Hay
Date
July 19, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.150049] ==================================================================
[   15.150093] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.150137] Write of size 1 at addr fff00000c60f60eb by task kunit_try_catch/162
[   15.150192] 
[   15.150325] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.150565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.150659] Hardware name: linux,dummy-virt (DT)
[   15.150700] Call trace:
[   15.150721]  show_stack+0x20/0x38 (C)
[   15.150767]  dump_stack_lvl+0x8c/0xd0
[   15.150812]  print_report+0x118/0x5d0
[   15.150863]  kasan_report+0xdc/0x128
[   15.151073]  __asan_report_store1_noabort+0x20/0x30
[   15.151160]  krealloc_less_oob_helper+0xa58/0xc50
[   15.151383]  krealloc_large_less_oob+0x20/0x38
[   15.151605]  kunit_try_run_case+0x170/0x3f0
[   15.151715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.151766]  kthread+0x328/0x630
[   15.151806]  ret_from_fork+0x10/0x20
[   15.151852] 
[   15.151871] The buggy address belongs to the physical page:
[   15.151900] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f4
[   15.152014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.152061] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.152122] page_type: f8(unknown)
[   15.152159] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.152206] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.152298] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.152345] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.152393] head: 0bfffe0000000002 ffffc1ffc3183d01 00000000ffffffff 00000000ffffffff
[   15.152440] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.152518] page dumped because: kasan: bad access detected
[   15.152548] 
[   15.152577] Memory state around the buggy address:
[   15.152681]  fff00000c60f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.152735]  fff00000c60f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.152776] >fff00000c60f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.152822]                                                           ^
[   15.152883]  fff00000c60f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.152980]  fff00000c60f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.153039] ==================================================================
[   15.136359] ==================================================================
[   15.136413] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.136464] Write of size 1 at addr fff00000c60f60c9 by task kunit_try_catch/162
[   15.136632] 
[   15.136668] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.136814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.136853] Hardware name: linux,dummy-virt (DT)
[   15.136882] Call trace:
[   15.136911]  show_stack+0x20/0x38 (C)
[   15.136961]  dump_stack_lvl+0x8c/0xd0
[   15.137006]  print_report+0x118/0x5d0
[   15.137051]  kasan_report+0xdc/0x128
[   15.137095]  __asan_report_store1_noabort+0x20/0x30
[   15.137145]  krealloc_less_oob_helper+0xa48/0xc50
[   15.137192]  krealloc_large_less_oob+0x20/0x38
[   15.137238]  kunit_try_run_case+0x170/0x3f0
[   15.137284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.137336]  kthread+0x328/0x630
[   15.137377]  ret_from_fork+0x10/0x20
[   15.137423] 
[   15.137443] The buggy address belongs to the physical page:
[   15.137482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f4
[   15.137535] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.137581] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.137637] page_type: f8(unknown)
[   15.137979] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.138222] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.138273] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.138320] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.138367] head: 0bfffe0000000002 ffffc1ffc3183d01 00000000ffffffff 00000000ffffffff
[   15.138420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.138597] page dumped because: kasan: bad access detected
[   15.138967] 
[   15.139092] Memory state around the buggy address:
[   15.139142]  fff00000c60f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.139185]  fff00000c60f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.139281] >fff00000c60f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.139318]                                               ^
[   15.139353]  fff00000c60f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.139491]  fff00000c60f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.139540] ==================================================================
[   15.146554] ==================================================================
[   15.146600] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.146647] Write of size 1 at addr fff00000c60f60ea by task kunit_try_catch/162
[   15.146707] 
[   15.146733] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.146811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.146836] Hardware name: linux,dummy-virt (DT)
[   15.146875] Call trace:
[   15.146897]  show_stack+0x20/0x38 (C)
[   15.146944]  dump_stack_lvl+0x8c/0xd0
[   15.147100]  print_report+0x118/0x5d0
[   15.147194]  kasan_report+0xdc/0x128
[   15.147246]  __asan_report_store1_noabort+0x20/0x30
[   15.147414]  krealloc_less_oob_helper+0xae4/0xc50
[   15.147470]  krealloc_large_less_oob+0x20/0x38
[   15.147620]  kunit_try_run_case+0x170/0x3f0
[   15.147666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.147724]  kthread+0x328/0x630
[   15.147784]  ret_from_fork+0x10/0x20
[   15.147875] 
[   15.147894] The buggy address belongs to the physical page:
[   15.147934] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f4
[   15.147986] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.148116] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.148327] page_type: f8(unknown)
[   15.148485] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.148534] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.148775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.148836] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.148883] head: 0bfffe0000000002 ffffc1ffc3183d01 00000000ffffffff 00000000ffffffff
[   15.148930] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.148969] page dumped because: kasan: bad access detected
[   15.149000] 
[   15.149017] Memory state around the buggy address:
[   15.149046]  fff00000c60f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.149120]  fff00000c60f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.149161] >fff00000c60f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.149197]                                                           ^
[   15.149234]  fff00000c60f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.149466]  fff00000c60f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.149518] ==================================================================
[   15.097729] ==================================================================
[   15.098161] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.098228] Write of size 1 at addr fff00000c5c3c8d0 by task kunit_try_catch/158
[   15.098365] 
[   15.098395] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.098623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.098679] Hardware name: linux,dummy-virt (DT)
[   15.098812] Call trace:
[   15.098851]  show_stack+0x20/0x38 (C)
[   15.098899]  dump_stack_lvl+0x8c/0xd0
[   15.098944]  print_report+0x118/0x5d0
[   15.098995]  kasan_report+0xdc/0x128
[   15.099106]  __asan_report_store1_noabort+0x20/0x30
[   15.099273]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.099321]  krealloc_less_oob+0x20/0x38
[   15.099366]  kunit_try_run_case+0x170/0x3f0
[   15.099411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.099463]  kthread+0x328/0x630
[   15.099503]  ret_from_fork+0x10/0x20
[   15.099549] 
[   15.099574] Allocated by task 158:
[   15.099699]  kasan_save_stack+0x3c/0x68
[   15.099738]  kasan_save_track+0x20/0x40
[   15.099774]  kasan_save_alloc_info+0x40/0x58
[   15.099811]  __kasan_krealloc+0x118/0x178
[   15.099915]  krealloc_noprof+0x128/0x360
[   15.100006]  krealloc_less_oob_helper+0x168/0xc50
[   15.100045]  krealloc_less_oob+0x20/0x38
[   15.100091]  kunit_try_run_case+0x170/0x3f0
