

[   12.033902] ==================================================================
[   12.034392] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.035138] Write of size 1 at addr ffff888102a3a0da by task kunit_try_catch/181
[   12.036233] 
[   12.036523] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.036569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.036580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.036812] Call Trace:
[   12.036832]  <TASK>
[   12.036848]  dump_stack_lvl+0x73/0xb0
[   12.036916]  print_report+0xd1/0x610
[   12.036944]  ? __virt_addr_valid+0x1db/0x2d0
[   12.036965]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.036999]  ? kasan_addr_to_slab+0x11/0xa0
[   12.037019]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.037043]  kasan_report+0x141/0x180
[   12.037212]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.037242]  __asan_report_store1_noabort+0x1b/0x30
[   12.037266]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.037318]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.037341]  ? finish_task_switch.isra.0+0x153/0x700
[   12.037364]  ? __switch_to+0x47/0xf50
[   12.037387]  ? __schedule+0x10cc/0x2b60
[   12.037408]  ? __pfx_read_tsc+0x10/0x10
[   12.037430]  krealloc_large_less_oob+0x1c/0x30
[   12.037453]  kunit_try_run_case+0x1a5/0x480
[   12.037476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.037497]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.037519]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.037542]  ? __kthread_parkme+0x82/0x180
[   12.037560]  ? preempt_count_sub+0x50/0x80
[   12.037582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.037605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.037628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.037654]  kthread+0x337/0x6f0
[   12.037672]  ? trace_preempt_on+0x20/0xc0
[   12.037694]  ? __pfx_kthread+0x10/0x10
[   12.037713]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.037733]  ? calculate_sigpending+0x7b/0xa0
[   12.037756]  ? __pfx_kthread+0x10/0x10
[   12.037776]  ret_from_fork+0x116/0x1d0
[   12.037793]  ? __pfx_kthread+0x10/0x10
[   12.037812]  ret_from_fork_asm+0x1a/0x30
[   12.037842]  </TASK>
[   12.037851] 
[   12.053423] The buggy address belongs to the physical page:
[   12.053994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   12.054659] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.055384] flags: 0x200000000000040(head|node=0|zone=2)
[   12.055921] page_type: f8(unknown)
[   12.056203] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.056632] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.056866] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.057230] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.058164] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   12.058970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.059565] page dumped because: kasan: bad access detected
[   12.059742] 
[   12.059812] Memory state around the buggy address:
[   12.059967]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.060541]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.061474] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.062119]                                                     ^
[   12.062762]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.063490]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.063778] ==================================================================
[   12.064119] ==================================================================
[   12.064412] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.064704] Write of size 1 at addr ffff888102a3a0ea by task kunit_try_catch/181
[   12.064985] 
[   12.065077] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.065116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.065127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.065145] Call Trace:
[   12.065159]  <TASK>
[   12.065172]  dump_stack_lvl+0x73/0xb0
[   12.065197]  print_report+0xd1/0x610
[   12.065217]  ? __virt_addr_valid+0x1db/0x2d0
[   12.065238]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.065260]  ? kasan_addr_to_slab+0x11/0xa0
[   12.065303]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.065326]  kasan_report+0x141/0x180
[   12.065346]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.065373]  __asan_report_store1_noabort+0x1b/0x30
[   12.065396]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.065420]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.065442]  ? finish_task_switch.isra.0+0x153/0x700
[   12.065463]  ? __switch_to+0x47/0xf50
[   12.065512]  ? __schedule+0x10cc/0x2b60
[   12.065548]  ? __pfx_read_tsc+0x10/0x10
[   12.065571]  krealloc_large_less_oob+0x1c/0x30
[   12.065605]  kunit_try_run_case+0x1a5/0x480
[   12.065628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.065650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.065672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.065695]  ? __kthread_parkme+0x82/0x180
[   12.065717]  ? preempt_count_sub+0x50/0x80
[   12.065738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.065760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.065781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.066034]  kthread+0x337/0x6f0
[   12.066054]  ? trace_preempt_on+0x20/0xc0
[   12.066076]  ? __pfx_kthread+0x10/0x10
[   12.066096]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.066117]  ? calculate_sigpending+0x7b/0xa0
[   12.066139]  ? __pfx_kthread+0x10/0x10
[   12.066160]  ret_from_fork+0x116/0x1d0
[   12.066177]  ? __pfx_kthread+0x10/0x10
[   12.066197]  ret_from_fork_asm+0x1a/0x30
[   12.066226]  </TASK>
