Hay
Date
July 20, 2025, 11:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.305839] ==================================================================
[   15.305888] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.305933] Write of size 1 at addr fff00000c77560eb by task kunit_try_catch/162
[   15.305980] 
[   15.306007] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.306142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.306168] Hardware name: linux,dummy-virt (DT)
[   15.306216] Call trace:
[   15.306255]  show_stack+0x20/0x38 (C)
[   15.306300]  dump_stack_lvl+0x8c/0xd0
[   15.306360]  print_report+0x118/0x5d0
[   15.306405]  kasan_report+0xdc/0x128
[   15.306483]  __asan_report_store1_noabort+0x20/0x30
[   15.306539]  krealloc_less_oob_helper+0xa58/0xc50
[   15.306604]  krealloc_large_less_oob+0x20/0x38
[   15.306651]  kunit_try_run_case+0x170/0x3f0
[   15.306724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.306812]  kthread+0x328/0x630
[   15.306867]  ret_from_fork+0x10/0x20
[   15.306913] 
[   15.307075] The buggy address belongs to the physical page:
[   15.307109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.307158] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.307335] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.307413] page_type: f8(unknown)
[   15.307480] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.307577] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.307679] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.307726] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.307773] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.307819] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.307896] page dumped because: kasan: bad access detected
[   15.307926] 
[   15.308083] Memory state around the buggy address:
[   15.308186]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.308251]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.308313] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.308391]                                                           ^
[   15.308462]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.308535]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.308634] ==================================================================
[   15.289995] ==================================================================
[   15.290049] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.290116] Write of size 1 at addr fff00000c77560c9 by task kunit_try_catch/162
[   15.290208] 
[   15.290293] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.290388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.290415] Hardware name: linux,dummy-virt (DT)
[   15.290480] Call trace:
[   15.290543]  show_stack+0x20/0x38 (C)
[   15.290591]  dump_stack_lvl+0x8c/0xd0
[   15.290653]  print_report+0x118/0x5d0
[   15.290871]  kasan_report+0xdc/0x128
[   15.291044]  __asan_report_store1_noabort+0x20/0x30
[   15.291097]  krealloc_less_oob_helper+0xa48/0xc50
[   15.291159]  krealloc_large_less_oob+0x20/0x38
[   15.291205]  kunit_try_run_case+0x170/0x3f0
[   15.291250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.291301]  kthread+0x328/0x630
[   15.291502]  ret_from_fork+0x10/0x20
[   15.291609] 
[   15.291783] The buggy address belongs to the physical page:
[   15.291861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.291948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.292039] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.292089] page_type: f8(unknown)
[   15.292253] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.292458] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.292555] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.292613] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.292747] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.292862] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.292959] page dumped because: kasan: bad access detected
[   15.293043] 
[   15.293135] Memory state around the buggy address:
[   15.293223]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.293306]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.293378] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.293414]                                               ^
[   15.293449]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.293555]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.293879] ==================================================================
[   15.294583] ==================================================================
[   15.294626] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.294703] Write of size 1 at addr fff00000c77560d0 by task kunit_try_catch/162
[   15.294753] 
[   15.294906] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.294985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.295037] Hardware name: linux,dummy-virt (DT)
[   15.295066] Call trace:
[   15.295215]  show_stack+0x20/0x38 (C)
[   15.295283]  dump_stack_lvl+0x8c/0xd0
[   15.295393]  print_report+0x118/0x5d0
[   15.295503]  kasan_report+0xdc/0x128
[   15.295602]  __asan_report_store1_noabort+0x20/0x30
[   15.295780]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.295936]  krealloc_large_less_oob+0x20/0x38
[   15.296042]  kunit_try_run_case+0x170/0x3f0
[   15.296088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.296162]  kthread+0x328/0x630
[   15.296203]  ret_from_fork+0x10/0x20
[   15.296248] 
[   15.296269] The buggy address belongs to the physical page:
[   15.296298] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.296414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.296595] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.296700] page_type: f8(unknown)
[   15.296802] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.296899] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.297034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.297129] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.297177] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.297375] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.297491] page dumped because: kasan: bad access detected
[   15.297546] 
[   15.297611] Memory state around the buggy address:
[   15.297684]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.297763]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.297858] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.297899]                                                  ^
[   15.297972]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.298063]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.298165] ==================================================================
[   15.254490] ==================================================================
[   15.254534] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.254579] Write of size 1 at addr fff00000c61446da by task kunit_try_catch/158
[   15.254626] 
[   15.254653] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.254743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.254768] Hardware name: linux,dummy-virt (DT)
[   15.254815] Call trace:
[   15.254836]  show_stack+0x20/0x38 (C)
[   15.254882]  dump_stack_lvl+0x8c/0xd0
[   15.254926]  print_report+0x118/0x5d0
[   15.254970]  kasan_report+0xdc/0x128
[   15.255043]  __asan_report_store1_noabort+0x20/0x30
[   15.255094]  krealloc_less_oob_helper+0xa80/0xc50
[   15.255140]  krealloc_less_oob+0x20/0x38
[   15.255184]  kunit_try_run_case+0x170/0x3f0
[   15.255229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.255296]  kthread+0x328/0x630
[   15.255562]  ret_from_fork+0x10/0x20
[   15.255635] 
[   15.255656] Allocated by task 158:
[   15.255696]  kasan_save_stack+0x3c/0x68
[   15.255736]  kasan_save_track+0x20/0x40
[   15.255773]  kasan_save_alloc_info+0x40/0x58
[   15.255810]  __kasan_krealloc+0x118/0x178
[   15.255846]  krealloc_noprof+0x128/0x360
[   15.255881]  krealloc_less_oob_helper+0x168/0xc50
[   15.255919]  krealloc_less_oob+0x20/0x38
[   15.256178]  kunit_try_run_case+0x170/0x3f0
[   15.256256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.256398]  kthread+0x328/0x630
[   15.256500]  ret_from_fork+0x10/0x20
[   15.256535] 
[   15.256554] The buggy address belongs to the object at fff00000c6144600
[   15.256554]  which belongs to the cache kmalloc-256 of size 256
[   15.256870] The buggy address is located 17 bytes to the right of