[   15.100126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.100167]  kthread+0x328/0x630
[   15.100198]  ret_from_fork+0x10/0x20
[   15.100256] 
[   15.100275] The buggy address belongs to the object at fff00000c5c3c800
[   15.100275]  which belongs to the cache kmalloc-256 of size 256
[   15.100374] The buggy address is located 7 bytes to the right of
[   15.100374]  allocated 201-byte region [fff00000c5c3c800, fff00000c5c3c8c9)
[   15.100466] 
[   15.100484] The buggy address belongs to the physical page:
[   15.100576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c3c
[   15.100659] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.100757] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.100812] page_type: f5(slab)
[   15.100848] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.100911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.100960] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.101008] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.101055] head: 0bfffe0000000001 ffffc1ffc3170f01 00000000ffffffff 00000000ffffffff
[   15.101199] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.101240] page dumped because: kasan: bad access detected
[   15.101282] 
[   15.101299] Memory state around the buggy address:
[   15.101328]  fff00000c5c3c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.101435]  fff00000c5c3c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.101526] >fff00000c5c3c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.101676]                                                  ^
[   15.101729]  fff00000c5c3c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.101808]  fff00000c5c3c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.101892] ==================================================================
[   15.102474] ==================================================================
[   15.102548] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.102594] Write of size 1 at addr fff00000c5c3c8da by task kunit_try_catch/158
[   15.102641] 
[   15.102668] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.102979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.103059] Hardware name: linux,dummy-virt (DT)
[   15.103142] Call trace:
[   15.103224]  show_stack+0x20/0x38 (C)
[   15.103274]  dump_stack_lvl+0x8c/0xd0
[   15.103325]  print_report+0x118/0x5d0
[   15.103447]  kasan_report+0xdc/0x128
[   15.103534]  __asan_report_store1_noabort+0x20/0x30
[   15.103783]  krealloc_less_oob_helper+0xa80/0xc50
[   15.103883]  krealloc_less_oob+0x20/0x38
[   15.103928]  kunit_try_run_case+0x170/0x3f0
[   15.103973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.104126]  kthread+0x328/0x630
[   15.104187]  ret_from_fork+0x10/0x20
[   15.104233] 
[   15.104251] Allocated by task 158:
[   15.104295]  kasan_save_stack+0x3c/0x68
[   15.104453]  kasan_save_track+0x20/0x40
[   15.104490]  kasan_save_alloc_info+0x40/0x58
[   15.104528]  __kasan_krealloc+0x118/0x178
[   15.104564]  krealloc_noprof+0x128/0x360
[   15.104600]  krealloc_less_oob_helper+0x168/0xc50
[   15.104647]  krealloc_less_oob+0x20/0x38
[   15.104681]  kunit_try_run_case+0x170/0x3f0
[   15.104726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.104767]  kthread+0x328/0x630
[   15.104798]  ret_from_fork+0x10/0x20
[   15.105157] 
[   15.105203] The buggy address belongs to the object at fff00000c5c3c800
[   15.105203]  which belongs to the cache kmalloc-256 of size 256
[   15.105259] The buggy address is located 17 bytes to the right of
[   15.105259]  allocated 201-byte region [fff00000c5c3c800, fff00000c5c3c8c9)
[   15.105321] 
[   15.105339] The buggy address belongs to the physical page:
[   15.105378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c3c
[   15.105522] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.105566] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.105621] page_type: f5(slab)
[   15.105706] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.105758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.105891] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.106005] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.106053] head: 0bfffe0000000001 ffffc1ffc3170f01 00000000ffffffff 00000000ffffffff
[   15.106102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.106189] page dumped because: kasan: bad access detected
[   15.106222] 
[   15.106240] Memory state around the buggy address:
[   15.106276]  fff00000c5c3c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.106378]  fff00000c5c3c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.106424] >fff00000c5c3c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.106612]                                                     ^
[   15.106649]  fff00000c5c3c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.106751]  fff00000c5c3c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.106795] ==================================================================
[   15.139590] ==================================================================
[   15.139623] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.139733] Write of size 1 at addr fff00000c60f60d0 by task kunit_try_catch/162
[   15.139969] 
[   15.140080] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.140191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.140217] Hardware name: linux,dummy-virt (DT)
[   15.140246] Call trace:
[   15.140266]  show_stack+0x20/0x38 (C)
[   15.140314]  dump_stack_lvl+0x8c/0xd0
[   15.140368]  print_report+0x118/0x5d0
[   15.140413]  kasan_report+0xdc/0x128
[   15.140456]  __asan_report_store1_noabort+0x20/0x30
[   15.140506]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.140648]  krealloc_large_less_oob+0x20/0x38
[   15.140716]  kunit_try_run_case+0x170/0x3f0
[   15.140762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.140876]  kthread+0x328/0x630
[   15.140917]  ret_from_fork+0x10/0x20
[   15.140977] 
[   15.140995] The buggy address belongs to the physical page:
[   15.141024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f4
[   15.141073] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.141160] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.141271] page_type: f8(unknown)
[   15.141316] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.141364] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.141426] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.141507] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.141648] head: 0bfffe0000000002 ffffc1ffc3183d01 00000000ffffffff 00000000ffffffff
[   15.141757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.141824] page dumped because: kasan: bad access detected
[   15.141886] 
[   15.141926] Memory state around the buggy address:
[   15.142038]  fff00000c60f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.142108]  fff00000c60f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.142149] >fff00000c60f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.142245]                                                  ^
[   15.142280]  fff00000c60f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.142322]  fff00000c60f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.142660] ==================================================================
[   15.143163] ==================================================================
[   15.143207] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.143253] Write of size 1 at addr fff00000c60f60da by task kunit_try_catch/162
[   15.143300] 
[   15.143327] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.143403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.143429] Hardware name: linux,dummy-virt (DT)
[   15.143479] Call trace:
[   15.143585]  show_stack+0x20/0x38 (C)
[   15.143631]  dump_stack_lvl+0x8c/0xd0
[   15.143676]  print_report+0x118/0x5d0
[   15.143732]  kasan_report+0xdc/0x128
[   15.143777]  __asan_report_store1_noabort+0x20/0x30
[   15.144131]  krealloc_less_oob_helper+0xa80/0xc50
[   15.144182]  krealloc_large_less_oob+0x20/0x38
[   15.144228]  kunit_try_run_case+0x170/0x3f0
[   15.144273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.144324]  kthread+0x328/0x630
[   15.144365]  ret_from_fork+0x10/0x20
[   15.144410] 
[   15.144429] The buggy address belongs to the physical page:
[   15.144458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f4
