Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.141589] ==================================================================
[   18.141660] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.141718] Write of size 1 at addr fff00000c47a5ada by task kunit_try_catch/158
[   18.141880] 
[   18.141929] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.142084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.142163] Hardware name: linux,dummy-virt (DT)
[   18.142194] Call trace:
[   18.142214]  show_stack+0x20/0x38 (C)
[   18.142263]  dump_stack_lvl+0x8c/0xd0
[   18.142467]  print_report+0x118/0x608
[   18.142727]  kasan_report+0xdc/0x128
[   18.142885]  __asan_report_store1_noabort+0x20/0x30
[   18.143074]  krealloc_less_oob_helper+0xa80/0xc50
[   18.143282]  krealloc_less_oob+0x20/0x38
[   18.143342]  kunit_try_run_case+0x170/0x3f0
[   18.143590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.143745]  kthread+0x328/0x630
[   18.143906]  ret_from_fork+0x10/0x20
[   18.144060] 
[   18.144108] Allocated by task 158:
[   18.144245]  kasan_save_stack+0x3c/0x68
[   18.144298]  kasan_save_track+0x20/0x40
[   18.144350]  kasan_save_alloc_info+0x40/0x58
[   18.144746]  __kasan_krealloc+0x118/0x178
[   18.145744]  krealloc_noprof+0x128/0x360
[   18.145833]  krealloc_less_oob_helper+0x168/0xc50
[   18.145887]  krealloc_less_oob+0x20/0x38
[   18.145923]  kunit_try_run_case+0x170/0x3f0
[   18.145983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.146430]  kthread+0x328/0x630
[   18.146538]  ret_from_fork+0x10/0x20
[   18.146776] 
[   18.147009] The buggy address belongs to the object at fff00000c47a5a00
[   18.147009]  which belongs to the cache kmalloc-256 of size 256
[   18.147174] The buggy address is located 17 bytes to the right of
[   18.147174]  allocated 201-byte region [fff00000c47a5a00, fff00000c47a5ac9)
[   18.147490] 
[   18.147578] The buggy address belongs to the physical page:
[   18.147657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047a4
[   18.147772] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.147910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.148040] page_type: f5(slab)
[   18.148354] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.148417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.148763] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.148942] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.149045] head: 0bfffe0000000001 ffffc1ffc311e901 00000000ffffffff 00000000ffffffff
[   18.149154] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.149296] page dumped because: kasan: bad access detected
[   18.149380] 
[   18.149442] Memory state around the buggy address:
[   18.149560]  fff00000c47a5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.149639]  fff00000c47a5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.149784] >fff00000c47a5a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.149878]                                                     ^
[   18.149915]  fff00000c47a5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.149956]  fff00000c47a5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.150007] ==================================================================
[   18.225309] ==================================================================
[   18.225359] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.225404] Write of size 1 at addr fff00000c78460eb by task kunit_try_catch/162
[   18.225576] 
[   18.225840] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.225986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.226015] Hardware name: linux,dummy-virt (DT)
[   18.226045] Call trace:
[   18.226065]  show_stack+0x20/0x38 (C)
[   18.226113]  dump_stack_lvl+0x8c/0xd0
[   18.226297]  print_report+0x118/0x608
[   18.226811]  kasan_report+0xdc/0x128
[   18.226904]  __asan_report_store1_noabort+0x20/0x30
[   18.226961]  krealloc_less_oob_helper+0xa58/0xc50
[   18.227009]  krealloc_large_less_oob+0x20/0x38
[   18.227155]  kunit_try_run_case+0x170/0x3f0
[   18.227208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.227398]  kthread+0x328/0x630
[   18.227586]  ret_from_fork+0x10/0x20
[   18.227710] 
[   18.227799] The buggy address belongs to the physical page:
[   18.228244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107844
[   18.228349] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.228479] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.228576] page_type: f8(unknown)
[   18.228620] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.228693] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.228766] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.228814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.228872] head: 0bfffe0000000002 ffffc1ffc31e1101 00000000ffffffff 00000000ffffffff
[   18.228928] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.228966] page dumped because: kasan: bad access detected
[   18.229009] 
[   18.229053] Memory state around the buggy address:
[   18.229093]  fff00000c7845f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.229142]  fff00000c7846000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.229182] >fff00000c7846080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.229220]                                                           ^
[   18.229257]  fff00000c7846100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.229309]  fff00000c7846180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.229352] ==================================================================
[   18.220230] ==================================================================
[   18.220316] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.220409] Write of size 1 at addr fff00000c78460ea by task kunit_try_catch/162
[   18.220458] 
[   18.220486] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.220674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.220705] Hardware name: linux,dummy-virt (DT)
[   18.220876] Call trace:
[   18.221062]  show_stack+0x20/0x38 (C)
[   18.221188]  dump_stack_lvl+0x8c/0xd0
[   18.221296]  print_report+0x118/0x608
[   18.221371]  kasan_report+0xdc/0x128
[   18.221478]  __asan_report_store1_noabort+0x20/0x30
[   18.221556]  krealloc_less_oob_helper+0xae4/0xc50
[   18.221652]  krealloc_large_less_oob+0x20/0x38
[   18.221754]  kunit_try_run_case+0x170/0x3f0
[   18.221849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.222172]  kthread+0x328/0x630
[   18.222309]  ret_from_fork+0x10/0x20
[   18.222371] 
[   18.222396] The buggy address belongs to the physical page:
[   18.222426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107844
[   18.222501] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.222549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.222597] page_type: f8(unknown)
[   18.222633] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.222682] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.222729] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.222787] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.223204] head: 0bfffe0000000002 ffffc1ffc31e1101 00000000ffffffff 00000000ffffffff
[   18.223259] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.223602] page dumped because: kasan: bad access detected
[   18.223715] 
[   18.223755] Memory state around the buggy address:
[   18.223787]  fff00000c7845f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.223981]  fff00000c7846000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.224081] >fff00000c7846080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.224290]                                                           ^
[   18.224338]  fff00000c7846100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.224662]  fff00000c7846180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.224730] ==================================================================
[   18.198158] ==================================================================
[   18.198254] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.198309] Write of size 1 at addr fff00000c78460c9 by task kunit_try_catch/162
[   18.198356] 
[   18.198410] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.198487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.198521] Hardware name: linux,dummy-virt (DT)
[   18.198552] Call trace:
[   18.198573]  show_stack+0x20/0x38 (C)
[   18.198621]  dump_stack_lvl+0x8c/0xd0
[   18.198674]  print_report+0x118/0x608
[   18.198720]  kasan_report+0xdc/0x128
[   18.199366]  __asan_report_store1_noabort+0x20/0x30
[   18.199446]  krealloc_less_oob_helper+0xa48/0xc50
[   18.199497]  krealloc_large_less_oob+0x20/0x38
[   18.199926]  kunit_try_run_case+0x170/0x3f0
[   18.200040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.200176]  kthread+0x328/0x630
[   18.200260]  ret_from_fork+0x10/0x20
[   18.200622] 
[   18.200666] The buggy address belongs to the physical page:
[   18.200731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107844
[   18.200784] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.201113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.201274] page_type: f8(unknown)
[   18.201315] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.201430] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.201752] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.202016] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.202142] head: 0bfffe0000000002 ffffc1ffc31e1101 00000000ffffffff 00000000ffffffff
[   18.202287] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.202385] page dumped because: kasan: bad access detected
[   18.202576] 
[   18.202855] Memory state around the buggy address:
[   18.202952]  fff00000c7845f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.203141]  fff00000c7846000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.203192] >fff00000c7846080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.203551]                                               ^
[   18.203620]  fff00000c7846100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.203704]  fff00000c7846180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.203845] ==================================================================
