Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.800838] ==================================================================
[   15.800886] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.800932] Write of size 1 at addr fff00000c66b60d0 by task kunit_try_catch/163
[   15.801150] 
[   15.801336] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.801427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.801453] Hardware name: linux,dummy-virt (DT)
[   15.801489] Call trace:
[   15.801607]  show_stack+0x20/0x38 (C)
[   15.801682]  dump_stack_lvl+0x8c/0xd0
[   15.801737]  print_report+0x118/0x5d0
[   15.802024]  kasan_report+0xdc/0x128
[   15.802112]  __asan_report_store1_noabort+0x20/0x30
[   15.802165]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.802314]  krealloc_large_less_oob+0x20/0x38
[   15.802382]  kunit_try_run_case+0x170/0x3f0
[   15.802437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.802544]  kthread+0x328/0x630
[   15.802599]  ret_from_fork+0x10/0x20
[   15.802647] 
[   15.802685] The buggy address belongs to the physical page:
[   15.802724] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b4
[   15.803021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.803097] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.803238] page_type: f8(unknown)
[   15.803286] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.803351] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.803461] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.803517] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.803573] head: 0bfffe0000000002 ffffc1ffc319ad01 00000000ffffffff 00000000ffffffff
[   15.803639] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.803679] page dumped because: kasan: bad access detected
[   15.803878] 
[   15.803905] Memory state around the buggy address:
[   15.803949]  fff00000c66b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.804001]  fff00000c66b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.804521] >fff00000c66b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.804577]                                                  ^
[   15.804631]  fff00000c66b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.804966]  fff00000c66b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.805042] ==================================================================
[   15.759656] ==================================================================
[   15.759893] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.760033] Write of size 1 at addr fff00000c171e0eb by task kunit_try_catch/159
[   15.760097] 
[   15.760134] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.760297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.760335] Hardware name: linux,dummy-virt (DT)
[   15.760402] Call trace:
[   15.760551]  show_stack+0x20/0x38 (C)
[   15.760782]  dump_stack_lvl+0x8c/0xd0
[   15.760852]  print_report+0x118/0x5d0
[   15.761012]  kasan_report+0xdc/0x128
[   15.761090]  __asan_report_store1_noabort+0x20/0x30
[   15.761220]  krealloc_less_oob_helper+0xa58/0xc50
[   15.761306]  krealloc_less_oob+0x20/0x38
[   15.761358]  kunit_try_run_case+0x170/0x3f0
[   15.761650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.761749]  kthread+0x328/0x630
[   15.762165]  ret_from_fork+0x10/0x20
[   15.762352] 
[   15.762372] Allocated by task 159:
[   15.762400]  kasan_save_stack+0x3c/0x68
[   15.762769]  kasan_save_track+0x20/0x40
[   15.762883]  kasan_save_alloc_info+0x40/0x58
[   15.762951]  __kasan_krealloc+0x118/0x178
[   15.763060]  krealloc_noprof+0x128/0x360
[   15.763140]  krealloc_less_oob_helper+0x168/0xc50
[   15.763215]  krealloc_less_oob+0x20/0x38
[   15.763330]  kunit_try_run_case+0x170/0x3f0
[   15.763370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.763544]  kthread+0x328/0x630
[   15.763778]  ret_from_fork+0x10/0x20
[   15.763894] 
[   15.763942] The buggy address belongs to the object at fff00000c171e000
[   15.763942]  which belongs to the cache kmalloc-256 of size 256
[   15.764078] The buggy address is located 34 bytes to the right of
[   15.764078]  allocated 201-byte region [fff00000c171e000, fff00000c171e0c9)
[   15.764160] 
[   15.764248] The buggy address belongs to the physical page:
[   15.764568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171e
[   15.764662] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.764796] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.764899] page_type: f5(slab)
[   15.765026] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.765094] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.765276] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.765345] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.765747] head: 0bfffe0000000001 ffffc1ffc305c781 00000000ffffffff 00000000ffffffff
[   15.765844] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.765959] page dumped because: kasan: bad access detected
[   15.766064] 
[   15.766095] Memory state around the buggy address:
[   15.766251]  fff00000c171df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.766329]  fff00000c171e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.766371] >fff00000c171e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.766408]                                                           ^
[   15.766452]  fff00000c171e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.766493]  fff00000c171e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.766531] ==================================================================
[   15.727597] ==================================================================
[   15.727658] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.727736] Write of size 1 at addr fff00000c171e0c9 by task kunit_try_catch/159
[   15.728000] 
[   15.728174] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.728336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.728479] Hardware name: linux,dummy-virt (DT)
[   15.728538] Call trace:
[   15.728577]  show_stack+0x20/0x38 (C)
[   15.728721]  dump_stack_lvl+0x8c/0xd0
[   15.728817]  print_report+0x118/0x5d0
[   15.728871]  kasan_report+0xdc/0x128
[   15.728916]  __asan_report_store1_noabort+0x20/0x30
[   15.728966]  krealloc_less_oob_helper+0xa48/0xc50
[   15.729179]  krealloc_less_oob+0x20/0x38
[   15.729515]  kunit_try_run_case+0x170/0x3f0
[   15.729612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.729686]  kthread+0x328/0x630
[   15.729857]  ret_from_fork+0x10/0x20
[   15.729925] 
[   15.729944] Allocated by task 159:
[   15.730146]  kasan_save_stack+0x3c/0x68
[   15.730437]  kasan_save_track+0x20/0x40
[   15.730478]  kasan_save_alloc_info+0x40/0x58
[   15.730863]  __kasan_krealloc+0x118/0x178
[   15.730928]  krealloc_noprof+0x128/0x360
[   15.731046]  krealloc_less_oob_helper+0x168/0xc50
[   15.731104]  krealloc_less_oob+0x20/0x38
[   15.731173]  kunit_try_run_case+0x170/0x3f0
[   15.731255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.731378]  kthread+0x328/0x630
[   15.731409]  ret_from_fork+0x10/0x20
[   15.731476] 
[   15.731781] The buggy address belongs to the object at fff00000c171e000
[   15.731781]  which belongs to the cache kmalloc-256 of size 256
[   15.731883] The buggy address is located 0 bytes to the right of
[   15.731883]  allocated 201-byte region [fff00000c171e000, fff00000c171e0c9)
[   15.732072] 
[   15.732130] The buggy address belongs to the physical page:
[   15.732174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171e
[   15.732361] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.732410] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.732473] page_type: f5(slab)
[   15.732517] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.732842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.733028] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.733099] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.733174] head: 0bfffe0000000001 ffffc1ffc305c781 00000000ffffffff 00000000ffffffff
[   15.733350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.733424] page dumped because: kasan: bad access detected
[   15.733462] 
[   15.733479] Memory state around the buggy address:
[   15.733646]  fff00000c171df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.733692]  fff00000c171e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.733733] >fff00000c171e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.733778]                                               ^
[   15.733814]  fff00000c171e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.733855]  fff00000c171e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.733893] ==================================================================
[   15.742544] ==================================================================
[   15.742627] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.742812] Write of size 1 at addr fff00000c171e0da by task kunit_try_catch/159
[   15.742899] 
[   15.742955] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.743175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.743230] Hardware name: linux,dummy-virt (DT)
[   15.743374] Call trace:
[   15.743438]  show_stack+0x20/0x38 (C)
[   15.743490]  dump_stack_lvl+0x8c/0xd0
[   15.743538]  print_report+0x118/0x5d0
[   15.743583]  kasan_report+0xdc/0x128
[   15.743765]  __asan_report_store1_noabort+0x20/0x30
[   15.743952]  krealloc_less_oob_helper+0xa80/0xc50
[   15.744065]  krealloc_less_oob+0x20/0x38
[   15.744119]  kunit_try_run_case+0x170/0x3f0
[   15.744264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.744320]  kthread+0x328/0x630
[   15.744496]  ret_from_fork+0x10/0x20
[   15.744703] 
[   15.744786] Allocated by task 159:
[   15.744857]  kasan_save_stack+0x3c/0x68
[   15.745164]  kasan_save_track+0x20/0x40
[   15.745244]  kasan_save_alloc_info+0x40/0x58
[   15.745373]  __kasan_krealloc+0x118/0x178
[   15.745446]  krealloc_noprof+0x128/0x360
[   15.745725]  krealloc_less_oob_helper+0x168/0xc50
[   15.746004]  krealloc_less_oob+0x20/0x38
[   15.746125]  kunit_try_run_case+0x170/0x3f0
[   15.746183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.746262]  kthread+0x328/0x630
[   15.746538]  ret_from_fork+0x10/0x20
[   15.746653] 
[   15.746726] The buggy address belongs to the object at fff00000c171e000
[   15.746726]  which belongs to the cache kmalloc-256 of size 256
[   15.746787] The buggy address is located 17 bytes to the right of
[   15.746787]  allocated 201-byte region [fff00000c171e000, fff00000c171e0c9)
[   15.747092] 
[   15.747144] The buggy address belongs to the physical page:
[   15.747240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171e
[   15.747318] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.747380] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.747454] page_type: f5(slab)
[   15.747843] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.747909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.747959] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.748016] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.748064] head: 0bfffe0000000001 ffffc1ffc305c781 00000000ffffffff 00000000ffffffff
[   15.748122] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.748162] page dumped because: kasan: bad access detected
[   15.748608] 
[   15.748665] Memory state around the buggy address:
[   15.748746]  fff00000c171df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.748808]  fff00000c171e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.748874] >fff00000c171e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.749045]                                                     ^
[   15.749089]  fff00000c171e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.749277]  fff00000c171e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.749371] ==================================================================
[   15.794377] ==================================================================
[   15.794757] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.795015] Write of size 1 at addr fff00000c66b60c9 by task kunit_try_catch/163
[   15.795380] 
[   15.795430] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.795512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.795538] Hardware name: linux,dummy-virt (DT)
[   15.795625] Call trace:
[   15.795648]  show_stack+0x20/0x38 (C)
[   15.795698]  dump_stack_lvl+0x8c/0xd0
[   15.795745]  print_report+0x118/0x5d0
[   15.796158]  kasan_report+0xdc/0x128
[   15.796274]  __asan_report_store1_noabort+0x20/0x30
[   15.796433]  krealloc_less_oob_helper+0xa48/0xc50
[   15.796512]  krealloc_large_less_oob+0x20/0x38
[   15.796700]  kunit_try_run_case+0x170/0x3f0
[   15.796900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.797029]  kthread+0x328/0x630
[   15.797106]  ret_from_fork+0x10/0x20
[   15.797189] 
[   15.797319] The buggy address belongs to the physical page:
[   15.797368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b4
[   15.797445] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.797576] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.797659] page_type: f8(unknown)
[   15.797721] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.797771] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.798094] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.798256] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.798333] head: 0bfffe0000000002 ffffc1ffc319ad01 00000000ffffffff 00000000ffffffff
[   15.798463] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.798545] page dumped because: kasan: bad access detected
[   15.798700] 
[   15.798964] Memory state around the buggy address:
[   15.799035]  fff00000c66b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.799169]  fff00000c66b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.799280] >fff00000c66b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.799420]                                               ^
[   15.799491]  fff00000c66b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.799583]  fff00000c66b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.799728] ==================================================================
[   15.735575] ==================================================================
[   15.735841] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.736119] Write of size 1 at addr fff00000c171e0d0 by task kunit_try_catch/159
[   15.736177] 
[   15.736220] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.736409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.736456] Hardware name: linux,dummy-virt (DT)
[   15.736553] Call trace:
[   15.736593]  show_stack+0x20/0x38 (C)
[   15.736703]  dump_stack_lvl+0x8c/0xd0
[   15.736840]  print_report+0x118/0x5d0
[   15.736887]  kasan_report+0xdc/0x128
[   15.737216]  __asan_report_store1_noabort+0x20/0x30
[   15.737284]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.737386]  krealloc_less_oob+0x20/0x38
[   15.737432]  kunit_try_run_case+0x170/0x3f0
[   15.737478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.737528]  kthread+0x328/0x630
[   15.737577]  ret_from_fork+0x10/0x20
[   15.737643] 
[   15.737660] Allocated by task 159:
[   15.737718]  kasan_save_stack+0x3c/0x68
[   15.737759]  kasan_save_track+0x20/0x40
[   15.737794]  kasan_save_alloc_info+0x40/0x58
[   15.737832]  __kasan_krealloc+0x118/0x178
[   15.737868]  krealloc_noprof+0x128/0x360
[   15.737905]  krealloc_less_oob_helper+0x168/0xc50
[   15.737943]  krealloc_less_oob+0x20/0x38
[   15.737979]  kunit_try_run_case+0x170/0x3f0
[   15.738016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.738058]  kthread+0x328/0x630
[   15.738098]  ret_from_fork+0x10/0x20
[   15.738142] 
[   15.738160] The buggy address belongs to the object at fff00000c171e000
[   15.738160]  which belongs to the cache kmalloc-256 of size 256
[   15.738469] The buggy address is located 7 bytes to the right of
[   15.738469]  allocated 201-byte region [fff00000c171e000, fff00000c171e0c9)
[   15.738744] 
[   15.738788] The buggy address belongs to the physical page:
[   15.738820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171e
[   15.739019] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.739093] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.739475] page_type: f5(slab)
[   15.739553] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.739659] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.739726] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.739792] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.740142] head: 0bfffe0000000001 ffffc1ffc305c781 00000000ffffffff 00000000ffffffff
[   15.740220] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.740338] page dumped because: kasan: bad access detected
[   15.740370] 