[   15.144507] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.144551] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.144600] page_type: f8(unknown)
[   15.144636] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.144696] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.144755] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.144802] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.144850] head: 0bfffe0000000002 ffffc1ffc3183d01 00000000ffffffff 00000000ffffffff
[   15.145137] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.145336] page dumped because: kasan: bad access detected
[   15.145467] 
[   15.145485] Memory state around the buggy address:
[   15.145516]  fff00000c60f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.145697]  fff00000c60f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.145739] >fff00000c60f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.145776]                                                     ^
[   15.145811]  fff00000c60f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.145853]  fff00000c60f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.145891] ==================================================================
[   15.107745] ==================================================================
[   15.107931] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.107978] Write of size 1 at addr fff00000c5c3c8ea by task kunit_try_catch/158
[   15.108167] 
[   15.108195] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.108272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.108297] Hardware name: linux,dummy-virt (DT)
[   15.108326] Call trace:
[   15.108444]  show_stack+0x20/0x38 (C)
[   15.108695]  dump_stack_lvl+0x8c/0xd0
[   15.108741]  print_report+0x118/0x5d0
[   15.108786]  kasan_report+0xdc/0x128
[   15.108830]  __asan_report_store1_noabort+0x20/0x30
[   15.108882]  krealloc_less_oob_helper+0xae4/0xc50
[   15.108974]  krealloc_less_oob+0x20/0x38
[   15.109020]  kunit_try_run_case+0x170/0x3f0
[   15.109067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.109118]  kthread+0x328/0x630
[   15.109208]  ret_from_fork+0x10/0x20
[   15.109268] 
[   15.109285] Allocated by task 158:
[   15.109356]  kasan_save_stack+0x3c/0x68
[   15.109415]  kasan_save_track+0x20/0x40
[   15.109551]  kasan_save_alloc_info+0x40/0x58
[   15.109616]  __kasan_krealloc+0x118/0x178
[   15.109652]  krealloc_noprof+0x128/0x360
[   15.109702]  krealloc_less_oob_helper+0x168/0xc50
[   15.109740]  krealloc_less_oob+0x20/0x38
[   15.109775]  kunit_try_run_case+0x170/0x3f0
[   15.109810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.109852]  kthread+0x328/0x630
[   15.109883]  ret_from_fork+0x10/0x20
[   15.109917] 
[   15.109935] The buggy address belongs to the object at fff00000c5c3c800
[   15.109935]  which belongs to the cache kmalloc-256 of size 256
[   15.109988] The buggy address is located 33 bytes to the right of
[   15.109988]  allocated 201-byte region [fff00000c5c3c800, fff00000c5c3c8c9)
[   15.110358] 
[   15.110386] The buggy address belongs to the physical page:
[   15.110534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c3c
[   15.110614] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.110764] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.110942] page_type: f5(slab)
[   15.110985] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.111033] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.111081] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.111138] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.111186] head: 0bfffe0000000001 ffffc1ffc3170f01 00000000ffffffff 00000000ffffffff
[   15.111287] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.111328] page dumped because: kasan: bad access detected
[   15.111487] 
[   15.111504] Memory state around the buggy address:
[   15.111534]  fff00000c5c3c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111576]  fff00000c5c3c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.111715] >fff00000c5c3c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.111877]                                                           ^
[   15.111926]  fff00000c5c3c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111968]  fff00000c5c3c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.112005] ==================================================================
[   15.093136] ==================================================================
[   15.093209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.093262] Write of size 1 at addr fff00000c5c3c8c9 by task kunit_try_catch/158
[   15.093311] 
[   15.093341] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.093419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.093445] Hardware name: linux,dummy-virt (DT)
[   15.093475] Call trace:
[   15.093498]  show_stack+0x20/0x38 (C)
[   15.093584]  dump_stack_lvl+0x8c/0xd0
[   15.093639]  print_report+0x118/0x5d0
[   15.093694]  kasan_report+0xdc/0x128
[   15.093739]  __asan_report_store1_noabort+0x20/0x30
[   15.093799]  krealloc_less_oob_helper+0xa48/0xc50
[   15.093846]  krealloc_less_oob+0x20/0x38
[   15.093944]  kunit_try_run_case+0x170/0x3f0
[   15.094004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.094056]  kthread+0x328/0x630
[   15.094124]  ret_from_fork+0x10/0x20
[   15.094173] 
[   15.094242] Allocated by task 158:
[   15.094271]  kasan_save_stack+0x3c/0x68
[   15.094311]  kasan_save_track+0x20/0x40
[   15.094420]  kasan_save_alloc_info+0x40/0x58
[   15.094465]  __kasan_krealloc+0x118/0x178
[   15.094501]  krealloc_noprof+0x128/0x360
[   15.094792]  krealloc_less_oob_helper+0x168/0xc50
[   15.094857]  krealloc_less_oob+0x20/0x38
[   15.094903]  kunit_try_run_case+0x170/0x3f0
[   15.094960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.095001]  kthread+0x328/0x630
[   15.095032]  ret_from_fork+0x10/0x20
[   15.095075] 
[   15.095123] The buggy address belongs to the object at fff00000c5c3c800
[   15.095123]  which belongs to the cache kmalloc-256 of size 256
[   15.095212] The buggy address is located 0 bytes to the right of
[   15.095212]  allocated 201-byte region [fff00000c5c3c800, fff00000c5c3c8c9)
[   15.095458] 
[   15.095782] The buggy address belongs to the physical page:
[   15.095815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c3c
[   15.095878] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.095944] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.095995] page_type: f5(slab)
[   15.096065] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.096333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.096389] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.096437] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.096485] head: 0bfffe0000000001 ffffc1ffc3170f01 00000000ffffffff 00000000ffffffff
[   15.096535] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.096583] page dumped because: kasan: bad access detected
[   15.096613] 
[   15.096631] Memory state around the buggy address:
[   15.096660]  fff00000c5c3c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.096823]  fff00000c5c3c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.096871] >fff00000c5c3c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.096908]                                               ^
[   15.096972]  fff00000c5c3c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.097105]  fff00000c5c3c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.097142] ==================================================================
[   15.112549] ==================================================================
[   15.112698] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.112831] Write of size 1 at addr fff00000c5c3c8eb by task kunit_try_catch/158
[   15.112953] 
[   15.112982] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.113060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.113123] Hardware name: linux,dummy-virt (DT)
[   15.113153] Call trace:
[   15.113174]  show_stack+0x20/0x38 (C)
[   15.113220]  dump_stack_lvl+0x8c/0xd0
[   15.113276]  print_report+0x118/0x5d0
[   15.113322]  kasan_report+0xdc/0x128
[   15.113366]  __asan_report_store1_noabort+0x20/0x30
[   15.113488]  krealloc_less_oob_helper+0xa58/0xc50
[   15.113541]  krealloc_less_oob+0x20/0x38
[   15.113604]  kunit_try_run_case+0x170/0x3f0
[   15.113678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.113738]  kthread+0x328/0x630