[   12.066236] 
[   12.082400] The buggy address belongs to the physical page:
[   12.082702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   12.083049] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.083383] flags: 0x200000000000040(head|node=0|zone=2)
[   12.083917] page_type: f8(unknown)
[   12.084067] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.084762] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.085252] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.085719] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.086284] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   12.086824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.087355] page dumped because: kasan: bad access detected
[   12.087679] 
[   12.087770] Memory state around the buggy address:
[   12.087958]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.088537]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.088914] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.089320]                                                           ^
[   12.089600]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.090013]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.090438] ==================================================================
[   11.811068] ==================================================================
[   11.811710] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.812254] Write of size 1 at addr ffff888100aae6d0 by task kunit_try_catch/177
[   11.812521] 
[   11.812671] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.812713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.812723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.812835] Call Trace:
[   11.812857]  <TASK>
[   11.812870]  dump_stack_lvl+0x73/0xb0
[   11.812898]  print_report+0xd1/0x610
[   11.812931]  ? __virt_addr_valid+0x1db/0x2d0
[   11.812953]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.812976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.812997]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.813134]  kasan_report+0x141/0x180
[   11.813157]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.813185]  __asan_report_store1_noabort+0x1b/0x30
[   11.813281]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.813308]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.813332]  ? finish_task_switch.isra.0+0x153/0x700
[   11.813355]  ? __switch_to+0x47/0xf50
[   11.813379]  ? __schedule+0x10cc/0x2b60
[   11.813400]  ? __pfx_read_tsc+0x10/0x10
[   11.813422]  krealloc_less_oob+0x1c/0x30
[   11.813443]  kunit_try_run_case+0x1a5/0x480
[   11.813532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.813554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.813577]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.813599]  ? __kthread_parkme+0x82/0x180
[   11.813619]  ? preempt_count_sub+0x50/0x80
[   11.813641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.813663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.813686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.813709]  kthread+0x337/0x6f0
[   11.813727]  ? trace_preempt_on+0x20/0xc0
[   11.813748]  ? __pfx_kthread+0x10/0x10
[   11.813767]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.813788]  ? calculate_sigpending+0x7b/0xa0
[   11.813810]  ? __pfx_kthread+0x10/0x10
[   11.813830]  ret_from_fork+0x116/0x1d0
[   11.813847]  ? __pfx_kthread+0x10/0x10
[   11.813866]  ret_from_fork_asm+0x1a/0x30
[   11.813896]  </TASK>
[   11.813905] 
[   11.824713] Allocated by task 177:
[   11.825055]  kasan_save_stack+0x45/0x70
[   11.825241]  kasan_save_track+0x18/0x40
[   11.825537]  kasan_save_alloc_info+0x3b/0x50
[   11.825924]  __kasan_krealloc+0x190/0x1f0
[   11.826311]  krealloc_noprof+0xf3/0x340
[   11.826543]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.826908]  krealloc_less_oob+0x1c/0x30
[   11.827217]  kunit_try_run_case+0x1a5/0x480
[   11.827406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.827680]  kthread+0x337/0x6f0
[   11.827799]  ret_from_fork+0x116/0x1d0
[   11.827994]  ret_from_fork_asm+0x1a/0x30
[   11.828264] 
[   11.828370] The buggy address belongs to the object at ffff888100aae600
[   11.828370]  which belongs to the cache kmalloc-256 of size 256
[   11.829190] The buggy address is located 7 bytes to the right of
[   11.829190]  allocated 201-byte region [ffff888100aae600, ffff888100aae6c9)
[   11.829935] 
[   11.830011] The buggy address belongs to the physical page:
[   11.830332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   11.830842] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.831140] flags: 0x200000000000040(head|node=0|zone=2)
[   11.831525] page_type: f5(slab)
[   11.831673] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.832164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.832457] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.832785] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.833297] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   11.833732] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.834126] page dumped because: kasan: bad access detected
[   11.834412] 
[   11.834573] Memory state around the buggy address:
[   11.834761]  ffff888100aae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.835242]  ffff888100aae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.835532] >ffff888100aae680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.835940]                                                  ^
[   11.836421]  ffff888100aae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.836734]  ffff888100aae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.837034] ==================================================================