[   15.740387] Memory state around the buggy address:
[   15.740696]  fff00000c171df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.740772]  fff00000c171e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.740825] >fff00000c171e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.740909]                                                  ^
[   15.740978]  fff00000c171e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.741020]  fff00000c171e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.741237] ==================================================================
[   15.805408] ==================================================================
[   15.805452] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.805497] Write of size 1 at addr fff00000c66b60da by task kunit_try_catch/163
[   15.805544] 
[   15.805573] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.805899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.806315] Hardware name: linux,dummy-virt (DT)
[   15.806357] Call trace:
[   15.806378]  show_stack+0x20/0x38 (C)
[   15.806427]  dump_stack_lvl+0x8c/0xd0
[   15.806474]  print_report+0x118/0x5d0
[   15.806519]  kasan_report+0xdc/0x128
[   15.806563]  __asan_report_store1_noabort+0x20/0x30
[   15.806613]  krealloc_less_oob_helper+0xa80/0xc50
[   15.806661]  krealloc_large_less_oob+0x20/0x38
[   15.806734]  kunit_try_run_case+0x170/0x3f0
[   15.806796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.806847]  kthread+0x328/0x630
[   15.806896]  ret_from_fork+0x10/0x20
[   15.806947] 
[   15.806966] The buggy address belongs to the physical page:
[   15.806995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b4
[   15.807046] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.807104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.807154] page_type: f8(unknown)
[   15.807190] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.807883] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.807935] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.808273] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.808571] head: 0bfffe0000000002 ffffc1ffc319ad01 00000000ffffffff 00000000ffffffff
[   15.808651] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.808749] page dumped because: kasan: bad access detected
[   15.808799] 
[   15.808816] Memory state around the buggy address:
[   15.808849]  fff00000c66b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.808891]  fff00000c66b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.809131] >fff00000c66b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.809258]                                                     ^
[   15.809391]  fff00000c66b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.809457]  fff00000c66b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.809514] ==================================================================
[   15.815482] ==================================================================
[   15.815572] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.815622] Write of size 1 at addr fff00000c66b60eb by task kunit_try_catch/163
[   15.815892] 
[   15.815946] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.816027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.816053] Hardware name: linux,dummy-virt (DT)
[   15.816083] Call trace:
[   15.816103]  show_stack+0x20/0x38 (C)
[   15.816312]  dump_stack_lvl+0x8c/0xd0
[   15.816734]  print_report+0x118/0x5d0
[   15.816854]  kasan_report+0xdc/0x128
[   15.816913]  __asan_report_store1_noabort+0x20/0x30
[   15.816963]  krealloc_less_oob_helper+0xa58/0xc50
[   15.817011]  krealloc_large_less_oob+0x20/0x38
[   15.817065]  kunit_try_run_case+0x170/0x3f0
[   15.817112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.817187]  kthread+0x328/0x630
[   15.817238]  ret_from_fork+0x10/0x20
[   15.817299] 
[   15.817334] The buggy address belongs to the physical page:
[   15.817371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b4
[   15.817424] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.817469] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.817520] page_type: f8(unknown)
[   15.817557] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.817616] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.817681] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.817738] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.817803] head: 0bfffe0000000002 ffffc1ffc319ad01 00000000ffffffff 00000000ffffffff
[   15.817861] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.817930] page dumped because: kasan: bad access detected
[   15.817960] 
[   15.817977] Memory state around the buggy address:
[   15.818006]  fff00000c66b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.818047]  fff00000c66b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.818090] >fff00000c66b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.818135]                                                           ^
[   15.818182]  fff00000c66b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.818238]  fff00000c66b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.818276] ==================================================================
[   15.810699] ==================================================================
[   15.810750] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.810806] Write of size 1 at addr fff00000c66b60ea by task kunit_try_catch/163
[   15.810954] 
[   15.811010] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.811091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.811363] Hardware name: linux,dummy-virt (DT)
[   15.811430] Call trace:
[   15.811462]  show_stack+0x20/0x38 (C)
[   15.811566]  dump_stack_lvl+0x8c/0xd0
[   15.811620]  print_report+0x118/0x5d0
[   15.811666]  kasan_report+0xdc/0x128
[   15.811910]  __asan_report_store1_noabort+0x20/0x30
[   15.811990]  krealloc_less_oob_helper+0xae4/0xc50
[   15.812117]  krealloc_large_less_oob+0x20/0x38
[   15.812171]  kunit_try_run_case+0x170/0x3f0
[   15.812237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.812582]  kthread+0x328/0x630
[   15.812681]  ret_from_fork+0x10/0x20
[   15.812772] 
[   15.812798] The buggy address belongs to the physical page:
[   15.812843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b4
[   15.812937] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.813005] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.813059] page_type: f8(unknown)
[   15.813362] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.813485] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.813580] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.813647] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.813942] head: 0bfffe0000000002 ffffc1ffc319ad01 00000000ffffffff 00000000ffffffff
[   15.814066] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.814136] page dumped because: kasan: bad access detected
[   15.814194] 
[   15.814317] Memory state around the buggy address:
[   15.814351]  fff00000c66b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.814645]  fff00000c66b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.814782] >fff00000c66b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.814839]                                                           ^
[   15.814886]  fff00000c66b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.814984]  fff00000c66b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.815041] ==================================================================
[   15.750412] ==================================================================
[   15.750466] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.750746] Write of size 1 at addr fff00000c171e0ea by task kunit_try_catch/159
[   15.750856] 
[   15.750891] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.750970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.751210] Hardware name: linux,dummy-virt (DT)
[   15.751352] Call trace:
[   15.751385]  show_stack+0x20/0x38 (C)
[   15.751479]  dump_stack_lvl+0x8c/0xd0
[   15.751530]  print_report+0x118/0x5d0
[   15.751576]  kasan_report+0xdc/0x128
[   15.751620]  __asan_report_store1_noabort+0x20/0x30
[   15.751798]  krealloc_less_oob_helper+0xae4/0xc50
[   15.751868]  krealloc_less_oob+0x20/0x38
[   15.751912]  kunit_try_run_case+0x170/0x3f0
[   15.751957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.752008]  kthread+0x328/0x630
[   15.752048]  ret_from_fork+0x10/0x20
[   15.752094] 
[   15.752111] Allocated by task 159:
[   15.752509]  kasan_save_stack+0x3c/0x68
[   15.752661]  kasan_save_track+0x20/0x40
[   15.752716]  kasan_save_alloc_info+0x40/0x58
[   15.752832]  __kasan_krealloc+0x118/0x178
[   15.752898]  krealloc_noprof+0x128/0x360
[   15.752965]  krealloc_less_oob_helper+0x168/0xc50
[   15.753247]  krealloc_less_oob+0x20/0x38
[   15.753322]  kunit_try_run_case+0x170/0x3f0
[   15.753420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.753500]  kthread+0x328/0x630
[   15.753559]  ret_from_fork+0x10/0x20
[   15.753682] 
[   15.753731] The buggy address belongs to the object at fff00000c171e000
[   15.753731]  which belongs to the cache kmalloc-256 of size 256
[   15.753797] The buggy address is located 33 bytes to the right of
[   15.753797]  allocated 201-byte region [fff00000c171e000, fff00000c171e0c9)
[   15.753864] 
[   15.753883] The buggy address belongs to the physical page:
[   15.753912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171e
[   15.754262] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.754337] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.754425] page_type: f5(slab)
[   15.754484] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.754624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.754932] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.755009] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.755867] head: 0bfffe0000000001 ffffc1ffc305c781 00000000ffffffff 00000000ffffffff
[   15.756528] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.757167] page dumped because: kasan: bad access detected
[   15.757243] 
[   15.757279] Memory state around the buggy address:
[   15.757613]  fff00000c171df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.757674]  fff00000c171e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.757822] >fff00000c171e080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.757878]                                                           ^
[   15.757916]  fff00000c171e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.758194]  fff00000c171e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.758598] ==================================================================

[   16.620931] ==================================================================
[   16.621046] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.621123] Write of size 1 at addr fff00000c78360d0 by task kunit_try_catch/163
[   16.621176] 
[   16.621217] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.621544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.621583] Hardware name: linux,dummy-virt (DT)
[   16.621642] Call trace:
[   16.621664]  show_stack+0x20/0x38 (C)
[   16.621740]  dump_stack_lvl+0x8c/0xd0
[   16.621805]  print_report+0x118/0x5d0
[   16.621887]  kasan_report+0xdc/0x128
[   16.621958]  __asan_report_store1_noabort+0x20/0x30
[   16.622017]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.622091]  krealloc_large_less_oob+0x20/0x38
[   16.622140]  kunit_try_run_case+0x170/0x3f0
[   16.622233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.622286]  kthread+0x328/0x630
[   16.622413]  ret_from_fork+0x10/0x20
[   16.622467] 
[   16.622487] The buggy address belongs to the physical page:
[   16.622518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   16.622590] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.622939] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.623008] page_type: f8(unknown)
[   16.623076] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.623127] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.623196] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.623278] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.623365] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff
[   16.623592] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.623685] page dumped because: kasan: bad access detected
[   16.623794] 
[   16.623821] Memory state around the buggy address:
[   16.623852]  fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.623892]  fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.623955] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.623993]                                                  ^
[   16.624028]  fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.624072]  fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.624109] ==================================================================
[   16.625019] ==================================================================
[   16.625081] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.625387] Write of size 1 at addr fff00000c78360da by task kunit_try_catch/163
[   16.625454] 
[   16.625484] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.625563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.625600] Hardware name: linux,dummy-virt (DT)
[   16.625630] Call trace:
[   16.625650]  show_stack+0x20/0x38 (C)
[   16.625699]  dump_stack_lvl+0x8c/0xd0
[   16.625745]  print_report+0x118/0x5d0
[   16.625789]  kasan_report+0xdc/0x128
[   16.625849]  __asan_report_store1_noabort+0x20/0x30
[   16.625900]  krealloc_less_oob_helper+0xa80/0xc50
[   16.625948]  krealloc_large_less_oob+0x20/0x38
[   16.625999]  kunit_try_run_case+0x170/0x3f0
[   16.626045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.626096]  kthread+0x328/0x630
[   16.626136]  ret_from_fork+0x10/0x20
[   16.626192] 
[   16.626211] The buggy address belongs to the physical page:
[   16.626244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   16.626296] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.626342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.626392] page_type: f8(unknown)
[   16.626429] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.626478] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.626543] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.626601] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.626652] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff
[   16.626700] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.626739] page dumped because: kasan: bad access detected
[   16.626769] 
[   16.626786] Memory state around the buggy address:
[   16.626820]  fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.626863]  fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.626910] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.626947]                                                     ^
[   16.626982]  fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.627031]  fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.627068] ==================================================================
[   16.566768] ==================================================================
[   16.566821] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.566870] Write of size 1 at addr fff00000c4518ec9 by task kunit_try_catch/159
[   16.566920] 
[   16.567076] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.567302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.567369] Hardware name: linux,dummy-virt (DT)
[   16.567436] Call trace:
[   16.567564]  show_stack+0x20/0x38 (C)
[   16.567708]  dump_stack_lvl+0x8c/0xd0
[   16.567844]  print_report+0x118/0x5d0
[   16.567891]  kasan_report+0xdc/0x128
[   16.567935]  __asan_report_store1_noabort+0x20/0x30
[   16.568170]  krealloc_less_oob_helper+0xa48/0xc50
[   16.568244]  krealloc_less_oob+0x20/0x38
[   16.568370]  kunit_try_run_case+0x170/0x3f0
[   16.568482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.568622]  kthread+0x328/0x630
[   16.568706]  ret_from_fork+0x10/0x20
[   16.568813] 
[   16.568832] Allocated by task 159:
[   16.568863]  kasan_save_stack+0x3c/0x68
[   16.568936]  kasan_save_track+0x20/0x40
[   16.569281]  kasan_save_alloc_info+0x40/0x58
[   16.569397]  __kasan_krealloc+0x118/0x178
[   16.569491]  krealloc_noprof+0x128/0x360
[   16.569529]  krealloc_less_oob_helper+0x168/0xc50
[   16.569823]  krealloc_less_oob+0x20/0x38
[   16.569895]  kunit_try_run_case+0x170/0x3f0
[   16.569931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.570258]  kthread+0x328/0x630
[   16.570313]  ret_from_fork+0x10/0x20
[   16.570349] 
[   16.570368] The buggy address belongs to the object at fff00000c4518e00