[   15.113779]  ret_from_fork+0x10/0x20
[   15.113825] 
[   15.113842] Allocated by task 158:
[   15.113870]  kasan_save_stack+0x3c/0x68
[   15.113908]  kasan_save_track+0x20/0x40
[   15.113943]  kasan_save_alloc_info+0x40/0x58
[   15.113989]  __kasan_krealloc+0x118/0x178
[   15.114166]  krealloc_noprof+0x128/0x360
[   15.114335]  krealloc_less_oob_helper+0x168/0xc50
[   15.114513]  krealloc_less_oob+0x20/0x38
[   15.114548]  kunit_try_run_case+0x170/0x3f0
[   15.114680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.115075]  kthread+0x328/0x630
[   15.115176]  ret_from_fork+0x10/0x20
[   15.115320] 
[   15.115340] The buggy address belongs to the object at fff00000c5c3c800
[   15.115340]  which belongs to the cache kmalloc-256 of size 256
[   15.115400] The buggy address is located 34 bytes to the right of
[   15.115400]  allocated 201-byte region [fff00000c5c3c800, fff00000c5c3c8c9)
[   15.115512] 
[   15.115530] The buggy address belongs to the physical page:
[   15.115559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c3c
[   15.115628] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.115673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.115796] page_type: f5(slab)
[   15.115832] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.115901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.116058] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.116106] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.116153] head: 0bfffe0000000001 ffffc1ffc3170f01 00000000ffffffff 00000000ffffffff
[   15.116234] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.116303] page dumped because: kasan: bad access detected
[   15.116332] 
[   15.116350] Memory state around the buggy address:
[   15.116398]  fff00000c5c3c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.116439]  fff00000c5c3c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.116513] >fff00000c5c3c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.116550]                                                           ^
[   15.116587]  fff00000c5c3c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.116667]  fff00000c5c3c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.116723] ==================================================================

[   11.842210] ==================================================================
[   11.842938] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.843301] Write of size 1 at addr ffff888102a3a0c9 by task kunit_try_catch/179
[   11.843569] 
[   11.843723] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.843921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.843937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.843981] Call Trace:
[   11.843992]  <TASK>
[   11.844015]  dump_stack_lvl+0x73/0xb0
[   11.844045]  print_report+0xd1/0x610
[   11.844066]  ? __virt_addr_valid+0x1db/0x2d0
[   11.844087]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.844110]  ? kasan_addr_to_slab+0x11/0xa0
[   11.844129]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.844151]  kasan_report+0x141/0x180
[   11.844172]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.844199]  __asan_report_store1_noabort+0x1b/0x30
[   11.844222]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.844246]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.844269]  ? finish_task_switch.isra.0+0x153/0x700
[   11.844289]  ? __switch_to+0x47/0xf50
[   11.844312]  ? __schedule+0x10cc/0x2b60
[   11.844333]  ? __pfx_read_tsc+0x10/0x10
[   11.844356]  krealloc_large_less_oob+0x1c/0x30
[   11.844378]  kunit_try_run_case+0x1a5/0x480
[   11.844586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.844609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.844631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.844653]  ? __kthread_parkme+0x82/0x180
[   11.844673]  ? preempt_count_sub+0x50/0x80
[   11.844695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.844718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.844740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.844762]  kthread+0x337/0x6f0
[   11.844781]  ? trace_preempt_on+0x20/0xc0
[   11.844802]  ? __pfx_kthread+0x10/0x10
[   11.844821]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.844841]  ? calculate_sigpending+0x7b/0xa0
[   11.844865]  ? __pfx_kthread+0x10/0x10
[   11.844885]  ret_from_fork+0x116/0x1d0
[   11.844903]  ? __pfx_kthread+0x10/0x10
[   11.844922]  ret_from_fork_asm+0x1a/0x30
[   11.844951]  </TASK>
[   11.844961] 
[   11.852954] The buggy address belongs to the physical page:
[   11.853205] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   11.853630] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.853931] flags: 0x200000000000040(head|node=0|zone=2)
[   11.854203] page_type: f8(unknown)
[   11.854380] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.854629] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.854889] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.855240] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.855631] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   11.855897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.856238] page dumped because: kasan: bad access detected
[   11.856614] 
[   11.856698] Memory state around the buggy address:
[   11.856853]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.857118]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.857479] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.857908]                                               ^
[   11.858157]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.858373]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.858698] ==================================================================
[   11.876988] ==================================================================
[   11.877745] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.878122] Write of size 1 at addr ffff888102a3a0da by task kunit_try_catch/179
[   11.878491] 
[   11.878621] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.878662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.878672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.878702] Call Trace:
[   11.878714]  <TASK>
[   11.878727]  dump_stack_lvl+0x73/0xb0
[   11.878753]  print_report+0xd1/0x610
[   11.878774]  ? __virt_addr_valid+0x1db/0x2d0
[   11.878795]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.878817]  ? kasan_addr_to_slab+0x11/0xa0
[   11.878838]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.878860]  kasan_report+0x141/0x180
[   11.878912]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.878940]  __asan_report_store1_noabort+0x1b/0x30
[   11.878974]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.878998]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.879032]  ? finish_task_switch.isra.0+0x153/0x700
[   11.879052]  ? __switch_to+0x47/0xf50
[   11.879076]  ? __schedule+0x10cc/0x2b60
[   11.879097]  ? __pfx_read_tsc+0x10/0x10
[   11.879119]  krealloc_large_less_oob+0x1c/0x30
[   11.879141]  kunit_try_run_case+0x1a5/0x480
[   11.879164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.879213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.879236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.879258]  ? __kthread_parkme+0x82/0x180
[   11.879287]  ? preempt_count_sub+0x50/0x80
[   11.879309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.879332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.879353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.879375]  kthread+0x337/0x6f0
[   11.879393]  ? trace_preempt_on+0x20/0xc0
[   11.879414]  ? __pfx_kthread+0x10/0x10
[   11.879434]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.879455]  ? calculate_sigpending+0x7b/0xa0
[   11.879479]  ? __pfx_kthread+0x10/0x10
[   11.879500]  ret_from_fork+0x116/0x1d0
[   11.879524]  ? __pfx_kthread+0x10/0x10
[   11.879543]  ret_from_fork_asm+0x1a/0x30
[   11.879572]  </TASK>
[   11.879582] 
[   11.887278] The buggy address belongs to the physical page:
[   11.887580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   11.888363] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.888738] flags: 0x200000000000040(head|node=0|zone=2)
[   11.888961] page_type: f8(unknown)