[   15.256870]  allocated 201-byte region [fff00000c6144600, fff00000c61446c9)
[   15.256996] 
[   15.257055] The buggy address belongs to the physical page:
[   15.257141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106144
[   15.257225] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.257269] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.257538] page_type: f5(slab)
[   15.257636] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.257785] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.257864] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.257948] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.258079] head: 0bfffe0000000001 ffffc1ffc3185101 00000000ffffffff 00000000ffffffff
[   15.258128] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.258392] page dumped because: kasan: bad access detected
[   15.258492] 
[   15.258589] Memory state around the buggy address:
[   15.258722]  fff00000c6144580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.258796]  fff00000c6144600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.258874] >fff00000c6144680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.258910]                                                     ^
[   15.259208]  fff00000c6144700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.259499]  fff00000c6144780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.259643] ==================================================================
[   15.301937] ==================================================================
[   15.301996] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.302043] Write of size 1 at addr fff00000c77560ea by task kunit_try_catch/162
[   15.302089] 
[   15.302116] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.302375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.302702] Hardware name: linux,dummy-virt (DT)
[   15.302782] Call trace:
[   15.302811]  show_stack+0x20/0x38 (C)
[   15.302861]  dump_stack_lvl+0x8c/0xd0
[   15.302908]  print_report+0x118/0x5d0
[   15.302979]  kasan_report+0xdc/0x128
[   15.303153]  __asan_report_store1_noabort+0x20/0x30
[   15.303337]  krealloc_less_oob_helper+0xae4/0xc50
[   15.303431]  krealloc_large_less_oob+0x20/0x38
[   15.303553]  kunit_try_run_case+0x170/0x3f0
[   15.303624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.303686]  kthread+0x328/0x630
[   15.303746]  ret_from_fork+0x10/0x20
[   15.304007] 
[   15.304085] The buggy address belongs to the physical page:
[   15.304154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.304253] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.304356] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.304458] page_type: f8(unknown)
[   15.304566] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.304674] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.304730] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.304821] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.304903] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.304951] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.305007] page dumped because: kasan: bad access detected
[   15.305038] 
[   15.305055] Memory state around the buggy address:
[   15.305084]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.305254]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.305318] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.305365]                                                           ^
[   15.305402]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.305442]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.305480] ==================================================================
[   15.265998] ==================================================================
[   15.266043] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.266105] Write of size 1 at addr fff00000c61446eb by task kunit_try_catch/158
[   15.266154] 
[   15.266186] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.266262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.266474] Hardware name: linux,dummy-virt (DT)
[   15.266576] Call trace:
[   15.266698]  show_stack+0x20/0x38 (C)
[   15.266747]  dump_stack_lvl+0x8c/0xd0
[   15.266792]  print_report+0x118/0x5d0
[   15.266836]  kasan_report+0xdc/0x128
[   15.266908]  __asan_report_store1_noabort+0x20/0x30
[   15.267064]  krealloc_less_oob_helper+0xa58/0xc50
[   15.267114]  krealloc_less_oob+0x20/0x38
[   15.267294]  kunit_try_run_case+0x170/0x3f0
[   15.267415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.267485]  kthread+0x328/0x630
[   15.267527]  ret_from_fork+0x10/0x20
[   15.267572] 
[   15.267590] Allocated by task 158:
[   15.267653]  kasan_save_stack+0x3c/0x68
[   15.267784]  kasan_save_track+0x20/0x40
[   15.267895]  kasan_save_alloc_info+0x40/0x58
[   15.267956]  __kasan_krealloc+0x118/0x178
[   15.267992]  krealloc_noprof+0x128/0x360
[   15.268049]  krealloc_less_oob_helper+0x168/0xc50
[   15.268088]  krealloc_less_oob+0x20/0x38
[   15.268122]  kunit_try_run_case+0x170/0x3f0
[   15.268158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.268199]  kthread+0x328/0x630
[   15.268230]  ret_from_fork+0x10/0x20
[   15.268263] 
[   15.268281] The buggy address belongs to the object at fff00000c6144600
[   15.268281]  which belongs to the cache kmalloc-256 of size 256
[   15.268337] The buggy address is located 34 bytes to the right of
[   15.268337]  allocated 201-byte region [fff00000c6144600, fff00000c61446c9)
[   15.268592] 
[   15.268612] The buggy address belongs to the physical page:
[   15.268642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106144
[   15.268721] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.268796] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.268879] page_type: f5(slab)
[   15.268943] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.268992] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.269040] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.269086] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.269133] head: 0bfffe0000000001 ffffc1ffc3185101 00000000ffffffff 00000000ffffffff
[   15.269192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.269231] page dumped because: kasan: bad access detected
[   15.269275] 
[   15.269294] Memory state around the buggy address:
[   15.269323]  fff00000c6144580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.269365]  fff00000c6144600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.269414] >fff00000c6144680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.269465]                                                           ^
[   15.269502]  fff00000c6144700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.269562]  fff00000c6144780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.269612] ==================================================================
[   15.243089] ==================================================================
[   15.243143] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.243192] Write of size 1 at addr fff00000c61446c9 by task kunit_try_catch/158
[   15.243240] 
[   15.243270] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.243347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.243373] Hardware name: linux,dummy-virt (DT)
[   15.243428] Call trace:
[   15.243452]  show_stack+0x20/0x38 (C)
[   15.243498]  dump_stack_lvl+0x8c/0xd0
[   15.243542]  print_report+0x118/0x5d0
[   15.243587]  kasan_report+0xdc/0x128
[   15.243631]  __asan_report_store1_noabort+0x20/0x30
[   15.243694]  krealloc_less_oob_helper+0xa48/0xc50
[   15.243980]  krealloc_less_oob+0x20/0x38
[   15.244082]  kunit_try_run_case+0x170/0x3f0
[   15.244159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.244237]  kthread+0x328/0x630
[   15.244313]  ret_from_fork+0x10/0x20
[   15.244360] 
[   15.244384] Allocated by task 158:
[   15.244411]  kasan_save_stack+0x3c/0x68
[   15.244451]  kasan_save_track+0x20/0x40
[   15.244487]  kasan_save_alloc_info+0x40/0x58
[   15.244525]  __kasan_krealloc+0x118/0x178
[   15.244587]  krealloc_noprof+0x128/0x360
[   15.244626]  krealloc_less_oob_helper+0x168/0xc50
[   15.244674]  krealloc_less_oob+0x20/0x38
[   15.244709]  kunit_try_run_case+0x170/0x3f0
[   15.244971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.245053]  kthread+0x328/0x630
[   15.245124]  ret_from_fork+0x10/0x20
[   15.245158] 
[   15.245246] The buggy address belongs to the object at fff00000c6144600