[   16.570368]  which belongs to the cache kmalloc-256 of size 256
[   16.570436] The buggy address is located 0 bytes to the right of
[   16.570436]  allocated 201-byte region [fff00000c4518e00, fff00000c4518ec9)
[   16.570499] 
[   16.570538] The buggy address belongs to the physical page:
[   16.570569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.570633] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.570689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.570752] page_type: f5(slab)
[   16.570789] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.570865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.570914] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.570962] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.571034] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.571090] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.571145] page dumped because: kasan: bad access detected
[   16.571175] 
[   16.571439] Memory state around the buggy address:
[   16.571600]  fff00000c4518d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.571664]  fff00000c4518e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.571707] >fff00000c4518e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.571746]                                               ^
[   16.571929]  fff00000c4518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572027]  fff00000c4518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572208] ==================================================================
[   16.592140] ==================================================================
[   16.592199] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.592246] Write of size 1 at addr fff00000c4518eeb by task kunit_try_catch/159
[   16.592294] 
[   16.592322] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.592446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.592473] Hardware name: linux,dummy-virt (DT)
[   16.592637] Call trace:
[   16.592663]  show_stack+0x20/0x38 (C)
[   16.592748]  dump_stack_lvl+0x8c/0xd0
[   16.592834]  print_report+0x118/0x5d0
[   16.592908]  kasan_report+0xdc/0x128
[   16.592971]  __asan_report_store1_noabort+0x20/0x30
[   16.593022]  krealloc_less_oob_helper+0xa58/0xc50
[   16.593069]  krealloc_less_oob+0x20/0x38
[   16.593253]  kunit_try_run_case+0x170/0x3f0
[   16.593330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.593394]  kthread+0x328/0x630
[   16.593436]  ret_from_fork+0x10/0x20
[   16.593482] 
[   16.593500] Allocated by task 159:
[   16.593527]  kasan_save_stack+0x3c/0x68
[   16.593566]  kasan_save_track+0x20/0x40
[   16.593602]  kasan_save_alloc_info+0x40/0x58
[   16.593641]  __kasan_krealloc+0x118/0x178
[   16.593677]  krealloc_noprof+0x128/0x360
[   16.593713]  krealloc_less_oob_helper+0x168/0xc50
[   16.593750]  krealloc_less_oob+0x20/0x38
[   16.593785]  kunit_try_run_case+0x170/0x3f0
[   16.593820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.593861]  kthread+0x328/0x630
[   16.593892]  ret_from_fork+0x10/0x20
[   16.593936] 
[   16.593954] The buggy address belongs to the object at fff00000c4518e00
[   16.593954]  which belongs to the cache kmalloc-256 of size 256
[   16.594014] The buggy address is located 34 bytes to the right of
[   16.594014]  allocated 201-byte region [fff00000c4518e00, fff00000c4518ec9)
[   16.594078] 
[   16.594097] The buggy address belongs to the physical page:
[   16.594126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.594509] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.594570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.594669] page_type: f5(slab)
[   16.594786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.594853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.594930] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.594979] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.595034] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.595087] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.595137] page dumped because: kasan: bad access detected
[   16.595167] 
[   16.595195] Memory state around the buggy address:
[   16.595230]  fff00000c4518d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.595273]  fff00000c4518e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.595320] >fff00000c4518e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.595428]                                                           ^
[   16.595489]  fff00000c4518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.595530]  fff00000c4518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.595570] ==================================================================
[   16.632706] ==================================================================
[   16.632771] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.632825] Write of size 1 at addr fff00000c78360eb by task kunit_try_catch/163
[   16.632925] 
[   16.632992] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.633071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.633097] Hardware name: linux,dummy-virt (DT)
[   16.633460] Call trace:
[   16.633556]  show_stack+0x20/0x38 (C)
[   16.633634]  dump_stack_lvl+0x8c/0xd0
[   16.633718]  print_report+0x118/0x5d0
[   16.633789]  kasan_report+0xdc/0x128
[   16.633854]  __asan_report_store1_noabort+0x20/0x30
[   16.633906]  krealloc_less_oob_helper+0xa58/0xc50
[   16.634017]  krealloc_large_less_oob+0x20/0x38
[   16.634101]  kunit_try_run_case+0x170/0x3f0
[   16.634163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.634226]  kthread+0x328/0x630
[   16.634280]  ret_from_fork+0x10/0x20
[   16.634327] 
[   16.634346] The buggy address belongs to the physical page:
[   16.634488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   16.634543] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.634589] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.634788] page_type: f8(unknown)
[   16.634850] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.634901] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.634978] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.635027] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.635246] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff
[   16.635306] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.635508] page dumped because: kasan: bad access detected
[   16.635651] 
[   16.635672] Memory state around the buggy address:
[   16.635705]  fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.635764]  fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.636000] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.636146]                                                           ^
[   16.636245]  fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.636371]  fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.636477] ==================================================================
[   16.580581] ==================================================================
[   16.580628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.580674] Write of size 1 at addr fff00000c4518eda by task kunit_try_catch/159
[   16.580723] 
[   16.580751] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.580829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.580855] Hardware name: linux,dummy-virt (DT)
[   16.580884] Call trace:
[   16.580926]  show_stack+0x20/0x38 (C)
[   16.580975]  dump_stack_lvl+0x8c/0xd0
[   16.581025]  print_report+0x118/0x5d0
[   16.581071]  kasan_report+0xdc/0x128
[   16.581120]  __asan_report_store1_noabort+0x20/0x30
[   16.581170]  krealloc_less_oob_helper+0xa80/0xc50
[   16.581478]  krealloc_less_oob+0x20/0x38
[   16.581664]  kunit_try_run_case+0x170/0x3f0
[   16.581718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.581789]  kthread+0x328/0x630
[   16.581831]  ret_from_fork+0x10/0x20
[   16.581881] 
[   16.581899] Allocated by task 159:
[   16.582151]  kasan_save_stack+0x3c/0x68
[   16.582245]  kasan_save_track+0x20/0x40
[   16.582351]  kasan_save_alloc_info+0x40/0x58
[   16.582437]  __kasan_krealloc+0x118/0x178
[   16.582504]  krealloc_noprof+0x128/0x360
[   16.582560]  krealloc_less_oob_helper+0x168/0xc50
[   16.582637]  krealloc_less_oob+0x20/0x38
[   16.582672]  kunit_try_run_case+0x170/0x3f0
[   16.582708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.582775]  kthread+0x328/0x630
[   16.582809]  ret_from_fork+0x10/0x20
[   16.582863] 
[   16.582911] The buggy address belongs to the object at fff00000c4518e00
[   16.582911]  which belongs to the cache kmalloc-256 of size 256
[   16.583053] The buggy address is located 17 bytes to the right of
[   16.583053]  allocated 201-byte region [fff00000c4518e00, fff00000c4518ec9)
[   16.583153] 
[   16.583172] The buggy address belongs to the physical page:
[   16.583213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.583265] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.583312] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.583477] page_type: f5(slab)
[   16.583555] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.583724] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.583838] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.583998] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.584144] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.584289] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.584427] page dumped because: kasan: bad access detected
[   16.584522] 
[   16.584541] Memory state around the buggy address:
[   16.584572]  fff00000c4518d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.584763]  fff00000c4518e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.584810] >fff00000c4518e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.584848]                                                     ^
[   16.585105]  fff00000c4518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.585246]  fff00000c4518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.585372] ==================================================================
[   16.627121] ==================================================================
[   16.627155] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.627467] Write of size 1 at addr fff00000c78360ea by task kunit_try_catch/163
[   16.627787] 
[   16.627816] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.627970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.628015] Hardware name: linux,dummy-virt (DT)
[   16.628046] Call trace:
[   16.628066]  show_stack+0x20/0x38 (C)
[   16.628152]  dump_stack_lvl+0x8c/0xd0
[   16.628238]  print_report+0x118/0x5d0
[   16.628285]  kasan_report+0xdc/0x128
[   16.628330]  __asan_report_store1_noabort+0x20/0x30
[   16.628380]  krealloc_less_oob_helper+0xae4/0xc50
[   16.628532]  krealloc_large_less_oob+0x20/0x38
[   16.628654]  kunit_try_run_case+0x170/0x3f0
[   16.628809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.628895]  kthread+0x328/0x630
[   16.628963]  ret_from_fork+0x10/0x20
[   16.629085] 
[   16.629142] The buggy address belongs to the physical page:
[   16.629263] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   16.629347] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.629436] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.629517] page_type: f8(unknown)
[   16.629553] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.629603] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.629652] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.629901] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.630069] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff
[   16.630236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.630337] page dumped because: kasan: bad access detected
[   16.630502] 
[   16.630630] Memory state around the buggy address:
[   16.630728]  fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.630848]  fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.630890] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.631339]                                                           ^
[   16.631443]  fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.631488]  fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.631573] ==================================================================
[   16.573910] ==================================================================
[   16.574051] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.574106] Write of size 1 at addr fff00000c4518ed0 by task kunit_try_catch/159
[   16.574161] 
[   16.574230] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.574310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.574336] Hardware name: linux,dummy-virt (DT)
[   16.574374] Call trace:
[   16.574395]  show_stack+0x20/0x38 (C)
[   16.574441]  dump_stack_lvl+0x8c/0xd0
[   16.574486]  print_report+0x118/0x5d0
[   16.574530]  kasan_report+0xdc/0x128
[   16.574862]  __asan_report_store1_noabort+0x20/0x30
[   16.574971]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.575022]  krealloc_less_oob+0x20/0x38
[   16.575067]  kunit_try_run_case+0x170/0x3f0
[   16.575114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.575272]  kthread+0x328/0x630
[   16.575316]  ret_from_fork+0x10/0x20
[   16.575362] 
[   16.575428] Allocated by task 159:
[   16.575536]  kasan_save_stack+0x3c/0x68
[   16.575661]  kasan_save_track+0x20/0x40
[   16.575810]  kasan_save_alloc_info+0x40/0x58
[   16.575902]  __kasan_krealloc+0x118/0x178
[   16.575939]  krealloc_noprof+0x128/0x360
[   16.575975]  krealloc_less_oob_helper+0x168/0xc50
[   16.576012]  krealloc_less_oob+0x20/0x38
[   16.576047]  kunit_try_run_case+0x170/0x3f0
[   16.576083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.576124]  kthread+0x328/0x630
[   16.576154]  ret_from_fork+0x10/0x20
[   16.576197] 
[   16.576215] The buggy address belongs to the object at fff00000c4518e00
[   16.576215]  which belongs to the cache kmalloc-256 of size 256
[   16.576427] The buggy address is located 7 bytes to the right of
[   16.576427]  allocated 201-byte region [fff00000c4518e00, fff00000c4518ec9)
[   16.576583] 
[   16.576686] The buggy address belongs to the physical page:
[   16.576734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.576840] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.576957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.577073] page_type: f5(slab)
[   16.577176] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.577261] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.577353] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.577604] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.577799] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.577920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.578086] page dumped because: kasan: bad access detected
[   16.578224] 
[   16.578325] Memory state around the buggy address:
[   16.578402]  fff00000c4518d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.578544]  fff00000c4518e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.578587] >fff00000c4518e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.578667]                                                  ^
[   16.579025]  fff00000c4518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.579116]  fff00000c4518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.579166] ==================================================================
[   16.585961] ==================================================================
[   16.586029] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.586078] Write of size 1 at addr fff00000c4518eea by task kunit_try_catch/159
[   16.586423] 
[   16.586466] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.586547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.586575] Hardware name: linux,dummy-virt (DT)
[   16.586655] Call trace:
[   16.586693]  show_stack+0x20/0x38 (C)
[   16.586792]  dump_stack_lvl+0x8c/0xd0
[   16.586867]  print_report+0x118/0x5d0
[   16.586932]  kasan_report+0xdc/0x128
[   16.586977]  __asan_report_store1_noabort+0x20/0x30
[   16.587026]  krealloc_less_oob_helper+0xae4/0xc50
[   16.587073]  krealloc_less_oob+0x20/0x38
[   16.587118]  kunit_try_run_case+0x170/0x3f0
[   16.587164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.587227]  kthread+0x328/0x630
[   16.587268]  ret_from_fork+0x10/0x20
[   16.587314] 
[   16.587476] Allocated by task 159:
[   16.587563]  kasan_save_stack+0x3c/0x68
[   16.587618]  kasan_save_track+0x20/0x40
[   16.587654]  kasan_save_alloc_info+0x40/0x58
[   16.587701]  __kasan_krealloc+0x118/0x178
[   16.587737]  krealloc_noprof+0x128/0x360
[   16.588040]  krealloc_less_oob_helper+0x168/0xc50
[   16.588158]  krealloc_less_oob+0x20/0x38
[   16.588302]  kunit_try_run_case+0x170/0x3f0