[   11.889156] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.890089] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.890543] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.891025] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.891381] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   11.891974] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.892411] page dumped because: kasan: bad access detected
[   11.892784] 
[   11.892886] Memory state around the buggy address:
[   11.893310]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.893748]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.894080] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.894380]                                                     ^
[   11.894865]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.895278]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.895794] ==================================================================
[   11.771231] ==================================================================
[   11.771481] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.771899] Write of size 1 at addr ffff888100a240eb by task kunit_try_catch/175
[   11.772601] 
[   11.772704] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.772783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.772795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.772827] Call Trace:
[   11.772852]  <TASK>
[   11.772866]  dump_stack_lvl+0x73/0xb0
[   11.772893]  print_report+0xd1/0x610
[   11.772914]  ? __virt_addr_valid+0x1db/0x2d0
[   11.772934]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.772956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.772985]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.773018]  kasan_report+0x141/0x180
[   11.773038]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.773066]  __asan_report_store1_noabort+0x1b/0x30
[   11.773089]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.773114]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.773137]  ? finish_task_switch.isra.0+0x153/0x700
[   11.773157]  ? __switch_to+0x47/0xf50
[   11.773180]  ? __schedule+0x10cc/0x2b60
[   11.773203]  ? __pfx_read_tsc+0x10/0x10
[   11.773226]  krealloc_less_oob+0x1c/0x30
[   11.773246]  kunit_try_run_case+0x1a5/0x480
[   11.773269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.773290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.773312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.773333]  ? __kthread_parkme+0x82/0x180
[   11.773352]  ? preempt_count_sub+0x50/0x80
[   11.773453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.773476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.773498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.773520]  kthread+0x337/0x6f0
[   11.773539]  ? trace_preempt_on+0x20/0xc0
[   11.773560]  ? __pfx_kthread+0x10/0x10
[   11.773580]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.773637]  ? calculate_sigpending+0x7b/0xa0
[   11.773662]  ? __pfx_kthread+0x10/0x10
[   11.773682]  ret_from_fork+0x116/0x1d0
[   11.773712]  ? __pfx_kthread+0x10/0x10
[   11.773732]  ret_from_fork_asm+0x1a/0x30
[   11.773761]  </TASK>
[   11.773770] 
[   11.782257] Allocated by task 175:
[   11.782453]  kasan_save_stack+0x45/0x70
[   11.782777]  kasan_save_track+0x18/0x40
[   11.782950]  kasan_save_alloc_info+0x3b/0x50
[   11.783182]  __kasan_krealloc+0x190/0x1f0
[   11.783418]  krealloc_noprof+0xf3/0x340
[   11.783572]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.783949]  krealloc_less_oob+0x1c/0x30
[   11.784184]  kunit_try_run_case+0x1a5/0x480
[   11.784529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.785071]  kthread+0x337/0x6f0
[   11.785198]  ret_from_fork+0x116/0x1d0
[   11.785370]  ret_from_fork_asm+0x1a/0x30
[   11.785598] 
[   11.785833] The buggy address belongs to the object at ffff888100a24000
[   11.785833]  which belongs to the cache kmalloc-256 of size 256
[   11.786237] The buggy address is located 34 bytes to the right of
[   11.786237]  allocated 201-byte region [ffff888100a24000, ffff888100a240c9)
[   11.787109] 
[   11.787185] The buggy address belongs to the physical page:
[   11.787365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24
[   11.787693] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.787990] flags: 0x200000000000040(head|node=0|zone=2)
[   11.788200] page_type: f5(slab)
[   11.788359] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.788803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.789213] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.789680] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.790145] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff
[   11.790566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.790878] page dumped because: kasan: bad access detected
[   11.791135] 
[   11.791213] Memory state around the buggy address:
[   11.791532]  ffff888100a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.791763]  ffff888100a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.792078] >ffff888100a24080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.792547]                                                           ^
[   11.792897]  ffff888100a24100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.793235]  ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.793456] ==================================================================
[   11.723571] ==================================================================
[   11.723840] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.724197] Write of size 1 at addr ffff888100a240da by task kunit_try_catch/175
[   11.724811] 
[   11.724944] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.725016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.725027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.725046] Call Trace:
[   11.725058]  <TASK>
[   11.725071]  dump_stack_lvl+0x73/0xb0
[   11.725099]  print_report+0xd1/0x610
[   11.725119]  ? __virt_addr_valid+0x1db/0x2d0
[   11.725141]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.725163]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.725184]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.725206]  kasan_report+0x141/0x180
[   11.725227]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.725254]  __asan_report_store1_noabort+0x1b/0x30
[   11.725277]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.725301]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.725324]  ? finish_task_switch.isra.0+0x153/0x700
[   11.725344]  ? __switch_to+0x47/0xf50
[   11.725441]  ? __schedule+0x10cc/0x2b60
[   11.725468]  ? __pfx_read_tsc+0x10/0x10
[   11.725532]  krealloc_less_oob+0x1c/0x30
[   11.725553]  kunit_try_run_case+0x1a5/0x480
[   11.725588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.725609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.725660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.725682]  ? __kthread_parkme+0x82/0x180
[   11.725703]  ? preempt_count_sub+0x50/0x80
[   11.725736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.725760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.725781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.725803]  kthread+0x337/0x6f0
[   11.725822]  ? trace_preempt_on+0x20/0xc0
[   11.725843]  ? __pfx_kthread+0x10/0x10
[   11.725862]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.725882]  ? calculate_sigpending+0x7b/0xa0
[   11.725907]  ? __pfx_kthread+0x10/0x10
[   11.725927]  ret_from_fork+0x116/0x1d0
[   11.725944]  ? __pfx_kthread+0x10/0x10
[   11.725963]  ret_from_fork_asm+0x1a/0x30
[   11.725993]  </TASK>
[   11.726002] 
[   11.735136] Allocated by task 175:
[   11.735355]  kasan_save_stack+0x45/0x70
[   11.735575]  kasan_save_track+0x18/0x40
[   11.735846]  kasan_save_alloc_info+0x3b/0x50
[   11.736087]  __kasan_krealloc+0x190/0x1f0
[   11.736287]  krealloc_noprof+0xf3/0x340
[   11.736550]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.736949]  krealloc_less_oob+0x1c/0x30
[   11.737197]  kunit_try_run_case+0x1a5/0x480
[   11.737499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.737752]  kthread+0x337/0x6f0
[   11.738029]  ret_from_fork+0x116/0x1d0
[   11.738166]  ret_from_fork_asm+0x1a/0x30
[   11.738304] 
[   11.738460] The buggy address belongs to the object at ffff888100a24000
[   11.738460]  which belongs to the cache kmalloc-256 of size 256
[   11.739168] The buggy address is located 17 bytes to the right of
[   11.739168]  allocated 201-byte region [ffff888100a24000, ffff888100a240c9)