[   15.245246]  which belongs to the cache kmalloc-256 of size 256
[   15.245390] The buggy address is located 0 bytes to the right of
[   15.245390]  allocated 201-byte region [fff00000c6144600, fff00000c61446c9)
[   15.245496] 
[   15.245576] The buggy address belongs to the physical page:
[   15.245636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106144
[   15.245734] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.245804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.245952] page_type: f5(slab)
[   15.246027] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.246075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.246419] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.246555] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.246661] head: 0bfffe0000000001 ffffc1ffc3185101 00000000ffffffff 00000000ffffffff
[   15.246831] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.246871] page dumped because: kasan: bad access detected
[   15.246913] 
[   15.247199] Memory state around the buggy address:
[   15.247288]  fff00000c6144580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.247372]  fff00000c6144600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.247491] >fff00000c6144680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.247583]                                               ^
[   15.247758]  fff00000c6144700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.247827]  fff00000c6144780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.247895] ==================================================================
[   15.298529] ==================================================================
[   15.298631] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.298696] Write of size 1 at addr fff00000c77560da by task kunit_try_catch/162
[   15.298897] 
[   15.298958] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.299184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.299210] Hardware name: linux,dummy-virt (DT)
[   15.299239] Call trace:
[   15.299259]  show_stack+0x20/0x38 (C)
[   15.299366]  dump_stack_lvl+0x8c/0xd0
[   15.299459]  print_report+0x118/0x5d0
[   15.299553]  kasan_report+0xdc/0x128
[   15.299619]  __asan_report_store1_noabort+0x20/0x30
[   15.299680]  krealloc_less_oob_helper+0xa80/0xc50
[   15.299743]  krealloc_large_less_oob+0x20/0x38
[   15.300070]  kunit_try_run_case+0x170/0x3f0
[   15.300159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.300220]  kthread+0x328/0x630
[   15.300260]  ret_from_fork+0x10/0x20
[   15.300400] 
[   15.300497] The buggy address belongs to the physical page:
[   15.300559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   15.300733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.300811] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.300880] page_type: f8(unknown)
[   15.300916] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.300963] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.301017] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.301073] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.301120] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   15.301166] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.301212] page dumped because: kasan: bad access detected
[   15.301246] 
[   15.301264] Memory state around the buggy address:
[   15.301292]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.301332]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.301381] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.301419]                                                     ^
[   15.301460]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.301511]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.301547] ==================================================================
[   15.249135] ==================================================================
[   15.249220] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.249367] Write of size 1 at addr fff00000c61446d0 by task kunit_try_catch/158
[   15.249514] 
[   15.249646] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.249739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.249767] Hardware name: linux,dummy-virt (DT)
[   15.249878] Call trace:
[   15.250080]  show_stack+0x20/0x38 (C)
[   15.250151]  dump_stack_lvl+0x8c/0xd0
[   15.250197]  print_report+0x118/0x5d0
[   15.250243]  kasan_report+0xdc/0x128
[   15.250315]  __asan_report_store1_noabort+0x20/0x30
[   15.250381]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.250447]  krealloc_less_oob+0x20/0x38
[   15.250514]  kunit_try_run_case+0x170/0x3f0
[   15.250560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.250628]  kthread+0x328/0x630
[   15.250699]  ret_from_fork+0x10/0x20
[   15.250774] 
[   15.250793] Allocated by task 158:
[   15.250820]  kasan_save_stack+0x3c/0x68
[   15.250890]  kasan_save_track+0x20/0x40
[   15.250927]  kasan_save_alloc_info+0x40/0x58
[   15.250965]  __kasan_krealloc+0x118/0x178
[   15.251030]  krealloc_noprof+0x128/0x360
[   15.251191]  krealloc_less_oob_helper+0x168/0xc50
[   15.251383]  krealloc_less_oob+0x20/0x38
[   15.251424]  kunit_try_run_case+0x170/0x3f0
[   15.251460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.251502]  kthread+0x328/0x630
[   15.251555]  ret_from_fork+0x10/0x20
[   15.251590] 
[   15.251609] The buggy address belongs to the object at fff00000c6144600
[   15.251609]  which belongs to the cache kmalloc-256 of size 256
[   15.251676] The buggy address is located 7 bytes to the right of
[   15.251676]  allocated 201-byte region [fff00000c6144600, fff00000c61446c9)
[   15.251889] 
[   15.251949] The buggy address belongs to the physical page:
[   15.252093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106144
[   15.252219] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.252333] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.252478] page_type: f5(slab)
[   15.252554] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.252645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.252757] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.252866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.252921] head: 0bfffe0000000001 ffffc1ffc3185101 00000000ffffffff 00000000ffffffff
[   15.252968] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.253247] page dumped because: kasan: bad access detected
[   15.253314] 
[   15.253354] Memory state around the buggy address:
[   15.253446]  fff00000c6144580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253494]  fff00000c6144600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.253541] >fff00000c6144680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.253631]                                                  ^
[   15.253741]  fff00000c6144700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253798]  fff00000c6144780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253834] ==================================================================
[   15.260206] ==================================================================
[   15.260372] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.260442] Write of size 1 at addr fff00000c61446ea by task kunit_try_catch/158
[   15.260508] 
[   15.260565] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.260643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.260681] Hardware name: linux,dummy-virt (DT)
[   15.260710] Call trace:
[   15.260746]  show_stack+0x20/0x38 (C)
[   15.260793]  dump_stack_lvl+0x8c/0xd0
[   15.260943]  print_report+0x118/0x5d0
[   15.261088]  kasan_report+0xdc/0x128
[   15.261145]  __asan_report_store1_noabort+0x20/0x30
[   15.261232]  krealloc_less_oob_helper+0xae4/0xc50
[   15.261296]  krealloc_less_oob+0x20/0x38
[   15.261340]  kunit_try_run_case+0x170/0x3f0
[   15.261385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.261436]  kthread+0x328/0x630
[   15.261476]  ret_from_fork+0x10/0x20
[   15.261583] 
[   15.261619] Allocated by task 158:
[   15.263685]  kasan_save_stack+0x3c/0x68
[   15.263734]  kasan_save_track+0x20/0x40
[   15.263771]  kasan_save_alloc_info+0x40/0x58
[   15.263809]  __kasan_krealloc+0x118/0x178
[   15.263845]  krealloc_noprof+0x128/0x360
[   15.263880]  krealloc_less_oob_helper+0x168/0xc50
[   15.263917]  krealloc_less_oob+0x20/0x38
[   15.263952]  kunit_try_run_case+0x170/0x3f0
[   15.263988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.264029]  kthread+0x328/0x630
[   15.264059]  ret_from_fork+0x10/0x20