[   16.588436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.588589]  kthread+0x328/0x630
[   16.588622]  ret_from_fork+0x10/0x20
[   16.588656] 
[   16.588675] The buggy address belongs to the object at fff00000c4518e00
[   16.588675]  which belongs to the cache kmalloc-256 of size 256
[   16.589012] The buggy address is located 33 bytes to the right of
[   16.589012]  allocated 201-byte region [fff00000c4518e00, fff00000c4518ec9)
[   16.589257] 
[   16.589333] The buggy address belongs to the physical page:
[   16.589420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.589565] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.589716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.589855] page_type: f5(slab)
[   16.589891] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.590230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.590375] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.590524] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.590750] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.590836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.591018] page dumped because: kasan: bad access detected
[   16.591086] 
[   16.591103] Memory state around the buggy address:
[   16.591133]  fff00000c4518d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.591221]  fff00000c4518e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.591275] >fff00000c4518e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.591323]                                                           ^
[   16.591362]  fff00000c4518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.591414]  fff00000c4518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.591451] ==================================================================
[   16.616924] ==================================================================
[   16.617045] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.617097] Write of size 1 at addr fff00000c78360c9 by task kunit_try_catch/163
[   16.617146] 
[   16.617192] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.617272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.617441] Hardware name: linux,dummy-virt (DT)
[   16.617474] Call trace:
[   16.617495]  show_stack+0x20/0x38 (C)
[   16.617560]  dump_stack_lvl+0x8c/0xd0
[   16.617675]  print_report+0x118/0x5d0
[   16.617751]  kasan_report+0xdc/0x128
[   16.617815]  __asan_report_store1_noabort+0x20/0x30
[   16.617883]  krealloc_less_oob_helper+0xa48/0xc50
[   16.617958]  krealloc_large_less_oob+0x20/0x38
[   16.618055]  kunit_try_run_case+0x170/0x3f0
[   16.618119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.618171]  kthread+0x328/0x630
[   16.618223]  ret_from_fork+0x10/0x20
[   16.618268] 
[   16.618316] The buggy address belongs to the physical page:
[   16.618353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   16.618427] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.618474] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.618542] page_type: f8(unknown)
[   16.618582] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.618630] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.618833] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.618887] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.618974] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff
[   16.619064] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.619124] page dumped because: kasan: bad access detected
[   16.619172] 
[   16.619229] Memory state around the buggy address:
[   16.619282]  fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.619344]  fff00000c7836000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.619493] >fff00000c7836080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.619611]                                               ^
[   16.619728]  fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.619771]  fff00000c7836180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.619808] ==================================================================

[   12.396063] ==================================================================
[   12.396424] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.397299] Write of size 1 at addr ffff888103a0e0d0 by task kunit_try_catch/179
[   12.397662] 
[   12.397963] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.398014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.398026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.398045] Call Trace:
[   12.398059]  <TASK>
[   12.398075]  dump_stack_lvl+0x73/0xb0
[   12.398103]  print_report+0xd1/0x610
[   12.398126]  ? __virt_addr_valid+0x1db/0x2d0
[   12.398149]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.398173]  ? kasan_addr_to_slab+0x11/0xa0
[   12.398194]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.398219]  kasan_report+0x141/0x180
[   12.398240]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.398270]  __asan_report_store1_noabort+0x1b/0x30
[   12.398295]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.398322]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.398347]  ? finish_task_switch.isra.0+0x153/0x700
[   12.398370]  ? __switch_to+0x47/0xf50
[   12.398396]  ? __schedule+0x10cc/0x2b60
[   12.398434]  ? __pfx_read_tsc+0x10/0x10
[   12.398470]  krealloc_large_less_oob+0x1c/0x30
[   12.398493]  kunit_try_run_case+0x1a5/0x480
[   12.398518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.398541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.398565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.398588]  ? __kthread_parkme+0x82/0x180
[   12.398609]  ? preempt_count_sub+0x50/0x80
[   12.398632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.398656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.398681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.398714]  kthread+0x337/0x6f0
[   12.398733]  ? trace_preempt_on+0x20/0xc0
[   12.398756]  ? __pfx_kthread+0x10/0x10
[   12.398777]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.398798]  ? calculate_sigpending+0x7b/0xa0
[   12.398822]  ? __pfx_kthread+0x10/0x10
[   12.398843]  ret_from_fork+0x116/0x1d0
[   12.398861]  ? __pfx_kthread+0x10/0x10
[   12.398881]  ret_from_fork_asm+0x1a/0x30
[   12.398911]  </TASK>
[   12.398920] 
[   12.410061] The buggy address belongs to the physical page:
[   12.410407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.411010] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.411582] flags: 0x200000000000040(head|node=0|zone=2)
[   12.411932] page_type: f8(unknown)
[   12.412223] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.412735] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.413179] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.413696] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.414183] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.414680] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.415079] page dumped because: kasan: bad access detected
[   12.415422] 
[   12.415566] Memory state around the buggy address:
[   12.415916]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.416248]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.416795] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.417143]                                                  ^
[   12.417483]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.417913]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.418221] ==================================================================
[   12.465013] ==================================================================
[   12.465611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.466062] Write of size 1 at addr ffff888103a0e0eb by task kunit_try_catch/179
[   12.466426] 
[   12.466875] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.466921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.466932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.466951] Call Trace:
[   12.466966]  <TASK>
[   12.466981]  dump_stack_lvl+0x73/0xb0
[   12.467009]  print_report+0xd1/0x610
[   12.467032]  ? __virt_addr_valid+0x1db/0x2d0
[   12.467054]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.467079]  ? kasan_addr_to_slab+0x11/0xa0
[   12.467099]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.467124]  kasan_report+0x141/0x180
[   12.467145]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.467174]  __asan_report_store1_noabort+0x1b/0x30
[   12.467200]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.467226]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.467252]  ? finish_task_switch.isra.0+0x153/0x700
[   12.467275]  ? __switch_to+0x47/0xf50
[   12.467300]  ? __schedule+0x10cc/0x2b60
[   12.467321]  ? __pfx_read_tsc+0x10/0x10
[   12.467345]  krealloc_large_less_oob+0x1c/0x30
[   12.467368]  kunit_try_run_case+0x1a5/0x480
[   12.467392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.467415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.467439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.467475]  ? __kthread_parkme+0x82/0x180
[   12.467496]  ? preempt_count_sub+0x50/0x80
[   12.467518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.467543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.467581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.467608]  kthread+0x337/0x6f0
[   12.467627]  ? trace_preempt_on+0x20/0xc0
[   12.467649]  ? __pfx_kthread+0x10/0x10
[   12.467670]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.467691]  ? calculate_sigpending+0x7b/0xa0
[   12.467715]  ? __pfx_kthread+0x10/0x10
[   12.467737]  ret_from_fork+0x116/0x1d0
[   12.467755]  ? __pfx_kthread+0x10/0x10
[   12.467775]  ret_from_fork_asm+0x1a/0x30
[   12.467806]  </TASK>
[   12.467816] 
[   12.480088] The buggy address belongs to the physical page:
[   12.480553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.481153] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.481717] flags: 0x200000000000040(head|node=0|zone=2)
[   12.482181] page_type: f8(unknown)
[   12.482344] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.482914] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.483304] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.483844] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.484318] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.484643] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.484978] page dumped because: kasan: bad access detected
[   12.485216] 
[   12.485303] Memory state around the buggy address:
[   12.485529]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.485805]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.486119] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.486433]                                                           ^
[   12.487202]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.487673]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.488075] ==================================================================
[   12.184531] ==================================================================
[   12.185027] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.185386] Write of size 1 at addr ffff8881003474c9 by task kunit_try_catch/175
[   12.186033] 
[   12.186136] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.186327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.186341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.186362] Call Trace:
[   12.186376]  <TASK>
[   12.186393]  dump_stack_lvl+0x73/0xb0
[   12.186439]  print_report+0xd1/0x610
[   12.186474]  ? __virt_addr_valid+0x1db/0x2d0
[   12.186497]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.186520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.186544]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.186568]  kasan_report+0x141/0x180
[   12.186589]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.186619]  __asan_report_store1_noabort+0x1b/0x30
[   12.186644]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.186670]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.186695]  ? finish_task_switch.isra.0+0x153/0x700
[   12.186719]  ? __switch_to+0x47/0xf50
[   12.186745]  ? __schedule+0x10cc/0x2b60
[   12.186767]  ? __pfx_read_tsc+0x10/0x10
[   12.186791]  krealloc_less_oob+0x1c/0x30
[   12.186814]  kunit_try_run_case+0x1a5/0x480
[   12.186839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.186862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.186885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.186909]  ? __kthread_parkme+0x82/0x180
[   12.186929]  ? preempt_count_sub+0x50/0x80
[   12.186952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.186976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.187000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.187025]  kthread+0x337/0x6f0
[   12.187044]  ? trace_preempt_on+0x20/0xc0
[   12.187068]  ? __pfx_kthread+0x10/0x10
[   12.187088]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.187109]  ? calculate_sigpending+0x7b/0xa0
[   12.187133]  ? __pfx_kthread+0x10/0x10
[   12.187154]  ret_from_fork+0x116/0x1d0
[   12.187172]  ? __pfx_kthread+0x10/0x10
[   12.187193]  ret_from_fork_asm+0x1a/0x30
[   12.187223]  </TASK>
[   12.187232] 
[   12.196773] Allocated by task 175:
[   12.197060]  kasan_save_stack+0x45/0x70
[   12.197375]  kasan_save_track+0x18/0x40
[   12.197733]  kasan_save_alloc_info+0x3b/0x50
[   12.198101]  __kasan_krealloc+0x190/0x1f0
[   12.198288]  krealloc_noprof+0xf3/0x340
[   12.198441]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.198840]  krealloc_less_oob+0x1c/0x30
[   12.199106]  kunit_try_run_case+0x1a5/0x480
[   12.199466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.199712]  kthread+0x337/0x6f0
[   12.199954]  ret_from_fork+0x116/0x1d0
[   12.200092]  ret_from_fork_asm+0x1a/0x30
[   12.200393] 
[   12.200643] The buggy address belongs to the object at ffff888100347400
[   12.200643]  which belongs to the cache kmalloc-256 of size 256
[   12.201146] The buggy address is located 0 bytes to the right of
[   12.201146]  allocated 201-byte region [ffff888100347400, ffff8881003474c9)
[   12.201927] 
[   12.202008] The buggy address belongs to the physical page:
[   12.202315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.202753] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.203129] flags: 0x200000000000040(head|node=0|zone=2)
[   12.203492] page_type: f5(slab)
[   12.203661] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.203987] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.204307] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.204879] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.205276] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.205698] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.206070] page dumped because: kasan: bad access detected
[   12.206393] 
[   12.206496] Memory state around the buggy address:
[   12.206796]  ffff888100347380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.207050]  ffff888100347400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.207355] >ffff888100347480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.207905]                                               ^
[   12.208221]  ffff888100347500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.208676]  ffff888100347580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.209002] ==================================================================
[   12.261982] ==================================================================
[   12.262307] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.263470] Write of size 1 at addr ffff8881003474ea by task kunit_try_catch/175
[   12.263911] 
[   12.264109] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.264154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.264166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.264186] Call Trace:
[   12.264202]  <TASK>
[   12.264218]  dump_stack_lvl+0x73/0xb0
[   12.264370]  print_report+0xd1/0x610
[   12.264396]  ? __virt_addr_valid+0x1db/0x2d0
[   12.264435]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.264472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.264496]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.264523]  kasan_report+0x141/0x180
[   12.264545]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.264574]  __asan_report_store1_noabort+0x1b/0x30
[   12.264600]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.264626]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.264652]  ? finish_task_switch.isra.0+0x153/0x700
[   12.264675]  ? __switch_to+0x47/0xf50
[   12.264701]  ? __schedule+0x10cc/0x2b60
[   12.264723]  ? __pfx_read_tsc+0x10/0x10
[   12.264747]  krealloc_less_oob+0x1c/0x30
[   12.264769]  kunit_try_run_case+0x1a5/0x480