[   12.090817] ==================================================================
[   12.091131] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.091456] Write of size 1 at addr ffff888102a3a0eb by task kunit_try_catch/181
[   12.091724] 
[   12.091935] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.091977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.091988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.092007] Call Trace:
[   12.092022]  <TASK>
[   12.092037]  dump_stack_lvl+0x73/0xb0
[   12.092063]  print_report+0xd1/0x610
[   12.092085]  ? __virt_addr_valid+0x1db/0x2d0
[   12.092106]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.092170]  ? kasan_addr_to_slab+0x11/0xa0
[   12.092190]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.092213]  kasan_report+0x141/0x180
[   12.092234]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.092262]  __asan_report_store1_noabort+0x1b/0x30
[   12.092297]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.092322]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.092346]  ? finish_task_switch.isra.0+0x153/0x700
[   12.092367]  ? __switch_to+0x47/0xf50
[   12.092391]  ? __schedule+0x10cc/0x2b60
[   12.092412]  ? __pfx_read_tsc+0x10/0x10
[   12.092435]  krealloc_large_less_oob+0x1c/0x30
[   12.092457]  kunit_try_run_case+0x1a5/0x480
[   12.092480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.092502]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.092525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.092548]  ? __kthread_parkme+0x82/0x180
[   12.092567]  ? preempt_count_sub+0x50/0x80
[   12.092589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.092611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.092634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.092657]  kthread+0x337/0x6f0
[   12.092675]  ? trace_preempt_on+0x20/0xc0
[   12.092697]  ? __pfx_kthread+0x10/0x10
[   12.092716]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.092736]  ? calculate_sigpending+0x7b/0xa0
[   12.092759]  ? __pfx_kthread+0x10/0x10
[   12.092779]  ret_from_fork+0x116/0x1d0
[   12.092799]  ? __pfx_kthread+0x10/0x10
[   12.092818]  ret_from_fork_asm+0x1a/0x30
[   12.092847]  </TASK>
[   12.092856] 
[   12.100909] The buggy address belongs to the physical page:
[   12.101288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   12.101674] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.101939] flags: 0x200000000000040(head|node=0|zone=2)
[   12.102116] page_type: f8(unknown)
[   12.102583] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.103242] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.103716] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.104057] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.104379] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   12.104698] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.105055] page dumped because: kasan: bad access detected
[   12.105288] 
[   12.105381] Memory state around the buggy address:
[   12.105646]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.105892]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.106108] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.106332]                                                           ^
[   12.106585]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.106923]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.107233] ==================================================================
[   12.004794] ==================================================================
[   12.005321] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.006443] Write of size 1 at addr ffff888102a3a0d0 by task kunit_try_catch/181
[   12.006867] 
[   12.006955] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.006997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.007009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.007028] Call Trace:
[   12.007039]  <TASK>
[   12.007053]  dump_stack_lvl+0x73/0xb0
[   12.007080]  print_report+0xd1/0x610
[   12.007102]  ? __virt_addr_valid+0x1db/0x2d0
[   12.007123]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.007146]  ? kasan_addr_to_slab+0x11/0xa0
[   12.007165]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.007189]  kasan_report+0x141/0x180
[   12.007209]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.007237]  __asan_report_store1_noabort+0x1b/0x30
[   12.007261]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.007405]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.007433]  ? finish_task_switch.isra.0+0x153/0x700
[   12.007467]  ? __switch_to+0x47/0xf50
[   12.007492]  ? __schedule+0x10cc/0x2b60
[   12.007513]  ? __pfx_read_tsc+0x10/0x10
[   12.007536]  krealloc_large_less_oob+0x1c/0x30
[   12.007559]  kunit_try_run_case+0x1a5/0x480
[   12.007583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.007604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.007627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.007649]  ? __kthread_parkme+0x82/0x180
[   12.007669]  ? preempt_count_sub+0x50/0x80
[   12.007692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.007715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.007738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.007761]  kthread+0x337/0x6f0
[   12.007779]  ? trace_preempt_on+0x20/0xc0
[   12.007800]  ? __pfx_kthread+0x10/0x10
[   12.007819]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.007840]  ? calculate_sigpending+0x7b/0xa0
[   12.007863]  ? __pfx_kthread+0x10/0x10
[   12.007883]  ret_from_fork+0x116/0x1d0
[   12.007901]  ? __pfx_kthread+0x10/0x10