[   11.740155] 
[   11.740296] The buggy address belongs to the physical page:
[   11.740489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24
[   11.741261] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.741501] flags: 0x200000000000040(head|node=0|zone=2)
[   11.741861] page_type: f5(slab)
[   11.742103] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.742530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.742855] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.743147] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.743683] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff
[   11.743996] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.744328] page dumped because: kasan: bad access detected
[   11.744722] 
[   11.744822] Memory state around the buggy address:
[   11.745065]  ffff888100a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.745452]  ffff888100a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.745770] >ffff888100a24080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.746068]                                                     ^
[   11.746300]  ffff888100a24100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.746828]  ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.747118] ==================================================================
[   11.699995] ==================================================================
[   11.700368] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.700609] Write of size 1 at addr ffff888100a240d0 by task kunit_try_catch/175
[   11.701373] 
[   11.701749] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.701807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.701818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.701838] Call Trace:
[   11.701853]  <TASK>
[   11.701868]  dump_stack_lvl+0x73/0xb0
[   11.701895]  print_report+0xd1/0x610
[   11.701916]  ? __virt_addr_valid+0x1db/0x2d0
[   11.701937]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.701959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.701980]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.702002]  kasan_report+0x141/0x180
[   11.702034]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.702061]  __asan_report_store1_noabort+0x1b/0x30
[   11.702083]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.702108]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.702131]  ? finish_task_switch.isra.0+0x153/0x700
[   11.702151]  ? __switch_to+0x47/0xf50
[   11.702174]  ? __schedule+0x10cc/0x2b60
[   11.702196]  ? __pfx_read_tsc+0x10/0x10
[   11.702219]  krealloc_less_oob+0x1c/0x30
[   11.702239]  kunit_try_run_case+0x1a5/0x480
[   11.702262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.702283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.702305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.702327]  ? __kthread_parkme+0x82/0x180
[   11.702346]  ? preempt_count_sub+0x50/0x80
[   11.702611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.702640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.702677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.702700]  kthread+0x337/0x6f0
[   11.702718]  ? trace_preempt_on+0x20/0xc0
[   11.702740]  ? __pfx_kthread+0x10/0x10
[   11.702760]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.702780]  ? calculate_sigpending+0x7b/0xa0
[   11.702805]  ? __pfx_kthread+0x10/0x10
[   11.702825]  ret_from_fork+0x116/0x1d0
[   11.702843]  ? __pfx_kthread+0x10/0x10
[   11.702862]  ret_from_fork_asm+0x1a/0x30
[   11.702892]  </TASK>
[   11.702901] 
[   11.711798] Allocated by task 175:
[   11.711927]  kasan_save_stack+0x45/0x70
[   11.712172]  kasan_save_track+0x18/0x40
[   11.712362]  kasan_save_alloc_info+0x3b/0x50
[   11.712628]  __kasan_krealloc+0x190/0x1f0
[   11.712832]  krealloc_noprof+0xf3/0x340
[   11.713051]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.713273]  krealloc_less_oob+0x1c/0x30
[   11.713485]  kunit_try_run_case+0x1a5/0x480
[   11.713693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.714079]  kthread+0x337/0x6f0
[   11.714253]  ret_from_fork+0x116/0x1d0
[   11.714399]  ret_from_fork_asm+0x1a/0x30
[   11.714628] 
[   11.714778] The buggy address belongs to the object at ffff888100a24000
[   11.714778]  which belongs to the cache kmalloc-256 of size 256
[   11.715452] The buggy address is located 7 bytes to the right of
[   11.715452]  allocated 201-byte region [ffff888100a24000, ffff888100a240c9)
[   11.716080] 
[   11.716153] The buggy address belongs to the physical page:
[   11.716322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24
[   11.716807] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.717177] flags: 0x200000000000040(head|node=0|zone=2)
[   11.717551] page_type: f5(slab)
[   11.717720] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.718039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.718615] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.718948] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.719197] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff
[   11.719737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.720172] page dumped because: kasan: bad access detected
[   11.720622] 
[   11.720765] Memory state around the buggy address:
[   11.720947]  ffff888100a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.721296]  ffff888100a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.721689] >ffff888100a24080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.722029]                                                  ^
[   11.722333]  ffff888100a24100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.722714]  ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.722932] ==================================================================
[   11.747673] ==================================================================
[   11.748018] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.748338] Write of size 1 at addr ffff888100a240ea by task kunit_try_catch/175
[   11.748808] 
[   11.748923] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.748966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.748981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.749000] Call Trace:
[   11.749027]  <TASK>
[   11.749039]  dump_stack_lvl+0x73/0xb0
[   11.749067]  print_report+0xd1/0x610
[   11.749087]  ? __virt_addr_valid+0x1db/0x2d0
[   11.749108]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.749130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.749150]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.749173]  kasan_report+0x141/0x180
[   11.749194]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.749221]  __asan_report_store1_noabort+0x1b/0x30
[   11.749245]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.749270]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.749292]  ? finish_task_switch.isra.0+0x153/0x700
[   11.749313]  ? __switch_to+0x47/0xf50
[   11.749337]  ? __schedule+0x10cc/0x2b60
[   11.749357]  ? __pfx_read_tsc+0x10/0x10
[   11.749487]  krealloc_less_oob+0x1c/0x30
[   11.749508]  kunit_try_run_case+0x1a5/0x480
[   11.749531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.749552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.749575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.749596]  ? __kthread_parkme+0x82/0x180
[   11.749615]  ? preempt_count_sub+0x50/0x80
[   11.749637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.749660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.749681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.749703]  kthread+0x337/0x6f0
[   11.749721]  ? trace_preempt_on+0x20/0xc0
[   11.749742]  ? __pfx_kthread+0x10/0x10
[   11.749762]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.749782]  ? calculate_sigpending+0x7b/0xa0
[   11.749805]  ? __pfx_kthread+0x10/0x10
[   11.749826]  ret_from_fork+0x116/0x1d0
[   11.749883]  ? __pfx_kthread+0x10/0x10
[   11.749904]  ret_from_fork_asm+0x1a/0x30
[   11.749933]  </TASK>
[   11.749953] 
[   11.758282] Allocated by task 175:
[   11.758682]  kasan_save_stack+0x45/0x70
[   11.758906]  kasan_save_track+0x18/0x40
[   11.759185]  kasan_save_alloc_info+0x3b/0x50
[   11.759531]  __kasan_krealloc+0x190/0x1f0
[   11.759781]  krealloc_noprof+0xf3/0x340
[   11.759956]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.760198]  krealloc_less_oob+0x1c/0x30