[   15.264093] 
[   15.264112] The buggy address belongs to the object at fff00000c6144600
[   15.264112]  which belongs to the cache kmalloc-256 of size 256
[   15.264167] The buggy address is located 33 bytes to the right of
[   15.264167]  allocated 201-byte region [fff00000c6144600, fff00000c61446c9)
[   15.264229] 
[   15.264248] The buggy address belongs to the physical page:
[   15.264279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106144
[   15.264328] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.264374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.264428] page_type: f5(slab)
[   15.264464] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.264512] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.264559] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.264605] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.264652] head: 0bfffe0000000001 ffffc1ffc3185101 00000000ffffffff 00000000ffffffff
[   15.264804] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.264846] page dumped because: kasan: bad access detected
[   15.264875] 
[   15.264892] Memory state around the buggy address:
[   15.264921]  fff00000c6144580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.264981]  fff00000c6144600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.265024] >fff00000c6144680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.265060]                                                           ^
[   15.265097]  fff00000c6144700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265328]  fff00000c6144780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265441] ==================================================================

[   12.168532] ==================================================================
[   12.168835] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.169086] Write of size 1 at addr ffff888102b760ea by task kunit_try_catch/179
[   12.169309] 
[   12.169410] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.169449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.169459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.169526] Call Trace:
[   12.169541]  <TASK>
[   12.169554]  dump_stack_lvl+0x73/0xb0
[   12.169581]  print_report+0xd1/0x610
[   12.169601]  ? __virt_addr_valid+0x1db/0x2d0
[   12.169621]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.169643]  ? kasan_addr_to_slab+0x11/0xa0
[   12.169662]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.169684]  kasan_report+0x141/0x180
[   12.169704]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.169731]  __asan_report_store1_noabort+0x1b/0x30
[   12.169754]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.169778]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.169800]  ? finish_task_switch.isra.0+0x153/0x700
[   12.169820]  ? __switch_to+0x47/0xf50
[   12.169843]  ? __schedule+0x10cc/0x2b60
[   12.169863]  ? __pfx_read_tsc+0x10/0x10
[   12.169886]  krealloc_large_less_oob+0x1c/0x30
[   12.169919]  kunit_try_run_case+0x1a5/0x480
[   12.169942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.169962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.169984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.170006]  ? __kthread_parkme+0x82/0x180
[   12.170026]  ? preempt_count_sub+0x50/0x80
[   12.170049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.170072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.170106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.170129]  kthread+0x337/0x6f0
[   12.170147]  ? trace_preempt_on+0x20/0xc0
[   12.170169]  ? __pfx_kthread+0x10/0x10
[   12.170188]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.170209]  ? calculate_sigpending+0x7b/0xa0
[   12.170231]  ? __pfx_kthread+0x10/0x10
[   12.170251]  ret_from_fork+0x116/0x1d0
[   12.170269]  ? __pfx_kthread+0x10/0x10
[   12.170288]  ret_from_fork_asm+0x1a/0x30
[   12.170317]  </TASK>
[   12.170327] 
[   12.178941] The buggy address belongs to the physical page:
[   12.179218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b74
[   12.179614] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.179963] flags: 0x200000000000040(head|node=0|zone=2)
[   12.180209] page_type: f8(unknown)
[   12.180431] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.180774] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.181092] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.181465] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.181834] head: 0200000000000002 ffffea00040add01 00000000ffffffff 00000000ffffffff
[   12.182136] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.182645] page dumped because: kasan: bad access detected
[   12.183010] 
[   12.183108] Memory state around the buggy address:
[   12.183268]  ffff888102b75f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.183485]  ffff888102b76000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.183700] >ffff888102b76080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.183919]                                                           ^
[   12.184173]  ffff888102b76100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.184787]  ffff888102b76180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.185109] ==================================================================
[   12.025824] ==================================================================
[   12.026168] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.026698] Write of size 1 at addr ffff888102b916eb by task kunit_try_catch/175
[   12.026973] 
[   12.027060] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.027100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.027111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.027130] Call Trace:
[   12.027145]  <TASK>
[   12.027159]  dump_stack_lvl+0x73/0xb0
[   12.027185]  print_report+0xd1/0x610
[   12.027205]  ? __virt_addr_valid+0x1db/0x2d0
[   12.027225]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.027247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.027267]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.027290]  kasan_report+0x141/0x180
[   12.027310]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.027337]  __asan_report_store1_noabort+0x1b/0x30
[   12.027360]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.027384]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.027470]  ? finish_task_switch.isra.0+0x153/0x700
[   12.027490]  ? __switch_to+0x47/0xf50
[   12.027514]  ? __schedule+0x10cc/0x2b60
[   12.027535]  ? __pfx_read_tsc+0x10/0x10
[   12.027557]  krealloc_less_oob+0x1c/0x30
[   12.027577]  kunit_try_run_case+0x1a5/0x480
[   12.027600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.027621]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.027643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.027665]  ? __kthread_parkme+0x82/0x180
[   12.027697]  ? preempt_count_sub+0x50/0x80
[   12.027719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.027741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.027763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.027784]  kthread+0x337/0x6f0
[   12.027802]  ? trace_preempt_on+0x20/0xc0
[   12.027823]  ? __pfx_kthread+0x10/0x10
[   12.027842]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.027862]  ? calculate_sigpending+0x7b/0xa0
[   12.027884]  ? __pfx_kthread+0x10/0x10
[   12.027904]  ret_from_fork+0x116/0x1d0
[   12.027933]  ? __pfx_kthread+0x10/0x10
[   12.027952]  ret_from_fork_asm+0x1a/0x30
[   12.027980]  </TASK>
[   12.027989] 
[   12.035584] Allocated by task 175:
[   12.035763]  kasan_save_stack+0x45/0x70
[   12.035971]  kasan_save_track+0x18/0x40
[   12.036337]  kasan_save_alloc_info+0x3b/0x50
[   12.036551]  __kasan_krealloc+0x190/0x1f0
[   12.036758]  krealloc_noprof+0xf3/0x340
[   12.036967]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.037174]  krealloc_less_oob+0x1c/0x30
[   12.037312]  kunit_try_run_case+0x1a5/0x480
[   12.037801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.038025]  kthread+0x337/0x6f0
[   12.038203]  ret_from_fork+0x116/0x1d0
[   12.038454]  ret_from_fork_asm+0x1a/0x30
[   12.038641] 
[   12.038757] The buggy address belongs to the object at ffff888102b91600
[   12.038757]  which belongs to the cache kmalloc-256 of size 256
[   12.039191] The buggy address is located 34 bytes to the right of
[   12.039191]  allocated 201-byte region [ffff888102b91600, ffff888102b916c9)