[   12.264794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.264817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.264841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.264865]  ? __kthread_parkme+0x82/0x180
[   12.264885]  ? preempt_count_sub+0x50/0x80
[   12.264908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.264933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.264959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.264984]  kthread+0x337/0x6f0
[   12.265003]  ? trace_preempt_on+0x20/0xc0
[   12.265025]  ? __pfx_kthread+0x10/0x10
[   12.265046]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.265068]  ? calculate_sigpending+0x7b/0xa0
[   12.265093]  ? __pfx_kthread+0x10/0x10
[   12.265114]  ret_from_fork+0x116/0x1d0
[   12.265132]  ? __pfx_kthread+0x10/0x10
[   12.265153]  ret_from_fork_asm+0x1a/0x30
[   12.265184]  </TASK>
[   12.265193] 
[   12.275075] Allocated by task 175:
[   12.275315]  kasan_save_stack+0x45/0x70
[   12.275635]  kasan_save_track+0x18/0x40
[   12.275946]  kasan_save_alloc_info+0x3b/0x50
[   12.276262]  __kasan_krealloc+0x190/0x1f0
[   12.276422]  krealloc_noprof+0xf3/0x340
[   12.276809]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.277128]  krealloc_less_oob+0x1c/0x30
[   12.277331]  kunit_try_run_case+0x1a5/0x480
[   12.277748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.277990]  kthread+0x337/0x6f0
[   12.278234]  ret_from_fork+0x116/0x1d0
[   12.278379]  ret_from_fork_asm+0x1a/0x30
[   12.278609] 
[   12.278699] The buggy address belongs to the object at ffff888100347400
[   12.278699]  which belongs to the cache kmalloc-256 of size 256
[   12.279205] The buggy address is located 33 bytes to the right of
[   12.279205]  allocated 201-byte region [ffff888100347400, ffff8881003474c9)
[   12.279997] 
[   12.280252] The buggy address belongs to the physical page:
[   12.280465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.281087] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.281486] flags: 0x200000000000040(head|node=0|zone=2)
[   12.281818] page_type: f5(slab)
[   12.281990] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.282428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.282871] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.283269] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.283797] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.284202] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.284620] page dumped because: kasan: bad access detected
[   12.284956] 
[   12.285048] Memory state around the buggy address:
[   12.285365]  ffff888100347380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.285760]  ffff888100347400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.286118] >ffff888100347480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.286501]                                                           ^
[   12.286876]  ffff888100347500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.287147]  ffff888100347580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.287593] ==================================================================
[   12.370817] ==================================================================
[   12.371320] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.371845] Write of size 1 at addr ffff888103a0e0c9 by task kunit_try_catch/179
[   12.372406] 
[   12.372703] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.372752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.372764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.372786] Call Trace:
[   12.372799]  <TASK>
[   12.372817]  dump_stack_lvl+0x73/0xb0
[   12.372851]  print_report+0xd1/0x610
[   12.372875]  ? __virt_addr_valid+0x1db/0x2d0
[   12.372900]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.372925]  ? kasan_addr_to_slab+0x11/0xa0
[   12.372945]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.372970]  kasan_report+0x141/0x180
[   12.372991]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.373020]  __asan_report_store1_noabort+0x1b/0x30
[   12.373046]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.373072]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.373097]  ? finish_task_switch.isra.0+0x153/0x700
[   12.373122]  ? __switch_to+0x47/0xf50
[   12.373148]  ? __schedule+0x10cc/0x2b60
[   12.373171]  ? __pfx_read_tsc+0x10/0x10
[   12.373195]  krealloc_large_less_oob+0x1c/0x30
[   12.373218]  kunit_try_run_case+0x1a5/0x480
[   12.373246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.373269]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.373293]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.373317]  ? __kthread_parkme+0x82/0x180
[   12.373338]  ? preempt_count_sub+0x50/0x80
[   12.373361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.373385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.373726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.373762]  kthread+0x337/0x6f0
[   12.373783]  ? trace_preempt_on+0x20/0xc0
[   12.373808]  ? __pfx_kthread+0x10/0x10
[   12.373829]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.373851]  ? calculate_sigpending+0x7b/0xa0
[   12.373876]  ? __pfx_kthread+0x10/0x10
[   12.373897]  ret_from_fork+0x116/0x1d0
[   12.373916]  ? __pfx_kthread+0x10/0x10
[   12.373936]  ret_from_fork_asm+0x1a/0x30
[   12.373969]  </TASK>
[   12.373980] 
[   12.386375] The buggy address belongs to the physical page:
[   12.386854] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.387301] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.387793] flags: 0x200000000000040(head|node=0|zone=2)
[   12.388151] page_type: f8(unknown)
[   12.388348] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.388848] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.389271] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.389875] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.390403] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.390988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.391407] page dumped because: kasan: bad access detected
[   12.391953] 
[   12.392225] Memory state around the buggy address:
[   12.392491]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.393041]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.393324] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.393954]                                               ^
[   12.394345]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.395036]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.395330] ==================================================================
[   12.209695] ==================================================================
[   12.210422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.210996] Write of size 1 at addr ffff8881003474d0 by task kunit_try_catch/175
[   12.211369] 
[   12.211533] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.211576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.211610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.211629] Call Trace:
[   12.211642]  <TASK>
[   12.211655]  dump_stack_lvl+0x73/0xb0
[   12.211819]  print_report+0xd1/0x610
[   12.211846]  ? __virt_addr_valid+0x1db/0x2d0
[   12.211868]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.211892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.211915]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.211960]  kasan_report+0x141/0x180
[   12.211981]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.212010]  __asan_report_store1_noabort+0x1b/0x30
[   12.212138]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.212166]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.212191]  ? finish_task_switch.isra.0+0x153/0x700
[   12.212215]  ? __switch_to+0x47/0xf50
[   12.212239]  ? __schedule+0x10cc/0x2b60
[   12.212261]  ? __pfx_read_tsc+0x10/0x10
[   12.212295]  krealloc_less_oob+0x1c/0x30
[   12.212316]  kunit_try_run_case+0x1a5/0x480
[   12.212341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.212363]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.212386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.212420]  ? __kthread_parkme+0x82/0x180
[   12.212440]  ? preempt_count_sub+0x50/0x80
[   12.212475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.212499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.212523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.212548]  kthread+0x337/0x6f0
[   12.212567]  ? trace_preempt_on+0x20/0xc0
[   12.212589]  ? __pfx_kthread+0x10/0x10
[   12.212609]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.212631]  ? calculate_sigpending+0x7b/0xa0
[   12.212654]  ? __pfx_kthread+0x10/0x10
[   12.212675]  ret_from_fork+0x116/0x1d0
[   12.212693]  ? __pfx_kthread+0x10/0x10
[   12.212713]  ret_from_fork_asm+0x1a/0x30
[   12.212743]  </TASK>
[   12.212753] 
[   12.222372] Allocated by task 175:
[   12.222711]  kasan_save_stack+0x45/0x70
[   12.222988]  kasan_save_track+0x18/0x40
[   12.223277]  kasan_save_alloc_info+0x3b/0x50
[   12.223598]  __kasan_krealloc+0x190/0x1f0
[   12.223799]  krealloc_noprof+0xf3/0x340
[   12.223980]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.224199]  krealloc_less_oob+0x1c/0x30
[   12.224399]  kunit_try_run_case+0x1a5/0x480
[   12.224892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.225190]  kthread+0x337/0x6f0
[   12.225318]  ret_from_fork+0x116/0x1d0
[   12.225744]  ret_from_fork_asm+0x1a/0x30
[   12.225987] 
[   12.226225] The buggy address belongs to the object at ffff888100347400
[   12.226225]  which belongs to the cache kmalloc-256 of size 256
[   12.226871] The buggy address is located 7 bytes to the right of
[   12.226871]  allocated 201-byte region [ffff888100347400, ffff8881003474c9)
[   12.227421] 
[   12.227819] The buggy address belongs to the physical page:
[   12.228080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.228520] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.228938] flags: 0x200000000000040(head|node=0|zone=2)
[   12.229262] page_type: f5(slab)
[   12.229458] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.229781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.230103] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.230694] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.230990] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.231391] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.231820] page dumped because: kasan: bad access detected
[   12.232149] 
[   12.232246] Memory state around the buggy address:
[   12.232470]  ffff888100347380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.232976]  ffff888100347400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.233331] >ffff888100347480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.233789]                                                  ^
[   12.234141]  ffff888100347500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.234593]  ffff888100347580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.234896] ==================================================================
[   12.418950] ==================================================================
[   12.419585] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.420033] Write of size 1 at addr ffff888103a0e0da by task kunit_try_catch/179
[   12.420353] 
[   12.420680] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.420725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.420908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.420929] Call Trace:
[   12.420945]  <TASK>
[   12.420960]  dump_stack_lvl+0x73/0xb0
[   12.420989]  print_report+0xd1/0x610
[   12.421014]  ? __virt_addr_valid+0x1db/0x2d0
[   12.421039]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.421064]  ? kasan_addr_to_slab+0x11/0xa0
[   12.421085]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.421110]  kasan_report+0x141/0x180
[   12.421131]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.421161]  __asan_report_store1_noabort+0x1b/0x30
[   12.421186]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.421212]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.421237]  ? finish_task_switch.isra.0+0x153/0x700
[   12.421260]  ? __switch_to+0x47/0xf50
[   12.421285]  ? __schedule+0x10cc/0x2b60
[   12.421307]  ? __pfx_read_tsc+0x10/0x10
[   12.421331]  krealloc_large_less_oob+0x1c/0x30
[   12.421354]  kunit_try_run_case+0x1a5/0x480
[   12.421378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.421410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.421435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.421473]  ? __kthread_parkme+0x82/0x180
[   12.421494]  ? preempt_count_sub+0x50/0x80
[   12.421517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.421541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.421574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.421600]  kthread+0x337/0x6f0
[   12.421620]  ? trace_preempt_on+0x20/0xc0
[   12.421643]  ? __pfx_kthread+0x10/0x10
[   12.421664]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.421685]  ? calculate_sigpending+0x7b/0xa0
[   12.421709]  ? __pfx_kthread+0x10/0x10
[   12.421730]  ret_from_fork+0x116/0x1d0
[   12.421749]  ? __pfx_kthread+0x10/0x10
[   12.421769]  ret_from_fork_asm+0x1a/0x30
[   12.421799]  </TASK>
[   12.421808] 
[   12.432932] The buggy address belongs to the physical page:
[   12.433309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.433858] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.434350] flags: 0x200000000000040(head|node=0|zone=2)
[   12.434772] page_type: f8(unknown)
[   12.434911] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.435228] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.435830] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.436159] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.436637] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.437080] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.437546] page dumped because: kasan: bad access detected
[   12.437951] 
[   12.438035] Memory state around the buggy address:
[   12.438323]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.438898]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.439319] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.439846]                                                     ^
[   12.440083]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.440533]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.441034] ==================================================================
[   12.441532] ==================================================================
[   12.441946] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.442282] Write of size 1 at addr ffff888103a0e0ea by task kunit_try_catch/179
[   12.442802] 
[   12.442935] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.442991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.443390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.443413] Call Trace:
[   12.443429]  <TASK>
[   12.443443]  dump_stack_lvl+0x73/0xb0
[   12.443484]  print_report+0xd1/0x610
[   12.443506]  ? __virt_addr_valid+0x1db/0x2d0
[   12.443529]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.443553]  ? kasan_addr_to_slab+0x11/0xa0
[   12.443592]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.443616]  kasan_report+0x141/0x180
[   12.443638]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.443667]  __asan_report_store1_noabort+0x1b/0x30
[   12.443692]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.443719]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.443744]  ? finish_task_switch.isra.0+0x153/0x700
[   12.443767]  ? __switch_to+0x47/0xf50
[   12.443792]  ? __schedule+0x10cc/0x2b60
[   12.443814]  ? __pfx_read_tsc+0x10/0x10
[   12.443838]  krealloc_large_less_oob+0x1c/0x30
[   12.443861]  kunit_try_run_case+0x1a5/0x480
[   12.443886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.443909]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.443933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.443957]  ? __kthread_parkme+0x82/0x180
[   12.443977]  ? preempt_count_sub+0x50/0x80
[   12.444000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.444024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.444048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.444076]  kthread+0x337/0x6f0
[   12.444094]  ? trace_preempt_on+0x20/0xc0
[   12.444117]  ? __pfx_kthread+0x10/0x10
[   12.444138]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.444159]  ? calculate_sigpending+0x7b/0xa0
[   12.444183]  ? __pfx_kthread+0x10/0x10
[   12.444204]  ret_from_fork+0x116/0x1d0
[   12.444223]  ? __pfx_kthread+0x10/0x10
[   12.444243]  ret_from_fork_asm+0x1a/0x30
[   12.444274]  </TASK>
[   12.444287] 
[   12.455807] The buggy address belongs to the physical page:
[   12.456144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.456627] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.457164] flags: 0x200000000000040(head|node=0|zone=2)
[   12.457403] page_type: f8(unknown)
[   12.457779] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.458189] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.458724] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.459225] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.459688] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.460281] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.460768] page dumped because: kasan: bad access detected
[   12.461102] 
[   12.461179] Memory state around the buggy address:
[   12.461462]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.462072]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.462490] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.462998]                                                           ^
[   12.463502]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.463969]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.464274] ==================================================================
[   12.236172] ==================================================================
[   12.236553] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.237095] Write of size 1 at addr ffff8881003474da by task kunit_try_catch/175
[   12.237474] 
[   12.237877] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.237925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.237937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.237958] Call Trace:
[   12.237972]  <TASK>
[   12.237987]  dump_stack_lvl+0x73/0xb0
[   12.238018]  print_report+0xd1/0x610
[   12.238040]  ? __virt_addr_valid+0x1db/0x2d0
[   12.238063]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.238087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.238111]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.238135]  kasan_report+0x141/0x180
[   12.238157]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.238186]  __asan_report_store1_noabort+0x1b/0x30
[   12.238211]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.238238]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.238263]  ? finish_task_switch.isra.0+0x153/0x700
[   12.238287]  ? __switch_to+0x47/0xf50
[   12.238311]  ? __schedule+0x10cc/0x2b60
[   12.238333]  ? __pfx_read_tsc+0x10/0x10
[   12.238357]  krealloc_less_oob+0x1c/0x30
[   12.238379]  kunit_try_run_case+0x1a5/0x480
[   12.238413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.238437]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.238475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.238498]  ? __kthread_parkme+0x82/0x180
[   12.238520]  ? preempt_count_sub+0x50/0x80
[   12.238543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.238567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.238592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.238617]  kthread+0x337/0x6f0
[   12.238636]  ? trace_preempt_on+0x20/0xc0
[   12.238659]  ? __pfx_kthread+0x10/0x10
[   12.238679]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.238700]  ? calculate_sigpending+0x7b/0xa0
[   12.238724]  ? __pfx_kthread+0x10/0x10
[   12.238746]  ret_from_fork+0x116/0x1d0
[   12.238764]  ? __pfx_kthread+0x10/0x10
[   12.238784]  ret_from_fork_asm+0x1a/0x30
[   12.238815]  </TASK>
[   12.238825] 
[   12.248719] Allocated by task 175:
[   12.248904]  kasan_save_stack+0x45/0x70
[   12.249098]  kasan_save_track+0x18/0x40
[   12.249281]  kasan_save_alloc_info+0x3b/0x50
[   12.249484]  __kasan_krealloc+0x190/0x1f0
[   12.250022]  krealloc_noprof+0xf3/0x340
[   12.250313]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.250603]  krealloc_less_oob+0x1c/0x30
[   12.250887]  kunit_try_run_case+0x1a5/0x480
[   12.251152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.251528]  kthread+0x337/0x6f0
[   12.251716]  ret_from_fork+0x116/0x1d0
[   12.251987]  ret_from_fork_asm+0x1a/0x30
[   12.252137] 
[   12.252373] The buggy address belongs to the object at ffff888100347400
[   12.252373]  which belongs to the cache kmalloc-256 of size 256
[   12.253134] The buggy address is located 17 bytes to the right of
[   12.253134]  allocated 201-byte region [ffff888100347400, ffff8881003474c9)
[   12.253769] 
[   12.253852] The buggy address belongs to the physical page:
[   12.254180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.254687] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.254987] flags: 0x200000000000040(head|node=0|zone=2)
[   12.255358] page_type: f5(slab)
[   12.255652] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.256024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.256412] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.256826] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.257133] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.257692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.258027] page dumped because: kasan: bad access detected
[   12.258337] 
[   12.258459] Memory state around the buggy address:
[   12.258828]  ffff888100347380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.259219]  ffff888100347400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.259652] >ffff888100347480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.259945]                                                     ^
[   12.260218]  ffff888100347500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.260705]  ffff888100347580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.261067] ==================================================================
[   12.288409] ==================================================================
[   12.289294] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.290078] Write of size 1 at addr ffff8881003474eb by task kunit_try_catch/175
[   12.290472] 
[   12.290991] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.291044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.291056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.291077] Call Trace:
[   12.291094]  <TASK>
[   12.291111]  dump_stack_lvl+0x73/0xb0
[   12.291141]  print_report+0xd1/0x610
[   12.291166]  ? __virt_addr_valid+0x1db/0x2d0
[   12.291191]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.291215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.291239]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.291264]  kasan_report+0x141/0x180
[   12.291285]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.291314]  __asan_report_store1_noabort+0x1b/0x30
[   12.291340]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.291366]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.291391]  ? finish_task_switch.isra.0+0x153/0x700
[   12.291432]  ? __switch_to+0x47/0xf50
[   12.291471]  ? __schedule+0x10cc/0x2b60
[   12.291493]  ? __pfx_read_tsc+0x10/0x10
[   12.291517]  krealloc_less_oob+0x1c/0x30
[   12.291539]  kunit_try_run_case+0x1a5/0x480
[   12.291564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.291586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.291610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.291634]  ? __kthread_parkme+0x82/0x180
[   12.291654]  ? preempt_count_sub+0x50/0x80
[   12.291892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.291921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.291946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.291997]  kthread+0x337/0x6f0
[   12.292017]  ? trace_preempt_on+0x20/0xc0
[   12.292041]  ? __pfx_kthread+0x10/0x10
[   12.292122]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.292160]  ? calculate_sigpending+0x7b/0xa0
[   12.292185]  ? __pfx_kthread+0x10/0x10
[   12.292206]  ret_from_fork+0x116/0x1d0
[   12.292236]  ? __pfx_kthread+0x10/0x10
[   12.292257]  ret_from_fork_asm+0x1a/0x30
[   12.292308]  </TASK>
[   12.292317] 
[   12.301156] Allocated by task 175:
[   12.301478]  kasan_save_stack+0x45/0x70
[   12.301795]  kasan_save_track+0x18/0x40
[   12.302047]  kasan_save_alloc_info+0x3b/0x50
[   12.302230]  __kasan_krealloc+0x190/0x1f0
[   12.302553]  krealloc_noprof+0xf3/0x340
[   12.302752]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.302916]  krealloc_less_oob+0x1c/0x30
[   12.303055]  kunit_try_run_case+0x1a5/0x480
[   12.303201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.303375]  kthread+0x337/0x6f0
[   12.303527]  ret_from_fork+0x116/0x1d0
[   12.303660]  ret_from_fork_asm+0x1a/0x30
[   12.303839] 
[   12.303940] The buggy address belongs to the object at ffff888100347400
[   12.303940]  which belongs to the cache kmalloc-256 of size 256
[   12.305839] The buggy address is located 34 bytes to the right of
[   12.305839]  allocated 201-byte region [ffff888100347400, ffff8881003474c9)
[   12.306303] 
[   12.306541] The buggy address belongs to the physical page:
[   12.307250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.307959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.308480] flags: 0x200000000000040(head|node=0|zone=2)
[   12.308939] page_type: f5(slab)
[   12.309111] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.309639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.310173] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.310658] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.310989] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.311306] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.312002] page dumped because: kasan: bad access detected
[   12.312333] 
[   12.312573] Memory state around the buggy address:
[   12.313048]  ffff888100347380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.313332]  ffff888100347400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.313867] >ffff888100347480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.314284]                                                           ^
[   12.314758]  ffff888100347500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.315055]  ffff888100347580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.315339] ==================================================================

[   12.584394] ==================================================================
[   12.585017] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.585877] Write of size 1 at addr ffff8881003438eb by task kunit_try_catch/176
[   12.586261] 
[   12.586351] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.586393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.586405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.586425] Call Trace:
[   12.586441]  <TASK>
[   12.586457]  dump_stack_lvl+0x73/0xb0
[   12.586486]  print_report+0xd1/0x610
[   12.586508]  ? __virt_addr_valid+0x1db/0x2d0
[   12.586531]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.586555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.586578]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.586603]  kasan_report+0x141/0x180
[   12.586624]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.586666]  __asan_report_store1_noabort+0x1b/0x30
[   12.586691]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.586723]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.586748]  ? finish_task_switch.isra.0+0x153/0x700
[   12.586772]  ? __switch_to+0x47/0xf50
[   12.586797]  ? __schedule+0x10cc/0x2b60
[   12.586819]  ? __pfx_read_tsc+0x10/0x10
[   12.586843]  krealloc_less_oob+0x1c/0x30
[   12.586865]  kunit_try_run_case+0x1a5/0x480
[   12.586888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.586912]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.586935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.586959]  ? __kthread_parkme+0x82/0x180
[   12.586978]  ? preempt_count_sub+0x50/0x80
[   12.587001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.587026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.587060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.587086]  kthread+0x337/0x6f0
[   12.587104]  ? trace_preempt_on+0x20/0xc0
[   12.587141]  ? __pfx_kthread+0x10/0x10
[   12.587162]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.587183]  ? calculate_sigpending+0x7b/0xa0
[   12.587207]  ? __pfx_kthread+0x10/0x10
[   12.587229]  ret_from_fork+0x116/0x1d0
[   12.587247]  ? __pfx_kthread+0x10/0x10
[   12.587268]  ret_from_fork_asm+0x1a/0x30
[   12.587299]  </TASK>
[   12.587308] 
[   12.600731] Allocated by task 176:
[   12.600862]  kasan_save_stack+0x45/0x70
[   12.601010]  kasan_save_track+0x18/0x40
[   12.601404]  kasan_save_alloc_info+0x3b/0x50
[   12.601946]  __kasan_krealloc+0x190/0x1f0
[   12.602314]  krealloc_noprof+0xf3/0x340
[   12.602864]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.603413]  krealloc_less_oob+0x1c/0x30
[   12.603839]  kunit_try_run_case+0x1a5/0x480
[   12.604254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.604814]  kthread+0x337/0x6f0
[   12.605148]  ret_from_fork+0x116/0x1d0
[   12.605491]  ret_from_fork_asm+0x1a/0x30
[   12.605946] 
[   12.606121] The buggy address belongs to the object at ffff888100343800
[   12.606121]  which belongs to the cache kmalloc-256 of size 256
[   12.607454] The buggy address is located 34 bytes to the right of
[   12.607454]  allocated 201-byte region [ffff888100343800, ffff8881003438c9)
[   12.608235] 
[   12.608399] The buggy address belongs to the physical page:
[   12.608987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.609749] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.610311] flags: 0x200000000000040(head|node=0|zone=2)
[   12.610493] page_type: f5(slab)
[   12.610614] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.611558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.612360] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.613239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.613736] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.613977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.614266] page dumped because: kasan: bad access detected
[   12.614746] 
[   12.615150] Memory state around the buggy address:
[   12.615592]  ffff888100343780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.616294]  ffff888100343800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.617182] >ffff888100343880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.617810]                                                           ^
[   12.618382]  ffff888100343900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.618601]  ffff888100343980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.618834] ==================================================================
[   12.736125] ==================================================================
[   12.736445] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.737285] Write of size 1 at addr ffff888102cae0da by task kunit_try_catch/180
[   12.737806] 
[   12.737914] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.738117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.738131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.738237] Call Trace:
[   12.738252]  <TASK>
[   12.738267]  dump_stack_lvl+0x73/0xb0
[   12.738298]  print_report+0xd1/0x610
[   12.738319]  ? __virt_addr_valid+0x1db/0x2d0
[   12.738342]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.738367]  ? kasan_addr_to_slab+0x11/0xa0
[   12.738388]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.738413]  kasan_report+0x141/0x180
[   12.738434]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.738463]  __asan_report_store1_noabort+0x1b/0x30
[   12.738489]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.738516]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.738541]  ? finish_task_switch.isra.0+0x153/0x700
[   12.738565]  ? __switch_to+0x47/0xf50
[   12.738592]  ? __schedule+0x10cc/0x2b60
[   12.738615]  ? __pfx_read_tsc+0x10/0x10
[   12.738653]  krealloc_large_less_oob+0x1c/0x30
[   12.738677]  kunit_try_run_case+0x1a5/0x480
[   12.738709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.738733]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.738757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.738781]  ? __kthread_parkme+0x82/0x180
[   12.738801]  ? preempt_count_sub+0x50/0x80
[   12.738824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.738849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.738874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.738900]  kthread+0x337/0x6f0
[   12.738918]  ? trace_preempt_on+0x20/0xc0
[   12.738942]  ? __pfx_kthread+0x10/0x10
[   12.738962]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.738985]  ? calculate_sigpending+0x7b/0xa0
[   12.739009]  ? __pfx_kthread+0x10/0x10
[   12.739030]  ret_from_fork+0x116/0x1d0
[   12.739049]  ? __pfx_kthread+0x10/0x10