[   11.760347]  kunit_try_run_case+0x1a5/0x480
[   11.760605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.760957]  kthread+0x337/0x6f0
[   11.761166]  ret_from_fork+0x116/0x1d0
[   11.761301]  ret_from_fork_asm+0x1a/0x30
[   11.761686] 
[   11.761786] The buggy address belongs to the object at ffff888100a24000
[   11.761786]  which belongs to the cache kmalloc-256 of size 256
[   11.762273] The buggy address is located 33 bytes to the right of
[   11.762273]  allocated 201-byte region [ffff888100a24000, ffff888100a240c9)
[   11.763242] 
[   11.763353] The buggy address belongs to the physical page:
[   11.763624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24
[   11.763912] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.764323] flags: 0x200000000000040(head|node=0|zone=2)
[   11.764581] page_type: f5(slab)
[   11.764752] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.765244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.765781] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.766030] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.766322] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff
[   11.766953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.767288] page dumped because: kasan: bad access detected
[   11.767871] 
[   11.767950] Memory state around the buggy address:
[   11.768138]  ffff888100a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.768537]  ffff888100a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.769251] >ffff888100a24080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.769660]                                                           ^
[   11.770138]  ffff888100a24100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.770492]  ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.770774] ==================================================================
[   11.664150] ==================================================================
[   11.665505] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.666753] Write of size 1 at addr ffff888100a240c9 by task kunit_try_catch/175
[   11.667328] 
[   11.667578] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.667704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.667717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.667738] Call Trace:
[   11.667763]  <TASK>
[   11.667778]  dump_stack_lvl+0x73/0xb0
[   11.667816]  print_report+0xd1/0x610
[   11.667837]  ? __virt_addr_valid+0x1db/0x2d0
[   11.667860]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.667882]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.667903]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.667925]  kasan_report+0x141/0x180
[   11.667945]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.667972]  __asan_report_store1_noabort+0x1b/0x30
[   11.667995]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.668030]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.668052]  ? finish_task_switch.isra.0+0x153/0x700
[   11.668074]  ? __switch_to+0x47/0xf50
[   11.668099]  ? __schedule+0x10cc/0x2b60
[   11.668120]  ? __pfx_read_tsc+0x10/0x10
[   11.668144]  krealloc_less_oob+0x1c/0x30
[   11.668164]  kunit_try_run_case+0x1a5/0x480
[   11.668188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.668210]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.668232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.668254]  ? __kthread_parkme+0x82/0x180
[   11.668273]  ? preempt_count_sub+0x50/0x80
[   11.668294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.668317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.668338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.668360]  kthread+0x337/0x6f0
[   11.668411]  ? trace_preempt_on+0x20/0xc0
[   11.668451]  ? __pfx_kthread+0x10/0x10
[   11.668471]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.668491]  ? calculate_sigpending+0x7b/0xa0
[   11.668516]  ? __pfx_kthread+0x10/0x10
[   11.668536]  ret_from_fork+0x116/0x1d0
[   11.668554]  ? __pfx_kthread+0x10/0x10
[   11.668573]  ret_from_fork_asm+0x1a/0x30
[   11.668602]  </TASK>
[   11.668612] 
[   11.683320] Allocated by task 175:
[   11.683685]  kasan_save_stack+0x45/0x70
[   11.684169]  kasan_save_track+0x18/0x40
[   11.684590]  kasan_save_alloc_info+0x3b/0x50
[   11.684843]  __kasan_krealloc+0x190/0x1f0
[   11.685151]  krealloc_noprof+0xf3/0x340
[   11.685593]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.686101]  krealloc_less_oob+0x1c/0x30
[   11.686487]  kunit_try_run_case+0x1a5/0x480
[   11.686813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.687257]  kthread+0x337/0x6f0
[   11.687543]  ret_from_fork+0x116/0x1d0
[   11.687708]  ret_from_fork_asm+0x1a/0x30
[   11.687958] 
[   11.688148] The buggy address belongs to the object at ffff888100a24000
[   11.688148]  which belongs to the cache kmalloc-256 of size 256
[   11.689360] The buggy address is located 0 bytes to the right of
[   11.689360]  allocated 201-byte region [ffff888100a24000, ffff888100a240c9)
[   11.690261] 
[   11.690339] The buggy address belongs to the physical page:
[   11.690747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24
[   11.691175] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.691556] flags: 0x200000000000040(head|node=0|zone=2)
[   11.692070] page_type: f5(slab)
[   11.692437] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.693152] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.693607] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.694287] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.695014] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff
[   11.695335] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.696142] page dumped because: kasan: bad access detected
[   11.696733] 
[   11.696858] Memory state around the buggy address:
[   11.697035]  ffff888100a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.697250]  ffff888100a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.697482] >ffff888100a24080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.698188]                                               ^
[   11.698407]  ffff888100a24100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.698966]  ffff888100a24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.699338] ==================================================================
[   11.859881] ==================================================================
[   11.860209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.860612] Write of size 1 at addr ffff888102a3a0d0 by task kunit_try_catch/179
[   11.860948] 
[   11.861102] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.861142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.861164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.861184] Call Trace:
[   11.861194]  <TASK>
[   11.861207]  dump_stack_lvl+0x73/0xb0
[   11.861234]  print_report+0xd1/0x610
[   11.861255]  ? __virt_addr_valid+0x1db/0x2d0
[   11.861276]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.861298]  ? kasan_addr_to_slab+0x11/0xa0
[   11.861317]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.861339]  kasan_report+0x141/0x180
[   11.861360]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.861387]  __asan_report_store1_noabort+0x1b/0x30
[   11.861410]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.861435]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.861457]  ? finish_task_switch.isra.0+0x153/0x700
[   11.861477]  ? __switch_to+0x47/0xf50
[   11.861500]  ? __schedule+0x10cc/0x2b60
[   11.861555]  ? __pfx_read_tsc+0x10/0x10
[   11.861578]  krealloc_large_less_oob+0x1c/0x30
[   11.861636]  kunit_try_run_case+0x1a5/0x480
[   11.861661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.861683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.861715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.861737]  ? __kthread_parkme+0x82/0x180
[   11.861756]  ? preempt_count_sub+0x50/0x80
[   11.861778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.861801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.861822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.861844]  kthread+0x337/0x6f0
[   11.861892]  ? trace_preempt_on+0x20/0xc0
[   11.861913]  ? __pfx_kthread+0x10/0x10
[   11.861953]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.861974]  ? calculate_sigpending+0x7b/0xa0
[   11.861998]  ? __pfx_kthread+0x10/0x10