[   12.007920]  ret_from_fork_asm+0x1a/0x30
[   12.007950]  </TASK>
[   12.007959] 
[   12.022583] The buggy address belongs to the physical page:
[   12.023215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   12.023705] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.023938] flags: 0x200000000000040(head|node=0|zone=2)
[   12.024437] page_type: f8(unknown)
[   12.024770] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.025634] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.026390] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.026837] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.027637] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   12.028239] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.028712] page dumped because: kasan: bad access detected
[   12.028887] 
[   12.028963] Memory state around the buggy address:
[   12.029502]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.030219]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.030914] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.031432]                                                  ^
[   12.031836]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.032605]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.033068] ==================================================================
[   11.969926] ==================================================================
[   11.970441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.970700] Write of size 1 at addr ffff888102a3a0c9 by task kunit_try_catch/181
[   11.970927] 
[   11.971014] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.971056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.971067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.971088] Call Trace:
[   11.971099]  <TASK>
[   11.971114]  dump_stack_lvl+0x73/0xb0
[   11.971142]  print_report+0xd1/0x610
[   11.971163]  ? __virt_addr_valid+0x1db/0x2d0
[   11.971186]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.971209]  ? kasan_addr_to_slab+0x11/0xa0
[   11.971229]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.971252]  kasan_report+0x141/0x180
[   11.971283]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.971311]  __asan_report_store1_noabort+0x1b/0x30
[   11.971335]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.971360]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.971383]  ? finish_task_switch.isra.0+0x153/0x700
[   11.971406]  ? __switch_to+0x47/0xf50
[   11.971431]  ? __schedule+0x10cc/0x2b60
[   11.971452]  ? __pfx_read_tsc+0x10/0x10
[   11.971475]  krealloc_large_less_oob+0x1c/0x30
[   11.971497]  kunit_try_run_case+0x1a5/0x480
[   11.971522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.971543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.971566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.971588]  ? __kthread_parkme+0x82/0x180
[   11.971608]  ? preempt_count_sub+0x50/0x80
[   11.971630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.971652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.971675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.971698]  kthread+0x337/0x6f0
[   11.971716]  ? trace_preempt_on+0x20/0xc0
[   11.971740]  ? __pfx_kthread+0x10/0x10
[   11.971760]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.971781]  ? calculate_sigpending+0x7b/0xa0
[   11.971804]  ? __pfx_kthread+0x10/0x10
[   11.971824]  ret_from_fork+0x116/0x1d0
[   11.971842]  ? __pfx_kthread+0x10/0x10
[   11.971861]  ret_from_fork_asm+0x1a/0x30
[   11.971891]  </TASK>
[   11.971900] 
[   11.992530] The buggy address belongs to the physical page:
[   11.992728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   11.992983] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.993987] flags: 0x200000000000040(head|node=0|zone=2)
[   11.994793] page_type: f8(unknown)
[   11.995313] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.995951] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.996779] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.997526] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.997772] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   11.998018] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.999109] page dumped because: kasan: bad access detected
[   11.999794] 
[   12.000088] Memory state around the buggy address:
[   12.000623]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.001006]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.001596] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.001816]                                               ^
[   12.001992]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.002899]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.003755] ==================================================================
[   11.780822] ==================================================================
[   11.781329] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.782449] Write of size 1 at addr ffff888100aae6c9 by task kunit_try_catch/177
[   11.782831] 
[   11.783302] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.783418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.783444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.783465] Call Trace:
[   11.783477]  <TASK>
[   11.783492]  dump_stack_lvl+0x73/0xb0
[   11.783521]  print_report+0xd1/0x610
[   11.783543]  ? __virt_addr_valid+0x1db/0x2d0
[   11.783565]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.783588]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.783610]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.783633]  kasan_report+0x141/0x180