[   12.039687] 
[   12.039973] The buggy address belongs to the physical page:
[   12.040424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b90
[   12.040702] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.041052] flags: 0x200000000000040(head|node=0|zone=2)
[   12.041231] page_type: f5(slab)
[   12.041373] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.041767] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.042105] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.042479] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.042714] head: 0200000000000001 ffffea00040ae401 00000000ffffffff 00000000ffffffff
[   12.042972] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.043313] page dumped because: kasan: bad access detected
[   12.043584] 
[   12.043675] Memory state around the buggy address:
[   12.044234]  ffff888102b91580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.044728]  ffff888102b91600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.045027] >ffff888102b91680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.045284]                                                           ^
[   12.045600]  ffff888102b91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.046018]  ffff888102b91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.046318] ==================================================================
[   12.151516] ==================================================================
[   12.151816] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.152310] Write of size 1 at addr ffff888102b760da by task kunit_try_catch/179
[   12.152609] 
[   12.152695] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.152736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.152746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.152765] Call Trace:
[   12.152777]  <TASK>
[   12.152790]  dump_stack_lvl+0x73/0xb0
[   12.152815]  print_report+0xd1/0x610
[   12.152835]  ? __virt_addr_valid+0x1db/0x2d0
[   12.152857]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.152878]  ? kasan_addr_to_slab+0x11/0xa0
[   12.152897]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.152932]  kasan_report+0x141/0x180
[   12.152952]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.152979]  __asan_report_store1_noabort+0x1b/0x30
[   12.153001]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.153025]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.153048]  ? finish_task_switch.isra.0+0x153/0x700
[   12.153068]  ? __switch_to+0x47/0xf50
[   12.153091]  ? __schedule+0x10cc/0x2b60
[   12.153111]  ? __pfx_read_tsc+0x10/0x10
[   12.153134]  krealloc_large_less_oob+0x1c/0x30
[   12.153156]  kunit_try_run_case+0x1a5/0x480
[   12.153179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.153200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.153221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.153243]  ? __kthread_parkme+0x82/0x180
[   12.153261]  ? preempt_count_sub+0x50/0x80
[   12.153282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.153305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.153326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.153348]  kthread+0x337/0x6f0
[   12.153366]  ? trace_preempt_on+0x20/0xc0
[   12.153387]  ? __pfx_kthread+0x10/0x10
[   12.153406]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.153425]  ? calculate_sigpending+0x7b/0xa0
[   12.153447]  ? __pfx_kthread+0x10/0x10
[   12.153467]  ret_from_fork+0x116/0x1d0
[   12.153484]  ? __pfx_kthread+0x10/0x10
[   12.153503]  ret_from_fork_asm+0x1a/0x30
[   12.153532]  </TASK>
[   12.153540] 
[   12.161485] The buggy address belongs to the physical page:
[   12.161737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b74
[   12.162099] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.162757] flags: 0x200000000000040(head|node=0|zone=2)
[   12.162964] page_type: f8(unknown)
[   12.163097] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.163340] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.163755] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.164069] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.164444] head: 0200000000000002 ffffea00040add01 00000000ffffffff 00000000ffffffff
[   12.164770] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.165061] page dumped because: kasan: bad access detected
[   12.165289] 
[   12.165449] Memory state around the buggy address:
[   12.165657]  ffff888102b75f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.165955]  ffff888102b76000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.166248] >ffff888102b76080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.166640]                                                     ^
[   12.167308]  ffff888102b76100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.167822]  ffff888102b76180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.168108] ==================================================================
[   12.004736] ==================================================================
[   12.005064] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.005499] Write of size 1 at addr ffff888102b916ea by task kunit_try_catch/175
[   12.005782] 
[   12.005893] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.005946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.005957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.005978] Call Trace:
[   12.005990]  <TASK>
[   12.006003]  dump_stack_lvl+0x73/0xb0
[   12.006029]  print_report+0xd1/0x610
[   12.006050]  ? __virt_addr_valid+0x1db/0x2d0
[   12.006070]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.006093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.006113]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.006135]  kasan_report+0x141/0x180
[   12.006156]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.006182]  __asan_report_store1_noabort+0x1b/0x30
[   12.006205]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.006229]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.006252]  ? finish_task_switch.isra.0+0x153/0x700
[   12.006272]  ? __switch_to+0x47/0xf50
[   12.006297]  ? __schedule+0x10cc/0x2b60
[   12.006317]  ? __pfx_read_tsc+0x10/0x10
[   12.006340]  krealloc_less_oob+0x1c/0x30
[   12.006360]  kunit_try_run_case+0x1a5/0x480
[   12.006382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.006403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.006425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.006448]  ? __kthread_parkme+0x82/0x180
[   12.006466]  ? preempt_count_sub+0x50/0x80
[   12.006487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.006512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.006535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.006557]  kthread+0x337/0x6f0
[   12.006576]  ? trace_preempt_on+0x20/0xc0
[   12.006597]  ? __pfx_kthread+0x10/0x10
[   12.006616]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.006638]  ? calculate_sigpending+0x7b/0xa0
[   12.006661]  ? __pfx_kthread+0x10/0x10
[   12.006684]  ret_from_fork+0x116/0x1d0
[   12.006702]  ? __pfx_kthread+0x10/0x10
[   12.006721]  ret_from_fork_asm+0x1a/0x30
[   12.006750]  </TASK>
[   12.006759] 
[   12.015158] Allocated by task 175:
[   12.015316]  kasan_save_stack+0x45/0x70
[   12.015513]  kasan_save_track+0x18/0x40
[   12.015649]  kasan_save_alloc_info+0x3b/0x50
[   12.015798]  __kasan_krealloc+0x190/0x1f0
[   12.015961]  krealloc_noprof+0xf3/0x340
[   12.016151]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.016404]  krealloc_less_oob+0x1c/0x30
[   12.016651]  kunit_try_run_case+0x1a5/0x480
[   12.016994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.017170]  kthread+0x337/0x6f0
[   12.017288]  ret_from_fork+0x116/0x1d0
[   12.017698]  ret_from_fork_asm+0x1a/0x30
[   12.017920] 
[   12.018014] The buggy address belongs to the object at ffff888102b91600
[   12.018014]  which belongs to the cache kmalloc-256 of size 256
[   12.018631] The buggy address is located 33 bytes to the right of
[   12.018631]  allocated 201-byte region [ffff888102b91600, ffff888102b916c9)
[   12.019226] 
[   12.019324] The buggy address belongs to the physical page:
[   12.019643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b90
[   12.019969] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.020194] flags: 0x200000000000040(head|node=0|zone=2)
[   12.020365] page_type: f5(slab)