[   12.739079]  ret_from_fork_asm+0x1a/0x30
[   12.739110]  </TASK>
[   12.739119] 
[   12.749960] The buggy address belongs to the physical page:
[   12.750499] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cac
[   12.751214] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.752031] flags: 0x200000000000040(head|node=0|zone=2)
[   12.752539] page_type: f8(unknown)
[   12.752927] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.753600] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.754336] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.754891] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.755196] head: 0200000000000002 ffffea00040b2b01 00000000ffffffff 00000000ffffffff
[   12.756023] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.756622] page dumped because: kasan: bad access detected
[   12.757065] 
[   12.757138] Memory state around the buggy address:
[   12.757572]  ffff888102cadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.758094]  ffff888102cae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.758752] >ffff888102cae080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.759048]                                                     ^
[   12.759479]  ffff888102cae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.760307]  ffff888102cae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.760597] ==================================================================
[   12.761393] ==================================================================
[   12.761842] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.762107] Write of size 1 at addr ffff888102cae0ea by task kunit_try_catch/180
[   12.762815] 
[   12.762990] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.763033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.763045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.763074] Call Trace:
[   12.763088]  <TASK>
[   12.763103]  dump_stack_lvl+0x73/0xb0
[   12.763130]  print_report+0xd1/0x610
[   12.763159]  ? __virt_addr_valid+0x1db/0x2d0
[   12.763181]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.763206]  ? kasan_addr_to_slab+0x11/0xa0
[   12.763226]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.763252]  kasan_report+0x141/0x180
[   12.763274]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.763303]  __asan_report_store1_noabort+0x1b/0x30
[   12.763328]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.763355]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.763381]  ? finish_task_switch.isra.0+0x153/0x700
[   12.763404]  ? __switch_to+0x47/0xf50
[   12.763430]  ? __schedule+0x10cc/0x2b60
[   12.763452]  ? __pfx_read_tsc+0x10/0x10
[   12.763476]  krealloc_large_less_oob+0x1c/0x30
[   12.763499]  kunit_try_run_case+0x1a5/0x480
[   12.763524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.763547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.763570]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.763594]  ? __kthread_parkme+0x82/0x180
[   12.763615]  ? preempt_count_sub+0x50/0x80
[   12.763637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.763662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.763686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.763712]  kthread+0x337/0x6f0
[   12.763731]  ? trace_preempt_on+0x20/0xc0
[   12.763754]  ? __pfx_kthread+0x10/0x10
[   12.763775]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.763797]  ? calculate_sigpending+0x7b/0xa0
[   12.763821]  ? __pfx_kthread+0x10/0x10
[   12.763843]  ret_from_fork+0x116/0x1d0
[   12.763862]  ? __pfx_kthread+0x10/0x10
[   12.763882]  ret_from_fork_asm+0x1a/0x30
[   12.763913]  </TASK>
[   12.763922] 
[   12.778184] The buggy address belongs to the physical page:
[   12.778797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cac
[   12.779603] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.780316] flags: 0x200000000000040(head|node=0|zone=2)
[   12.780818] page_type: f8(unknown)
[   12.780952] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.781231] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.782081] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.782898] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.783349] head: 0200000000000002 ffffea00040b2b01 00000000ffffffff 00000000ffffffff
[   12.783598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.783830] page dumped because: kasan: bad access detected
[   12.784003] 
[   12.784715] Memory state around the buggy address:
[   12.785033]  ffff888102cadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.785725]  ffff888102cae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.786359] >ffff888102cae080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.787060]                                                           ^
[   12.787791]  ffff888102cae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.788699]  ffff888102cae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.789029] ==================================================================
[   12.485285] ==================================================================
[   12.485618] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.486011] Write of size 1 at addr ffff8881003438d0 by task kunit_try_catch/176
[   12.486364] 
[   12.486451] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.486494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.486505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.486525] Call Trace:
[   12.486540]  <TASK>
[   12.486556]  dump_stack_lvl+0x73/0xb0
[   12.486585]  print_report+0xd1/0x610
[   12.486607]  ? __virt_addr_valid+0x1db/0x2d0
[   12.486630]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.486655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.486678]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.486703]  kasan_report+0x141/0x180
[   12.486802]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.486832]  __asan_report_store1_noabort+0x1b/0x30
[   12.486858]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.486885]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.486928]  ? finish_task_switch.isra.0+0x153/0x700
[   12.486954]  ? __switch_to+0x47/0xf50
[   12.486994]  ? __schedule+0x10cc/0x2b60
[   12.487016]  ? __pfx_read_tsc+0x10/0x10
[   12.487041]  krealloc_less_oob+0x1c/0x30
[   12.487076]  kunit_try_run_case+0x1a5/0x480
[   12.487100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.487134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.487157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.487182]  ? __kthread_parkme+0x82/0x180
[   12.487202]  ? preempt_count_sub+0x50/0x80
[   12.487225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.487250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.487275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.487318]  kthread+0x337/0x6f0
[   12.487350]  ? trace_preempt_on+0x20/0xc0
[   12.487374]  ? __pfx_kthread+0x10/0x10
[   12.487395]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.487416]  ? calculate_sigpending+0x7b/0xa0
[   12.487441]  ? __pfx_kthread+0x10/0x10
[   12.487462]  ret_from_fork+0x116/0x1d0
[   12.487482]  ? __pfx_kthread+0x10/0x10
[   12.487504]  ret_from_fork_asm+0x1a/0x30
[   12.487535]  </TASK>
[   12.487544] 
[   12.496189] Allocated by task 176:
[   12.496348]  kasan_save_stack+0x45/0x70
[   12.496501]  kasan_save_track+0x18/0x40
[   12.496721]  kasan_save_alloc_info+0x3b/0x50
[   12.497004]  __kasan_krealloc+0x190/0x1f0
[   12.497188]  krealloc_noprof+0xf3/0x340
[   12.497354]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.497579]  krealloc_less_oob+0x1c/0x30
[   12.497871]  kunit_try_run_case+0x1a5/0x480
[   12.498048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.498464]  kthread+0x337/0x6f0
[   12.498645]  ret_from_fork+0x116/0x1d0
[   12.498862]  ret_from_fork_asm+0x1a/0x30
[   12.498999] 
[   12.499079] The buggy address belongs to the object at ffff888100343800
[   12.499079]  which belongs to the cache kmalloc-256 of size 256
[   12.500024] The buggy address is located 7 bytes to the right of
[   12.500024]  allocated 201-byte region [ffff888100343800, ffff8881003438c9)
[   12.500861] 
[   12.500958] The buggy address belongs to the physical page:
[   12.501302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.501540] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.501833] flags: 0x200000000000040(head|node=0|zone=2)
[   12.502119] page_type: f5(slab)
[   12.502385] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.502830] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.503105] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.503351] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.504105] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.504483] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.505294] page dumped because: kasan: bad access detected
[   12.505961] 
[   12.506182] Memory state around the buggy address:
[   12.506621]  ffff888100343780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.507369]  ffff888100343800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.508225] >ffff888100343880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.509005]                                                  ^
[   12.509616]  ffff888100343900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.510074]  ffff888100343980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.510694] ==================================================================
[   12.549087] ==================================================================
[   12.549504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.550105] Write of size 1 at addr ffff8881003438ea by task kunit_try_catch/176
[   12.550808] 
[   12.551048] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.551107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.551119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.551140] Call Trace:
[   12.551155]  <TASK>
[   12.551170]  dump_stack_lvl+0x73/0xb0
[   12.551199]  print_report+0xd1/0x610
[   12.551221]  ? __virt_addr_valid+0x1db/0x2d0
[   12.551244]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.551268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.551291]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.551316]  kasan_report+0x141/0x180
[   12.551338]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.551368]  __asan_report_store1_noabort+0x1b/0x30
[   12.551393]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.551420]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.551445]  ? finish_task_switch.isra.0+0x153/0x700
[   12.551469]  ? __switch_to+0x47/0xf50
[   12.551493]  ? __schedule+0x10cc/0x2b60
[   12.551515]  ? __pfx_read_tsc+0x10/0x10
[   12.551539]  krealloc_less_oob+0x1c/0x30
[   12.551561]  kunit_try_run_case+0x1a5/0x480
[   12.551586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.551609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.551633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.551659]  ? __kthread_parkme+0x82/0x180
[   12.551680]  ? preempt_count_sub+0x50/0x80
[   12.551703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.551727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.551752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.551778]  kthread+0x337/0x6f0
[   12.551796]  ? trace_preempt_on+0x20/0xc0
[   12.551820]  ? __pfx_kthread+0x10/0x10
[   12.551841]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.551862]  ? calculate_sigpending+0x7b/0xa0
[   12.551887]  ? __pfx_kthread+0x10/0x10
[   12.551908]  ret_from_fork+0x116/0x1d0
[   12.551927]  ? __pfx_kthread+0x10/0x10
[   12.551948]  ret_from_fork_asm+0x1a/0x30
[   12.551979]  </TASK>
[   12.551989] 
[   12.566130] Allocated by task 176:
[   12.566451]  kasan_save_stack+0x45/0x70
[   12.566611]  kasan_save_track+0x18/0x40
[   12.566750]  kasan_save_alloc_info+0x3b/0x50
[   12.566901]  __kasan_krealloc+0x190/0x1f0
[   12.567041]  krealloc_noprof+0xf3/0x340
[   12.567192]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.567356]  krealloc_less_oob+0x1c/0x30
[   12.567496]  kunit_try_run_case+0x1a5/0x480
[   12.567644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.567820]  kthread+0x337/0x6f0
[   12.567942]  ret_from_fork+0x116/0x1d0
[   12.568116]  ret_from_fork_asm+0x1a/0x30
[   12.568491] 
[   12.568682] The buggy address belongs to the object at ffff888100343800
[   12.568682]  which belongs to the cache kmalloc-256 of size 256
[   12.569848] The buggy address is located 33 bytes to the right of
[   12.569848]  allocated 201-byte region [ffff888100343800, ffff8881003438c9)
[   12.570931] 
[   12.571469] The buggy address belongs to the physical page:
[   12.572021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.574297] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.574926] flags: 0x200000000000040(head|node=0|zone=2)
[   12.575353] page_type: f5(slab)
[   12.575483] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.575716] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.575948] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.576410] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.577035] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.577678] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.578449] page dumped because: kasan: bad access detected
[   12.579016] 
[   12.579343] Memory state around the buggy address:
[   12.579825]  ffff888100343780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.580516]  ffff888100343800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.581302] >ffff888100343880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.582028]                                                           ^
[   12.582817]  ffff888100343900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.583067]  ffff888100343980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.583496] ==================================================================
[   12.709554] ==================================================================
[   12.710426] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.711154] Write of size 1 at addr ffff888102cae0d0 by task kunit_try_catch/180
[   12.712093] 
[   12.712395] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.712567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.712580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.712600] Call Trace:
[   12.712613]  <TASK>
[   12.712627]  dump_stack_lvl+0x73/0xb0
[   12.712657]  print_report+0xd1/0x610
[   12.712680]  ? __virt_addr_valid+0x1db/0x2d0
[   12.712702]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.712726]  ? kasan_addr_to_slab+0x11/0xa0
[   12.712747]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.712772]  kasan_report+0x141/0x180
[   12.712793]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.712822]  __asan_report_store1_noabort+0x1b/0x30
[   12.712848]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.712875]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.712900]  ? finish_task_switch.isra.0+0x153/0x700
[   12.712922]  ? __switch_to+0x47/0xf50
[   12.712946]  ? __schedule+0x10cc/0x2b60
[   12.712969]  ? __pfx_read_tsc+0x10/0x10
[   12.712993]  krealloc_large_less_oob+0x1c/0x30
[   12.713016]  kunit_try_run_case+0x1a5/0x480
[   12.713040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.713073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.713097]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.713190]  ? __kthread_parkme+0x82/0x180
[   12.713214]  ? preempt_count_sub+0x50/0x80
[   12.713237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.713262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.713287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.713312]  kthread+0x337/0x6f0
[   12.713332]  ? trace_preempt_on+0x20/0xc0
[   12.713354]  ? __pfx_kthread+0x10/0x10
[   12.713375]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.713397]  ? calculate_sigpending+0x7b/0xa0
[   12.713421]  ? __pfx_kthread+0x10/0x10
[   12.713442]  ret_from_fork+0x116/0x1d0
[   12.713461]  ? __pfx_kthread+0x10/0x10
[   12.713481]  ret_from_fork_asm+0x1a/0x30
[   12.713512]  </TASK>
[   12.713521] 
[   12.725920] The buggy address belongs to the physical page:
[   12.726400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cac
[   12.727044] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.727550] flags: 0x200000000000040(head|node=0|zone=2)
[   12.727982] page_type: f8(unknown)
[   12.728398] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.728973] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.729404] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.729808] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.730113] head: 0200000000000002 ffffea00040b2b01 00000000ffffffff 00000000ffffffff