[   11.783654]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.783681]  __asan_report_store1_noabort+0x1b/0x30
[   11.783706]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.783732]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.783755]  ? finish_task_switch.isra.0+0x153/0x700
[   11.783777]  ? __switch_to+0x47/0xf50
[   11.783802]  ? __schedule+0x10cc/0x2b60
[   11.783823]  ? __pfx_read_tsc+0x10/0x10
[   11.783846]  krealloc_less_oob+0x1c/0x30
[   11.783866]  kunit_try_run_case+0x1a5/0x480
[   11.783890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.783911]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.783934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.783956]  ? __kthread_parkme+0x82/0x180
[   11.783975]  ? preempt_count_sub+0x50/0x80
[   11.783997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.784035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.784058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.784083]  kthread+0x337/0x6f0
[   11.784101]  ? trace_preempt_on+0x20/0xc0
[   11.784123]  ? __pfx_kthread+0x10/0x10
[   11.784142]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.784162]  ? calculate_sigpending+0x7b/0xa0
[   11.784185]  ? __pfx_kthread+0x10/0x10
[   11.784205]  ret_from_fork+0x116/0x1d0
[   11.784223]  ? __pfx_kthread+0x10/0x10
[   11.784242]  ret_from_fork_asm+0x1a/0x30
[   11.784281]  </TASK>
[   11.784291] 
[   11.796555] Allocated by task 177:
[   11.796958]  kasan_save_stack+0x45/0x70
[   11.797314]  kasan_save_track+0x18/0x40
[   11.797563]  kasan_save_alloc_info+0x3b/0x50
[   11.797904]  __kasan_krealloc+0x190/0x1f0
[   11.798232]  krealloc_noprof+0xf3/0x340
[   11.798425]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.798811]  krealloc_less_oob+0x1c/0x30
[   11.799139]  kunit_try_run_case+0x1a5/0x480
[   11.799336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.799753]  kthread+0x337/0x6f0
[   11.799907]  ret_from_fork+0x116/0x1d0
[   11.800259]  ret_from_fork_asm+0x1a/0x30
[   11.800444] 
[   11.800608] The buggy address belongs to the object at ffff888100aae600
[   11.800608]  which belongs to the cache kmalloc-256 of size 256
[   11.801877] The buggy address is located 0 bytes to the right of
[   11.801877]  allocated 201-byte region [ffff888100aae600, ffff888100aae6c9)
[   11.802952] 
[   11.803029] The buggy address belongs to the physical page:
[   11.803200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   11.803464] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.803880] flags: 0x200000000000040(head|node=0|zone=2)
[   11.804431] page_type: f5(slab)
[   11.804576] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.804908] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.805245] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.805782] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.806302] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   11.806666] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.807162] page dumped because: kasan: bad access detected
[   11.807570] 
[   11.807669] Memory state around the buggy address:
[   11.807866]  ffff888100aae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.808413]  ffff888100aae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.808734] >ffff888100aae680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.809287]                                               ^
[   11.809525]  ffff888100aae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.809845]  ffff888100aae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.810310] ==================================================================
[   11.891783] ==================================================================
[   11.892080] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.892334] Write of size 1 at addr ffff888100aae6eb by task kunit_try_catch/177
[   11.892736] 
[   11.893083] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.893126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.893137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.893155] Call Trace:
[   11.893169]  <TASK>
[   11.893182]  dump_stack_lvl+0x73/0xb0
[   11.893208]  print_report+0xd1/0x610
[   11.893228]  ? __virt_addr_valid+0x1db/0x2d0
[   11.893261]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.893294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.893316]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.893339]  kasan_report+0x141/0x180
[   11.893360]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.893426]  __asan_report_store1_noabort+0x1b/0x30
[   11.893481]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.893506]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.893530]  ? finish_task_switch.isra.0+0x153/0x700
[   11.893551]  ? __switch_to+0x47/0xf50
[   11.893575]  ? __schedule+0x10cc/0x2b60
[   11.893595]  ? __pfx_read_tsc+0x10/0x10
[   11.893618]  krealloc_less_oob+0x1c/0x30
[   11.893639]  kunit_try_run_case+0x1a5/0x480
[   11.893661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.893682]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.893704]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.893726]  ? __kthread_parkme+0x82/0x180
[   11.893746]  ? preempt_count_sub+0x50/0x80
[   11.893767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.893790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.893813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.893835]  kthread+0x337/0x6f0
[   11.893853]  ? trace_preempt_on+0x20/0xc0
[   11.893874]  ? __pfx_kthread+0x10/0x10
[   11.893893]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.893914]  ? calculate_sigpending+0x7b/0xa0
[   11.893936]  ? __pfx_kthread+0x10/0x10