[   12.020519] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.020963] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.021296] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.021602] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.021830] head: 0200000000000001 ffffea00040ae401 00000000ffffffff 00000000ffffffff
[   12.022647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.022986] page dumped because: kasan: bad access detected
[   12.023228] 
[   12.023319] Memory state around the buggy address:
[   12.023504]  ffff888102b91580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.023902]  ffff888102b91600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.024207] >ffff888102b91680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.024544]                                                           ^
[   12.024814]  ffff888102b91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.025124]  ffff888102b91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.025468] ==================================================================
[   12.128482] ==================================================================
[   12.129182] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.129626] Write of size 1 at addr ffff888102b760d0 by task kunit_try_catch/179
[   12.129970] 
[   12.130358] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.130503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.130517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.130536] Call Trace:
[   12.130548]  <TASK>
[   12.130561]  dump_stack_lvl+0x73/0xb0
[   12.130591]  print_report+0xd1/0x610
[   12.130612]  ? __virt_addr_valid+0x1db/0x2d0
[   12.130641]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.130664]  ? kasan_addr_to_slab+0x11/0xa0
[   12.130683]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.130707]  kasan_report+0x141/0x180
[   12.130728]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.130755]  __asan_report_store1_noabort+0x1b/0x30
[   12.130778]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.130803]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.130825]  ? finish_task_switch.isra.0+0x153/0x700
[   12.130846]  ? __switch_to+0x47/0xf50
[   12.130870]  ? __schedule+0x10cc/0x2b60
[   12.130891]  ? __pfx_read_tsc+0x10/0x10
[   12.130923]  krealloc_large_less_oob+0x1c/0x30
[   12.130945]  kunit_try_run_case+0x1a5/0x480
[   12.130969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.130990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.131012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.131034]  ? __kthread_parkme+0x82/0x180
[   12.131053]  ? preempt_count_sub+0x50/0x80
[   12.131082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.131105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.131126]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.131148]  kthread+0x337/0x6f0
[   12.131167]  ? trace_preempt_on+0x20/0xc0
[   12.131188]  ? __pfx_kthread+0x10/0x10
[   12.131207]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.131227]  ? calculate_sigpending+0x7b/0xa0
[   12.131250]  ? __pfx_kthread+0x10/0x10
[   12.131270]  ret_from_fork+0x116/0x1d0
[   12.131287]  ? __pfx_kthread+0x10/0x10
[   12.131307]  ret_from_fork_asm+0x1a/0x30
[   12.131337]  </TASK>
[   12.131348] 
[   12.143064] The buggy address belongs to the physical page:
[   12.143562] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b74
[   12.144173] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.145005] flags: 0x200000000000040(head|node=0|zone=2)
[   12.145305] page_type: f8(unknown)
[   12.145785] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.146438] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.146861] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.147457] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.147883] head: 0200000000000002 ffffea00040add01 00000000ffffffff 00000000ffffffff
[   12.148163] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.148517] page dumped because: kasan: bad access detected
[   12.148723] 
[   12.148820] Memory state around the buggy address:
[   12.149064]  ffff888102b75f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.149313]  ffff888102b76000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.149616] >ffff888102b76080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.150031]                                                  ^
[   12.150270]  ffff888102b76100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.150792]  ffff888102b76180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.151177] ==================================================================
[   12.101868] ==================================================================
[   12.102453] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.103502] Write of size 1 at addr ffff888102b760c9 by task kunit_try_catch/179
[   12.104523] 
[   12.104855] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.105004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.105017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.105039] Call Trace:
[   12.105052]  <TASK>
[   12.105067]  dump_stack_lvl+0x73/0xb0
[   12.105098]  print_report+0xd1/0x610
[   12.105119]  ? __virt_addr_valid+0x1db/0x2d0
[   12.105141]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.105163]  ? kasan_addr_to_slab+0x11/0xa0
[   12.105183]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.105205]  kasan_report+0x141/0x180
[   12.105226]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.105252]  __asan_report_store1_noabort+0x1b/0x30
[   12.105275]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.105299]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.105322]  ? finish_task_switch.isra.0+0x153/0x700
[   12.105342]  ? __switch_to+0x47/0xf50
[   12.105366]  ? __schedule+0x10cc/0x2b60
[   12.105387]  ? __pfx_read_tsc+0x10/0x10
[   12.105410]  krealloc_large_less_oob+0x1c/0x30
[   12.105431]  kunit_try_run_case+0x1a5/0x480
[   12.105454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.105475]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.105497]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.105518]  ? __kthread_parkme+0x82/0x180
[   12.105537]  ? preempt_count_sub+0x50/0x80
[   12.105559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.105581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.105602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.105624]  kthread+0x337/0x6f0
[   12.105642]  ? trace_preempt_on+0x20/0xc0
[   12.105663]  ? __pfx_kthread+0x10/0x10
[   12.105684]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.105703]  ? calculate_sigpending+0x7b/0xa0
[   12.105725]  ? __pfx_kthread+0x10/0x10
[   12.105746]  ret_from_fork+0x116/0x1d0
[   12.105763]  ? __pfx_kthread+0x10/0x10
[   12.105783]  ret_from_fork_asm+0x1a/0x30
[   12.105812]  </TASK>
[   12.105822] 
[   12.117903] The buggy address belongs to the physical page:
[   12.118177] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b74
[   12.118965] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.119526] flags: 0x200000000000040(head|node=0|zone=2)
[   12.120068] page_type: f8(unknown)
[   12.120246] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.121051] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.121842] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.122180] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.122822] head: 0200000000000002 ffffea00040add01 00000000ffffffff 00000000ffffffff
[   12.123228] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.123739] page dumped because: kasan: bad access detected
[   12.123990] 
[   12.124079] Memory state around the buggy address:
[   12.124285]  ffff888102b75f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.125139]  ffff888102b76000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.125498] >ffff888102b76080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.126143]                                               ^
[   12.126665]  ffff888102b76100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.127320]  ffff888102b76180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.127959] ==================================================================
[   11.984036] ==================================================================
[   11.984335] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.984830] Write of size 1 at addr ffff888102b916da by task kunit_try_catch/175