[   12.730919] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.731318] page dumped because: kasan: bad access detected
[   12.731655] 
[   12.731790] Memory state around the buggy address:
[   12.732218]  ffff888102cadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.732509]  ffff888102cae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.732886] >ffff888102cae080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.733465]                                                  ^
[   12.733831]  ffff888102cae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.734436]  ffff888102cae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.734865] ==================================================================
[   12.511838] ==================================================================
[   12.512905] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.513856] Write of size 1 at addr ffff8881003438da by task kunit_try_catch/176
[   12.514289] 
[   12.514377] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.514421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.514433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.514452] Call Trace:
[   12.514463]  <TASK>
[   12.514477]  dump_stack_lvl+0x73/0xb0
[   12.514505]  print_report+0xd1/0x610
[   12.514528]  ? __virt_addr_valid+0x1db/0x2d0
[   12.514551]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.514576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.514600]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.514625]  kasan_report+0x141/0x180
[   12.514720]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.514754]  __asan_report_store1_noabort+0x1b/0x30
[   12.514780]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.514807]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.514852]  ? finish_task_switch.isra.0+0x153/0x700
[   12.514891]  ? __switch_to+0x47/0xf50
[   12.514916]  ? __schedule+0x10cc/0x2b60
[   12.514938]  ? __pfx_read_tsc+0x10/0x10
[   12.514963]  krealloc_less_oob+0x1c/0x30
[   12.514985]  kunit_try_run_case+0x1a5/0x480
[   12.515010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.515033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.515068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.515092]  ? __kthread_parkme+0x82/0x180
[   12.515113]  ? preempt_count_sub+0x50/0x80
[   12.515137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.515162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.515187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.515212]  kthread+0x337/0x6f0
[   12.515231]  ? trace_preempt_on+0x20/0xc0
[   12.515254]  ? __pfx_kthread+0x10/0x10
[   12.515275]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.515296]  ? calculate_sigpending+0x7b/0xa0
[   12.515320]  ? __pfx_kthread+0x10/0x10
[   12.515342]  ret_from_fork+0x116/0x1d0
[   12.515360]  ? __pfx_kthread+0x10/0x10
[   12.515381]  ret_from_fork_asm+0x1a/0x30
[   12.515412]  </TASK>
[   12.515422] 
[   12.530531] Allocated by task 176:
[   12.530819]  kasan_save_stack+0x45/0x70
[   12.530967]  kasan_save_track+0x18/0x40
[   12.531114]  kasan_save_alloc_info+0x3b/0x50
[   12.531556]  __kasan_krealloc+0x190/0x1f0
[   12.531991]  krealloc_noprof+0xf3/0x340
[   12.532404]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.533040]  krealloc_less_oob+0x1c/0x30
[   12.533516]  kunit_try_run_case+0x1a5/0x480
[   12.533937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.534557]  kthread+0x337/0x6f0
[   12.534845]  ret_from_fork+0x116/0x1d0
[   12.534982]  ret_from_fork_asm+0x1a/0x30
[   12.535142] 
[   12.535334] The buggy address belongs to the object at ffff888100343800
[   12.535334]  which belongs to the cache kmalloc-256 of size 256
[   12.536505] The buggy address is located 17 bytes to the right of
[   12.536505]  allocated 201-byte region [ffff888100343800, ffff8881003438c9)
[   12.537498] 
[   12.537575] The buggy address belongs to the physical page:
[   12.538066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.538920] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.539832] flags: 0x200000000000040(head|node=0|zone=2)
[   12.540043] page_type: f5(slab)
[   12.540197] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.541025] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.541848] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.542212] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.542437] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.542758] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.543455] page dumped because: kasan: bad access detected
[   12.544040] 
[   12.544260] Memory state around the buggy address:
[   12.544851]  ffff888100343780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.545506]  ffff888100343800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.546226] >ffff888100343880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.546437]                                                     ^
[   12.546617]  ffff888100343900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.547427]  ffff888100343980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.548112] ==================================================================
[   12.455243] ==================================================================
[   12.456322] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.456575] Write of size 1 at addr ffff8881003438c9 by task kunit_try_catch/176
[   12.456800] 
[   12.456892] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.456937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.456949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.456970] Call Trace:
[   12.456981]  <TASK>
[   12.456996]  dump_stack_lvl+0x73/0xb0
[   12.457024]  print_report+0xd1/0x610
[   12.457047]  ? __virt_addr_valid+0x1db/0x2d0
[   12.457097]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.457121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.457145]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.457170]  kasan_report+0x141/0x180
[   12.457193]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.457222]  __asan_report_store1_noabort+0x1b/0x30
[   12.457248]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.457274]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.457300]  ? finish_task_switch.isra.0+0x153/0x700
[   12.457323]  ? __switch_to+0x47/0xf50
[   12.457349]  ? __schedule+0x10cc/0x2b60
[   12.457372]  ? __pfx_read_tsc+0x10/0x10
[   12.457397]  krealloc_less_oob+0x1c/0x30
[   12.457443]  kunit_try_run_case+0x1a5/0x480
[   12.457468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.457492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.457517]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.457541]  ? __kthread_parkme+0x82/0x180
[   12.457562]  ? preempt_count_sub+0x50/0x80
[   12.457586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.457610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.457635]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.457661]  kthread+0x337/0x6f0
[   12.457679]  ? trace_preempt_on+0x20/0xc0
[   12.457704]  ? __pfx_kthread+0x10/0x10
[   12.457737]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.457759]  ? calculate_sigpending+0x7b/0xa0
[   12.457783]  ? __pfx_kthread+0x10/0x10
[   12.457823]  ret_from_fork+0x116/0x1d0
[   12.457843]  ? __pfx_kthread+0x10/0x10
[   12.457864]  ret_from_fork_asm+0x1a/0x30
[   12.457913]  </TASK>
[   12.457925] 
[   12.472755] Allocated by task 176:
[   12.473215]  kasan_save_stack+0x45/0x70
[   12.473437]  kasan_save_track+0x18/0x40
[   12.473649]  kasan_save_alloc_info+0x3b/0x50
[   12.473936]  __kasan_krealloc+0x190/0x1f0
[   12.474136]  krealloc_noprof+0xf3/0x340
[   12.474340]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.474567]  krealloc_less_oob+0x1c/0x30
[   12.474782]  kunit_try_run_case+0x1a5/0x480
[   12.474998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.475298]  kthread+0x337/0x6f0
[   12.475444]  ret_from_fork+0x116/0x1d0
[   12.475634]  ret_from_fork_asm+0x1a/0x30
[   12.475865] 
[   12.476164] The buggy address belongs to the object at ffff888100343800
[   12.476164]  which belongs to the cache kmalloc-256 of size 256
[   12.476680] The buggy address is located 0 bytes to the right of
[   12.476680]  allocated 201-byte region [ffff888100343800, ffff8881003438c9)
[   12.477263] 
[   12.477451] The buggy address belongs to the physical page:
[   12.477831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.478257] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.478578] flags: 0x200000000000040(head|node=0|zone=2)
[   12.478844] page_type: f5(slab)
[   12.479107] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.479427] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.480084] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.480473] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.480892] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.481351] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.481701] page dumped because: kasan: bad access detected
[   12.481936] 
[   12.482084] Memory state around the buggy address:
[   12.482366]  ffff888100343780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.482800]  ffff888100343800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.483147] >ffff888100343880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.483445]                                               ^
[   12.483691]  ffff888100343900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.484024]  ffff888100343980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.484637] ==================================================================
[   12.790602] ==================================================================
[   12.791165] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.792119] Write of size 1 at addr ffff888102cae0eb by task kunit_try_catch/180
[   12.793222] 
[   12.793347] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.793401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.793414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.793436] Call Trace:
[   12.793450]  <TASK>
[   12.793466]  dump_stack_lvl+0x73/0xb0
[   12.793498]  print_report+0xd1/0x610
[   12.793521]  ? __virt_addr_valid+0x1db/0x2d0
[   12.793544]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.793568]  ? kasan_addr_to_slab+0x11/0xa0
[   12.793590]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.793615]  kasan_report+0x141/0x180
[   12.793637]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.793670]  __asan_report_store1_noabort+0x1b/0x30
[   12.793696]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.793723]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.793748]  ? finish_task_switch.isra.0+0x153/0x700
[   12.793770]  ? __switch_to+0x47/0xf50
[   12.793795]  ? __schedule+0x10cc/0x2b60
[   12.793817]  ? __pfx_read_tsc+0x10/0x10
[   12.793842]  krealloc_large_less_oob+0x1c/0x30
[   12.793865]  kunit_try_run_case+0x1a5/0x480
[   12.793890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.793913]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.793937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.793961]  ? __kthread_parkme+0x82/0x180
[   12.793981]  ? preempt_count_sub+0x50/0x80
[   12.794004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.794029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.794063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.794089]  kthread+0x337/0x6f0
[   12.794107]  ? trace_preempt_on+0x20/0xc0
[   12.794130]  ? __pfx_kthread+0x10/0x10
[   12.794151]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.794173]  ? calculate_sigpending+0x7b/0xa0
[   12.794197]  ? __pfx_kthread+0x10/0x10
[   12.794218]  ret_from_fork+0x116/0x1d0
[   12.794238]  ? __pfx_kthread+0x10/0x10
[   12.794258]  ret_from_fork_asm+0x1a/0x30
[   12.794289]  </TASK>
[   12.794299] 
[   12.802343] The buggy address belongs to the physical page:
[   12.802582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cac
[   12.802910] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.803227] flags: 0x200000000000040(head|node=0|zone=2)
[   12.803457] page_type: f8(unknown)
[   12.803638] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.803913] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.804378] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.804701] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.804983] head: 0200000000000002 ffffea00040b2b01 00000000ffffffff 00000000ffffffff
[   12.805576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.805833] page dumped because: kasan: bad access detected
[   12.806008] 
[   12.806108] Memory state around the buggy address:
[   12.806408]  ffff888102cadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.806730]  ffff888102cae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.807073] >ffff888102cae080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.807579]                                                           ^
[   12.807911]  ffff888102cae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.808232]  ffff888102cae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.808448] ==================================================================
[   12.682495] ==================================================================
[   12.682914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.683662] Write of size 1 at addr ffff888102cae0c9 by task kunit_try_catch/180
[   12.684371] 
[   12.684472] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.684516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.684528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.684548] Call Trace:
[   12.684561]  <TASK>
[   12.684576]  dump_stack_lvl+0x73/0xb0
[   12.684609]  print_report+0xd1/0x610
[   12.684633]  ? __virt_addr_valid+0x1db/0x2d0
[   12.684659]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.684684]  ? kasan_addr_to_slab+0x11/0xa0
[   12.684705]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.684730]  kasan_report+0x141/0x180
[   12.684752]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.684781]  __asan_report_store1_noabort+0x1b/0x30
[   12.684807]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.684833]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.684859]  ? finish_task_switch.isra.0+0x153/0x700
[   12.684883]  ? __switch_to+0x47/0xf50
[   12.684909]  ? __schedule+0x10cc/0x2b60
[   12.684931]  ? __pfx_read_tsc+0x10/0x10
[   12.684955]  krealloc_large_less_oob+0x1c/0x30
[   12.684979]  kunit_try_run_case+0x1a5/0x480
[   12.685004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.685067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.685091]  ? __kthread_parkme+0x82/0x180
[   12.685112]  ? preempt_count_sub+0x50/0x80
[   12.685148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.685238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.685263]  kthread+0x337/0x6f0
[   12.685283]  ? trace_preempt_on+0x20/0xc0
[   12.685306]  ? __pfx_kthread+0x10/0x10
[   12.685327]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.685348]  ? calculate_sigpending+0x7b/0xa0
[   12.685373]  ? __pfx_kthread+0x10/0x10
[   12.685394]  ret_from_fork+0x116/0x1d0
[   12.685413]  ? __pfx_kthread+0x10/0x10
[   12.685434]  ret_from_fork_asm+0x1a/0x30
[   12.685465]  </TASK>
[   12.685475] 
[   12.698618] The buggy address belongs to the physical page:
[   12.699124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cac
[   12.699904] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.700300] flags: 0x200000000000040(head|node=0|zone=2)
[   12.700907] page_type: f8(unknown)
[   12.701113] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.701650] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.702205] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.702801] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.703398] head: 0200000000000002 ffffea00040b2b01 00000000ffffffff 00000000ffffffff
[   12.703922] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.704319] page dumped because: kasan: bad access detected
[   12.704884] 
[   12.705012] Memory state around the buggy address:
[   12.705472]  ffff888102cadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.706020]  ffff888102cae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.706583] >ffff888102cae080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.707181]                                               ^
[   12.707558]  ffff888102cae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.708190]  ffff888102cae180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.708639] ==================================================================