[   11.893956]  ret_from_fork+0x116/0x1d0
[   11.893974]  ? __pfx_kthread+0x10/0x10
[   11.893993]  ret_from_fork_asm+0x1a/0x30
[   11.894059]  </TASK>
[   11.894069] 
[   11.906793] Allocated by task 177:
[   11.906932]  kasan_save_stack+0x45/0x70
[   11.907077]  kasan_save_track+0x18/0x40
[   11.907211]  kasan_save_alloc_info+0x3b/0x50
[   11.907913]  __kasan_krealloc+0x190/0x1f0
[   11.908264]  krealloc_noprof+0xf3/0x340
[   11.908851]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.909416]  krealloc_less_oob+0x1c/0x30
[   11.909834]  kunit_try_run_case+0x1a5/0x480
[   11.910330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.910896]  kthread+0x337/0x6f0
[   11.911332]  ret_from_fork+0x116/0x1d0
[   11.911737]  ret_from_fork_asm+0x1a/0x30
[   11.912128] 
[   11.912392] The buggy address belongs to the object at ffff888100aae600
[   11.912392]  which belongs to the cache kmalloc-256 of size 256
[   11.913689] The buggy address is located 34 bytes to the right of
[   11.913689]  allocated 201-byte region [ffff888100aae600, ffff888100aae6c9)
[   11.914984] 
[   11.915066] The buggy address belongs to the physical page:
[   11.915241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   11.915494] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.915721] flags: 0x200000000000040(head|node=0|zone=2)
[   11.915894] page_type: f5(slab)
[   11.916012] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.916242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.916483] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.916715] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.916958] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   11.917190] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.917675] page dumped because: kasan: bad access detected
[   11.918285] 
[   11.918388] Memory state around the buggy address:
[   11.918635]  ffff888100aae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.918870]  ffff888100aae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.919085] >ffff888100aae680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.919406]                                                           ^
[   11.919723]  ffff888100aae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.920371]  ffff888100aae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.920696] ==================================================================
[   11.864369] ==================================================================
[   11.864782] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.865241] Write of size 1 at addr ffff888100aae6ea by task kunit_try_catch/177
[   11.865797] 
[   11.865907] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.865948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.865959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.865978] Call Trace:
[   11.865993]  <TASK>
[   11.866007]  dump_stack_lvl+0x73/0xb0
[   11.866033]  print_report+0xd1/0x610
[   11.866205]  ? __virt_addr_valid+0x1db/0x2d0
[   11.866229]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.866252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.866287]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.866310]  kasan_report+0x141/0x180
[   11.866331]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.866359]  __asan_report_store1_noabort+0x1b/0x30
[   11.866383]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.866408]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.866431]  ? finish_task_switch.isra.0+0x153/0x700
[   11.866467]  ? __switch_to+0x47/0xf50
[   11.866491]  ? __schedule+0x10cc/0x2b60
[   11.866512]  ? __pfx_read_tsc+0x10/0x10
[   11.866534]  krealloc_less_oob+0x1c/0x30
[   11.866555]  kunit_try_run_case+0x1a5/0x480
[   11.866577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.866599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.866621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.866643]  ? __kthread_parkme+0x82/0x180
[   11.866661]  ? preempt_count_sub+0x50/0x80
[   11.866683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.866706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.866729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.866753]  kthread+0x337/0x6f0
[   11.866771]  ? trace_preempt_on+0x20/0xc0
[   11.866792]  ? __pfx_kthread+0x10/0x10
[   11.866811]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.866831]  ? calculate_sigpending+0x7b/0xa0
[   11.866854]  ? __pfx_kthread+0x10/0x10
[   11.866874]  ret_from_fork+0x116/0x1d0
[   11.866891]  ? __pfx_kthread+0x10/0x10
[   11.866910]  ret_from_fork_asm+0x1a/0x30
[   11.866939]  </TASK>
[   11.866948] 
[   11.877385] Allocated by task 177:
[   11.877689]  kasan_save_stack+0x45/0x70
[   11.877989]  kasan_save_track+0x18/0x40
[   11.878328]  kasan_save_alloc_info+0x3b/0x50
[   11.878681]  __kasan_krealloc+0x190/0x1f0
[   11.878861]  krealloc_noprof+0xf3/0x340
[   11.879338]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.879607]  krealloc_less_oob+0x1c/0x30
[   11.879787]  kunit_try_run_case+0x1a5/0x480
[   11.879974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.880461]  kthread+0x337/0x6f0
[   11.880673]  ret_from_fork+0x116/0x1d0
[   11.880990]  ret_from_fork_asm+0x1a/0x30
[   11.881334] 
[   11.881413] The buggy address belongs to the object at ffff888100aae600
[   11.881413]  which belongs to the cache kmalloc-256 of size 256
[   11.881910] The buggy address is located 33 bytes to the right of
[   11.881910]  allocated 201-byte region [ffff888100aae600, ffff888100aae6c9)
[   11.882818] 
[   11.882923] The buggy address belongs to the physical page:
[   11.883451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   11.883781] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.884300] flags: 0x200000000000040(head|node=0|zone=2)
[   11.884533] page_type: f5(slab)
[   11.884843] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.885366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.885836] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.886329] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.886770] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   11.887366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.887835] page dumped because: kasan: bad access detected
[   11.888020] 
[   11.888118] Memory state around the buggy address:
[   11.888642]  ffff888100aae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.888904]  ffff888100aae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.889469] >ffff888100aae680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.889762]                                                           ^
[   11.890085]  ffff888100aae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.890361]  ffff888100aae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.890674] ==================================================================
[   11.837922] ==================================================================
[   11.838392] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.838856] Write of size 1 at addr ffff888100aae6da by task kunit_try_catch/177
[   11.839353] 
[   11.839443] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.839484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.839495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.839514] Call Trace:
[   11.839526]  <TASK>
[   11.839540]  dump_stack_lvl+0x73/0xb0
[   11.839569]  print_report+0xd1/0x610
[   11.839662]  ? __virt_addr_valid+0x1db/0x2d0
[   11.839685]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.839708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.839730]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.839753]  kasan_report+0x141/0x180
[   11.839774]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.839802]  __asan_report_store1_noabort+0x1b/0x30
[   11.839825]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.839850]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.839874]  ? finish_task_switch.isra.0+0x153/0x700
[   11.839895]  ? __switch_to+0x47/0xf50
[   11.839919]  ? __schedule+0x10cc/0x2b60
[   11.839941]  ? __pfx_read_tsc+0x10/0x10
[   11.839964]  krealloc_less_oob+0x1c/0x30
[   11.839985]  kunit_try_run_case+0x1a5/0x480
[   11.840007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.840174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.840197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.840221]  ? __kthread_parkme+0x82/0x180
[   11.840240]  ? preempt_count_sub+0x50/0x80
[   11.840262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.840299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.840322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.840346]  kthread+0x337/0x6f0
[   11.840532]  ? trace_preempt_on+0x20/0xc0
[   11.840555]  ? __pfx_kthread+0x10/0x10
[   11.840575]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.840596]  ? calculate_sigpending+0x7b/0xa0
[   11.840619]  ? __pfx_kthread+0x10/0x10
[   11.840639]  ret_from_fork+0x116/0x1d0
[   11.840657]  ? __pfx_kthread+0x10/0x10
[   11.840677]  ret_from_fork_asm+0x1a/0x30
[   11.840705]  </TASK>
[   11.840714] 
[   11.850838] Allocated by task 177:
[   11.851168]  kasan_save_stack+0x45/0x70
[   11.851436]  kasan_save_track+0x18/0x40
[   11.851577]  kasan_save_alloc_info+0x3b/0x50
[   11.851892]  __kasan_krealloc+0x190/0x1f0
[   11.852197]  krealloc_noprof+0xf3/0x340
[   11.852381]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.852800]  krealloc_less_oob+0x1c/0x30
[   11.853124]  kunit_try_run_case+0x1a5/0x480
[   11.853533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.853824]  kthread+0x337/0x6f0
[   11.854068]  ret_from_fork+0x116/0x1d0
[   11.854324]  ret_from_fork_asm+0x1a/0x30
[   11.854684] 
[   11.854787] The buggy address belongs to the object at ffff888100aae600
[   11.854787]  which belongs to the cache kmalloc-256 of size 256
[   11.855402] The buggy address is located 17 bytes to the right of
[   11.855402]  allocated 201-byte region [ffff888100aae600, ffff888100aae6c9)
[   11.856036] 
[   11.856138] The buggy address belongs to the physical page:
[   11.856333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   11.857129] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.857462] flags: 0x200000000000040(head|node=0|zone=2)
[   11.857767] page_type: f5(slab)
[   11.857997] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.858493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.858815] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.859413] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.859938] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   11.860495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.860809] page dumped because: kasan: bad access detected
[   11.861032] 
[   11.861113] Memory state around the buggy address:
[   11.861559]  ffff888100aae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.861933]  ffff888100aae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.862316] >ffff888100aae680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.862676]                                                     ^
[   11.862936]  ffff888100aae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.863350]  ffff888100aae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.863621] ==================================================================