[   11.985135] 
[   11.985226] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.985265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.985275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.985294] Call Trace:
[   11.985307]  <TASK>
[   11.985319]  dump_stack_lvl+0x73/0xb0
[   11.985346]  print_report+0xd1/0x610
[   11.985436]  ? __virt_addr_valid+0x1db/0x2d0
[   11.985457]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.985480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.985500]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.985523]  kasan_report+0x141/0x180
[   11.985543]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.985570]  __asan_report_store1_noabort+0x1b/0x30
[   11.985593]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.985617]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.985639]  ? finish_task_switch.isra.0+0x153/0x700
[   11.985659]  ? __switch_to+0x47/0xf50
[   11.985682]  ? __schedule+0x10cc/0x2b60
[   11.985703]  ? __pfx_read_tsc+0x10/0x10
[   11.985725]  krealloc_less_oob+0x1c/0x30
[   11.985745]  kunit_try_run_case+0x1a5/0x480
[   11.985768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.985790]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.985812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.985833]  ? __kthread_parkme+0x82/0x180
[   11.985852]  ? preempt_count_sub+0x50/0x80
[   11.985873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.985896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.985929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.985951]  kthread+0x337/0x6f0
[   11.985970]  ? trace_preempt_on+0x20/0xc0
[   11.985991]  ? __pfx_kthread+0x10/0x10
[   11.986010]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.986030]  ? calculate_sigpending+0x7b/0xa0
[   11.986051]  ? __pfx_kthread+0x10/0x10
[   11.986072]  ret_from_fork+0x116/0x1d0
[   11.986089]  ? __pfx_kthread+0x10/0x10
[   11.986109]  ret_from_fork_asm+0x1a/0x30
[   11.986137]  </TASK>
[   11.986147] 
[   11.993826] Allocated by task 175:
[   11.993965]  kasan_save_stack+0x45/0x70
[   11.994102]  kasan_save_track+0x18/0x40
[   11.994396]  kasan_save_alloc_info+0x3b/0x50
[   11.994609]  __kasan_krealloc+0x190/0x1f0
[   11.994801]  krealloc_noprof+0xf3/0x340
[   11.995007]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.995439]  krealloc_less_oob+0x1c/0x30
[   11.995606]  kunit_try_run_case+0x1a5/0x480
[   11.995805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.995988]  kthread+0x337/0x6f0
[   11.996104]  ret_from_fork+0x116/0x1d0
[   11.996232]  ret_from_fork_asm+0x1a/0x30
[   11.996365] 
[   11.996434] The buggy address belongs to the object at ffff888102b91600
[   11.996434]  which belongs to the cache kmalloc-256 of size 256
[   11.996798] The buggy address is located 17 bytes to the right of
[   11.996798]  allocated 201-byte region [ffff888102b91600, ffff888102b916c9)
[   11.997343] 
[   11.997434] The buggy address belongs to the physical page:
[   11.997683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b90
[   11.998275] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.998746] flags: 0x200000000000040(head|node=0|zone=2)
[   11.998935] page_type: f5(slab)
[   11.999051] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.999277] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.999611] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.000111] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.000550] head: 0200000000000001 ffffea00040ae401 00000000ffffffff 00000000ffffffff
[   12.001070] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.001705] page dumped because: kasan: bad access detected
[   12.001929] 
[   12.002021] Memory state around the buggy address:
[   12.002197]  ffff888102b91580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.002662]  ffff888102b91600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.003023] >ffff888102b91680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.003241]                                                     ^
[   12.003689]  ffff888102b91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.004026]  ffff888102b91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.004309] ==================================================================
[   12.185469] ==================================================================
[   12.185786] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.186036] Write of size 1 at addr ffff888102b760eb by task kunit_try_catch/179
[   12.186261] 
[   12.186341] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.186381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.186391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.186410] Call Trace:
[   12.186423]  <TASK>
[   12.186436]  dump_stack_lvl+0x73/0xb0
[   12.186606]  print_report+0xd1/0x610
[   12.186627]  ? __virt_addr_valid+0x1db/0x2d0
[   12.186648]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.186672]  ? kasan_addr_to_slab+0x11/0xa0
[   12.186692]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.186733]  kasan_report+0x141/0x180
[   12.186754]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.186781]  __asan_report_store1_noabort+0x1b/0x30
[   12.186805]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.186830]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.186853]  ? finish_task_switch.isra.0+0x153/0x700
[   12.186874]  ? __switch_to+0x47/0xf50
[   12.186899]  ? __schedule+0x10cc/0x2b60
[   12.186934]  ? __pfx_read_tsc+0x10/0x10
[   12.186957]  krealloc_large_less_oob+0x1c/0x30
[   12.186979]  kunit_try_run_case+0x1a5/0x480
[   12.187002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.187024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.187046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.187073]  ? __kthread_parkme+0x82/0x180
[   12.187092]  ? preempt_count_sub+0x50/0x80
[   12.187114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.187137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.187159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.187181]  kthread+0x337/0x6f0
[   12.187201]  ? trace_preempt_on+0x20/0xc0
[   12.187223]  ? __pfx_kthread+0x10/0x10
[   12.187242]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.187262]  ? calculate_sigpending+0x7b/0xa0
[   12.187284]  ? __pfx_kthread+0x10/0x10
[   12.187304]  ret_from_fork+0x116/0x1d0
[   12.187320]  ? __pfx_kthread+0x10/0x10
[   12.187339]  ret_from_fork_asm+0x1a/0x30
[   12.187431]  </TASK>
[   12.187440] 
[   12.196065] The buggy address belongs to the physical page:
[   12.196295] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b74
[   12.196673] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.196939] flags: 0x200000000000040(head|node=0|zone=2)
[   12.197193] page_type: f8(unknown)
[   12.197363] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.197695] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.197936] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.198276] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.198612] head: 0200000000000002 ffffea00040add01 00000000ffffffff 00000000ffffffff
[   12.199029] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.199444] page dumped because: kasan: bad access detected
[   12.199624] 
[   12.199711] Memory state around the buggy address:
[   12.199952]  ffff888102b75f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.200239]  ffff888102b76000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.200599] >ffff888102b76080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.200896]                                                           ^
[   12.201170]  ffff888102b76100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.201471]  ffff888102b76180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.201832] ==================================================================
[   11.921224] ==================================================================
[   11.921856] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.922254] Write of size 1 at addr ffff888102b916c9 by task kunit_try_catch/175
[   11.922719] 
[   11.922941] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.922989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.923000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.923030] Call Trace:
[   11.923042]  <TASK>
[   11.923061]  dump_stack_lvl+0x73/0xb0
[   11.923104]  print_report+0xd1/0x610