[   11.862026]  ret_from_fork+0x116/0x1d0
[   11.862044]  ? __pfx_kthread+0x10/0x10
[   11.862063]  ret_from_fork_asm+0x1a/0x30
[   11.862092]  </TASK>
[   11.862101] 
[   11.870080] The buggy address belongs to the physical page:
[   11.870378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   11.871027] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.871281] flags: 0x200000000000040(head|node=0|zone=2)
[   11.871577] page_type: f8(unknown)
[   11.871861] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.872144] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.872566] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.872915] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.873169] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   11.873649] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.873955] page dumped because: kasan: bad access detected
[   11.874247] 
[   11.874341] Memory state around the buggy address:
[   11.874650]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.874878]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.875220] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.875541]                                                  ^
[   11.875722]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.876127]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.876408] ==================================================================
[   11.918598] ==================================================================
[   11.919657] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.920084] Write of size 1 at addr ffff888102a3a0eb by task kunit_try_catch/179
[   11.920701] 
[   11.920838] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.921052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.921066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.921085] Call Trace:
[   11.921099]  <TASK>
[   11.921112]  dump_stack_lvl+0x73/0xb0
[   11.921140]  print_report+0xd1/0x610
[   11.921161]  ? __virt_addr_valid+0x1db/0x2d0
[   11.921181]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.921204]  ? kasan_addr_to_slab+0x11/0xa0
[   11.921223]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.921246]  kasan_report+0x141/0x180
[   11.921267]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.921294]  __asan_report_store1_noabort+0x1b/0x30
[   11.921317]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.921341]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.921364]  ? finish_task_switch.isra.0+0x153/0x700
[   11.921384]  ? __switch_to+0x47/0xf50
[   11.921418]  ? __schedule+0x10cc/0x2b60
[   11.921439]  ? __pfx_read_tsc+0x10/0x10
[   11.921463]  krealloc_large_less_oob+0x1c/0x30
[   11.921486]  kunit_try_run_case+0x1a5/0x480
[   11.921509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.921530]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.921552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.921574]  ? __kthread_parkme+0x82/0x180
[   11.921593]  ? preempt_count_sub+0x50/0x80
[   11.921615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.921637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.921659]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.921681]  kthread+0x337/0x6f0
[   11.921699]  ? trace_preempt_on+0x20/0xc0
[   11.921720]  ? __pfx_kthread+0x10/0x10
[   11.921739]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.921759]  ? calculate_sigpending+0x7b/0xa0
[   11.921783]  ? __pfx_kthread+0x10/0x10
[   11.921804]  ret_from_fork+0x116/0x1d0
[   11.921821]  ? __pfx_kthread+0x10/0x10
[   11.921840]  ret_from_fork_asm+0x1a/0x30
[   11.921869]  </TASK>
[   11.921878] 
[   11.932961] The buggy address belongs to the physical page:
[   11.933262] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   11.933839] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.934285] flags: 0x200000000000040(head|node=0|zone=2)
[   11.934667] page_type: f8(unknown)
[   11.935016] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.935337] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.935815] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.936172] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.936674] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   11.937026] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.937346] page dumped because: kasan: bad access detected
[   11.937778] 
[   11.937879] Memory state around the buggy address:
[   11.938093]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.938406]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.938714] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.938987]                                                           ^
[   11.939285]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.939696]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.939985] ==================================================================
[   11.896485] ==================================================================
[   11.897271] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.897803] Write of size 1 at addr ffff888102a3a0ea by task kunit_try_catch/179
[   11.898131] 
[   11.898223] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.898263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.898274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.898293] Call Trace:
[   11.898306]  <TASK>
[   11.898318]  dump_stack_lvl+0x73/0xb0
[   11.898345]  print_report+0xd1/0x610
[   11.898366]  ? __virt_addr_valid+0x1db/0x2d0
[   11.898387]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.898748]  ? kasan_addr_to_slab+0x11/0xa0
[   11.898769]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.898791]  kasan_report+0x141/0x180
[   11.898813]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.898840]  __asan_report_store1_noabort+0x1b/0x30
[   11.898864]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.898890]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.898913]  ? finish_task_switch.isra.0+0x153/0x700
[   11.898935]  ? __switch_to+0x47/0xf50
[   11.898959]  ? __schedule+0x10cc/0x2b60
[   11.898981]  ? __pfx_read_tsc+0x10/0x10
[   11.899015]  krealloc_large_less_oob+0x1c/0x30
[   11.899038]  kunit_try_run_case+0x1a5/0x480
[   11.899061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.899082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.899105]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.899127]  ? __kthread_parkme+0x82/0x180
[   11.899146]  ? preempt_count_sub+0x50/0x80
[   11.899167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.899190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.899211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.899233]  kthread+0x337/0x6f0
[   11.899251]  ? trace_preempt_on+0x20/0xc0
[   11.899273]  ? __pfx_kthread+0x10/0x10
[   11.899292]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.899312]  ? calculate_sigpending+0x7b/0xa0
[   11.899336]  ? __pfx_kthread+0x10/0x10
[   11.899356]  ret_from_fork+0x116/0x1d0
[   11.899374]  ? __pfx_kthread+0x10/0x10
[   11.899393]  ret_from_fork_asm+0x1a/0x30
[   11.899422]  </TASK>
[   11.899431] 
[   11.910001] The buggy address belongs to the physical page:
[   11.910302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   11.911043] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.911556] flags: 0x200000000000040(head|node=0|zone=2)
[   11.911902] page_type: f8(unknown)
[   11.912090] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.912400] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.913029] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.913486] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.913915] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   11.914373] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.914889] page dumped because: kasan: bad access detected
[   11.915145] 
[   11.915236] Memory state around the buggy address:
[   11.915399]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.915709]  ffff888102a3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.916031] >ffff888102a3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.916334]                                                           ^
[   11.917037]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.917450]  ffff888102a3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.917829] ==================================================================