[   11.923126]  ? __virt_addr_valid+0x1db/0x2d0
[   11.923147]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.923169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.923189]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.923212]  kasan_report+0x141/0x180
[   11.923232]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.923259]  __asan_report_store1_noabort+0x1b/0x30
[   11.923281]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.923305]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.923337]  ? finish_task_switch.isra.0+0x153/0x700
[   11.923357]  ? __switch_to+0x47/0xf50
[   11.923381]  ? __schedule+0x10cc/0x2b60
[   11.923478]  ? __pfx_read_tsc+0x10/0x10
[   11.923503]  krealloc_less_oob+0x1c/0x30
[   11.923524]  kunit_try_run_case+0x1a5/0x480
[   11.923546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.923579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.923601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.923623]  ? __kthread_parkme+0x82/0x180
[   11.923653]  ? preempt_count_sub+0x50/0x80
[   11.923675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.923707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.923729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.923751]  kthread+0x337/0x6f0
[   11.923769]  ? trace_preempt_on+0x20/0xc0
[   11.923790]  ? __pfx_kthread+0x10/0x10
[   11.923810]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.923829]  ? calculate_sigpending+0x7b/0xa0
[   11.923851]  ? __pfx_kthread+0x10/0x10
[   11.923871]  ret_from_fork+0x116/0x1d0
[   11.923888]  ? __pfx_kthread+0x10/0x10
[   11.923917]  ret_from_fork_asm+0x1a/0x30
[   11.923946]  </TASK>
[   11.923956] 
[   11.939591] Allocated by task 175:
[   11.940111]  kasan_save_stack+0x45/0x70
[   11.940261]  kasan_save_track+0x18/0x40
[   11.940700]  kasan_save_alloc_info+0x3b/0x50
[   11.941268]  __kasan_krealloc+0x190/0x1f0
[   11.941784]  krealloc_noprof+0xf3/0x340
[   11.942309]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.942992]  krealloc_less_oob+0x1c/0x30
[   11.943297]  kunit_try_run_case+0x1a5/0x480
[   11.943645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.944148]  kthread+0x337/0x6f0
[   11.944278]  ret_from_fork+0x116/0x1d0
[   11.944592]  ret_from_fork_asm+0x1a/0x30
[   11.945022] 
[   11.945207] The buggy address belongs to the object at ffff888102b91600
[   11.945207]  which belongs to the cache kmalloc-256 of size 256
[   11.946258] The buggy address is located 0 bytes to the right of
[   11.946258]  allocated 201-byte region [ffff888102b91600, ffff888102b916c9)
[   11.947502] 
[   11.947783] The buggy address belongs to the physical page:
[   11.948201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b90
[   11.948733] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.949559] flags: 0x200000000000040(head|node=0|zone=2)
[   11.949776] page_type: f5(slab)
[   11.950292] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.951060] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.951301] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.951998] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.952859] head: 0200000000000001 ffffea00040ae401 00000000ffffffff 00000000ffffffff
[   11.953702] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.954146] page dumped because: kasan: bad access detected
[   11.954322] 
[   11.954393] Memory state around the buggy address:
[   11.955066]  ffff888102b91580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.955760]  ffff888102b91600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.956475] >ffff888102b91680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.957153]                                               ^
[   11.957333]  ffff888102b91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.957549]  ffff888102b91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.958080] ==================================================================
[   11.959170] ==================================================================
[   11.960282] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.961347] Write of size 1 at addr ffff888102b916d0 by task kunit_try_catch/175
[   11.961949] 
[   11.962038] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.962080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.962091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.962110] Call Trace:
[   11.962121]  <TASK>
[   11.962135]  dump_stack_lvl+0x73/0xb0
[   11.962163]  print_report+0xd1/0x610
[   11.962183]  ? __virt_addr_valid+0x1db/0x2d0
[   11.962204]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.962226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.962246]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.962269]  kasan_report+0x141/0x180
[   11.962289]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.962316]  __asan_report_store1_noabort+0x1b/0x30
[   11.962338]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.962517]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.962541]  ? finish_task_switch.isra.0+0x153/0x700
[   11.962562]  ? __switch_to+0x47/0xf50
[   11.962586]  ? __schedule+0x10cc/0x2b60
[   11.962607]  ? __pfx_read_tsc+0x10/0x10
[   11.962630]  krealloc_less_oob+0x1c/0x30
[   11.962650]  kunit_try_run_case+0x1a5/0x480
[   11.962672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.962705]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.962726]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.962748]  ? __kthread_parkme+0x82/0x180
[   11.962767]  ? preempt_count_sub+0x50/0x80
[   11.962788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.962810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.962832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.962853]  kthread+0x337/0x6f0
[   11.962872]  ? trace_preempt_on+0x20/0xc0
[   11.962893]  ? __pfx_kthread+0x10/0x10
[   11.962927]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.962947]  ? calculate_sigpending+0x7b/0xa0
[   11.962970]  ? __pfx_kthread+0x10/0x10
[   11.962990]  ret_from_fork+0x116/0x1d0
[   11.963007]  ? __pfx_kthread+0x10/0x10
[   11.963026]  ret_from_fork_asm+0x1a/0x30
[   11.963059]  </TASK>
[   11.963069] 
[   11.973312] Allocated by task 175:
[   11.973537]  kasan_save_stack+0x45/0x70
[   11.973697]  kasan_save_track+0x18/0x40
[   11.973889]  kasan_save_alloc_info+0x3b/0x50
[   11.974119]  __kasan_krealloc+0x190/0x1f0
[   11.974278]  krealloc_noprof+0xf3/0x340
[   11.974607]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.974937]  krealloc_less_oob+0x1c/0x30
[   11.975086]  kunit_try_run_case+0x1a5/0x480
[   11.975228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.975398]  kthread+0x337/0x6f0
[   11.975519]  ret_from_fork+0x116/0x1d0
[   11.975689]  ret_from_fork_asm+0x1a/0x30
[   11.975878] 
[   11.976008] The buggy address belongs to the object at ffff888102b91600
[   11.976008]  which belongs to the cache kmalloc-256 of size 256
[   11.976521] The buggy address is located 7 bytes to the right of
[   11.976521]  allocated 201-byte region [ffff888102b91600, ffff888102b916c9)
[   11.976969] 
[   11.977038] The buggy address belongs to the physical page:
[   11.977334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b90
[   11.977828] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.978179] flags: 0x200000000000040(head|node=0|zone=2)
[   11.978569] page_type: f5(slab)
[   11.978758] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.979050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.979418] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.979761] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.980090] head: 0200000000000001 ffffea00040ae401 00000000ffffffff 00000000ffffffff
[   11.980408] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.980774] page dumped because: kasan: bad access detected
[   11.980960] 
[   11.981029] Memory state around the buggy address:
[   11.981182]  ffff888102b91580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.981424]  ffff888102b91600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.981824] >ffff888102b91680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.982193]                                                  ^
[   11.982453]  ffff888102b91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.982923]  ffff888102b91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.983229] ==================================================================