[   18.134549] ==================================================================
[   18.134713] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.134767] Write of size 1 at addr fff00000c47a5ad0 by task kunit_try_catch/158
[   18.134988] 
[   18.135201] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.135306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.135467] Hardware name: linux,dummy-virt (DT)
[   18.135650] Call trace:
[   18.135729]  show_stack+0x20/0x38 (C)
[   18.135797]  dump_stack_lvl+0x8c/0xd0
[   18.136019]  print_report+0x118/0x608
[   18.136262]  kasan_report+0xdc/0x128
[   18.136373]  __asan_report_store1_noabort+0x20/0x30
[   18.136481]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.136609]  krealloc_less_oob+0x20/0x38
[   18.136662]  kunit_try_run_case+0x170/0x3f0
[   18.136714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.136765]  kthread+0x328/0x630
[   18.136805]  ret_from_fork+0x10/0x20
[   18.136928] 
[   18.136948] Allocated by task 158:
[   18.136975]  kasan_save_stack+0x3c/0x68
[   18.137016]  kasan_save_track+0x20/0x40
[   18.137052]  kasan_save_alloc_info+0x40/0x58
[   18.137090]  __kasan_krealloc+0x118/0x178
[   18.137135]  krealloc_noprof+0x128/0x360
[   18.137171]  krealloc_less_oob_helper+0x168/0xc50
[   18.137208]  krealloc_less_oob+0x20/0x38
[   18.137258]  kunit_try_run_case+0x170/0x3f0
[   18.137294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.137335]  kthread+0x328/0x630
[   18.137376]  ret_from_fork+0x10/0x20
[   18.137420] 
[   18.137438] The buggy address belongs to the object at fff00000c47a5a00
[   18.137438]  which belongs to the cache kmalloc-256 of size 256
[   18.137500] The buggy address is located 7 bytes to the right of
[   18.137500]  allocated 201-byte region [fff00000c47a5a00, fff00000c47a5ac9)
[   18.137560] 
[   18.137594] The buggy address belongs to the physical page:
[   18.137623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047a4
[   18.137672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.137716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.137764] page_type: f5(slab)
[   18.137814] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.138182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.138466] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.138979] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.139130] head: 0bfffe0000000001 ffffc1ffc311e901 00000000ffffffff 00000000ffffffff
[   18.139243] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.139293] page dumped because: kasan: bad access detected
[   18.139323] 
[   18.139341] Memory state around the buggy address:
[   18.139539]  fff00000c47a5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.139702]  fff00000c47a5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.139851] >fff00000c47a5a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.139955]                                                  ^
[   18.140033]  fff00000c47a5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.140150]  fff00000c47a5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.140231] ==================================================================
[   18.205424] ==================================================================
[   18.205623] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.205813] Write of size 1 at addr fff00000c78460d0 by task kunit_try_catch/162
[   18.205881] 
[   18.205910] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.206184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.206229] Hardware name: linux,dummy-virt (DT)
[   18.206381] Call trace:
[   18.206459]  show_stack+0x20/0x38 (C)
[   18.206517]  dump_stack_lvl+0x8c/0xd0
[   18.206571]  print_report+0x118/0x608
[   18.206617]  kasan_report+0xdc/0x128
[   18.206661]  __asan_report_store1_noabort+0x20/0x30
[   18.206708]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.206896]  krealloc_large_less_oob+0x20/0x38
[   18.207109]  kunit_try_run_case+0x170/0x3f0
[   18.207292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.207422]  kthread+0x328/0x630
[   18.207602]  ret_from_fork+0x10/0x20
[   18.208087] 
[   18.208193] The buggy address belongs to the physical page:
[   18.208225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107844
[   18.208741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.208959] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.209110] page_type: f8(unknown)
[   18.209190] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.209287] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.209523] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.209584] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.209631] head: 0bfffe0000000002 ffffc1ffc31e1101 00000000ffffffff 00000000ffffffff
[   18.209687] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.209736] page dumped because: kasan: bad access detected
[   18.209766] 
[   18.209783] Memory state around the buggy address:
[   18.209822]  fff00000c7845f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.209884]  fff00000c7846000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.209925] >fff00000c7846080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.209981]                                                  ^
[   18.210019]  fff00000c7846100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.210061]  fff00000c7846180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.210098] ==================================================================
[   18.126214] ==================================================================
[   18.126275] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.126326] Write of size 1 at addr fff00000c47a5ac9 by task kunit_try_catch/158
[   18.126375] 
[   18.126405] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.126560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.126601] Hardware name: linux,dummy-virt (DT)
[   18.126631] Call trace:
[   18.126652]  show_stack+0x20/0x38 (C)
[   18.126700]  dump_stack_lvl+0x8c/0xd0
[   18.126745]  print_report+0x118/0x608
[   18.127069]  kasan_report+0xdc/0x128
[   18.127145]  __asan_report_store1_noabort+0x20/0x30
[   18.127232]  krealloc_less_oob_helper+0xa48/0xc50
[   18.127319]  krealloc_less_oob+0x20/0x38
[   18.127405]  kunit_try_run_case+0x170/0x3f0
[   18.127503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.127666]  kthread+0x328/0x630
[   18.127738]  ret_from_fork+0x10/0x20
[   18.127838] 
[   18.127909] Allocated by task 158:
[   18.127978]  kasan_save_stack+0x3c/0x68
[   18.128035]  kasan_save_track+0x20/0x40
[   18.128071]  kasan_save_alloc_info+0x40/0x58
[   18.128355]  __kasan_krealloc+0x118/0x178
[   18.128715]  krealloc_noprof+0x128/0x360
[   18.128777]  krealloc_less_oob_helper+0x168/0xc50
[   18.128851]  krealloc_less_oob+0x20/0x38
[   18.128942]  kunit_try_run_case+0x170/0x3f0
[   18.129004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.129146]  kthread+0x328/0x630
[   18.129637]  ret_from_fork+0x10/0x20
[   18.129706] 
[   18.129754] The buggy address belongs to the object at fff00000c47a5a00
[   18.129754]  which belongs to the cache kmalloc-256 of size 256
[   18.129838] The buggy address is located 0 bytes to the right of
[   18.129838]  allocated 201-byte region [fff00000c47a5a00, fff00000c47a5ac9)
[   18.129983] 
[   18.130003] The buggy address belongs to the physical page:
[   18.130063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047a4
[   18.130405] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.130533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.130611] page_type: f5(slab)
[   18.130684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.130887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.131254] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.131361] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.131514] head: 0bfffe0000000001 ffffc1ffc311e901 00000000ffffffff 00000000ffffffff
[   18.131628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.131668] page dumped because: kasan: bad access detected
[   18.131697] 
[   18.132148] Memory state around the buggy address:
[   18.132240]  fff00000c47a5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132288]  fff00000c47a5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.132329] >fff00000c47a5a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.132364]                                               ^
[   18.132398]  fff00000c47a5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132438]  fff00000c47a5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132606] ==================================================================
[   18.152813] ==================================================================
[   18.152906] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.152990] Write of size 1 at addr fff00000c47a5aea by task kunit_try_catch/158
[   18.153256] 
[   18.153301] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.153389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.153533] Hardware name: linux,dummy-virt (DT)
[   18.153576] Call trace:
[   18.153597]  show_stack+0x20/0x38 (C)
[   18.153645]  dump_stack_lvl+0x8c/0xd0
[   18.153692]  print_report+0x118/0x608
[   18.153737]  kasan_report+0xdc/0x128
[   18.153797]  __asan_report_store1_noabort+0x20/0x30
[   18.153844]  krealloc_less_oob_helper+0xae4/0xc50
[   18.153904]  krealloc_less_oob+0x20/0x38
[   18.154119]  kunit_try_run_case+0x170/0x3f0
[   18.154365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.154466]  kthread+0x328/0x630
[   18.154509]  ret_from_fork+0x10/0x20
[   18.154564] 
[   18.154582] Allocated by task 158:
[   18.154844]  kasan_save_stack+0x3c/0x68
[   18.155029]  kasan_save_track+0x20/0x40
[   18.155121]  kasan_save_alloc_info+0x40/0x58
[   18.155244]  __kasan_krealloc+0x118/0x178
[   18.155284]  krealloc_noprof+0x128/0x360
[   18.155340]  krealloc_less_oob_helper+0x168/0xc50
[   18.155592]  krealloc_less_oob+0x20/0x38
[   18.155802]  kunit_try_run_case+0x170/0x3f0
[   18.155847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.156279]  kthread+0x328/0x630
[   18.156405]  ret_from_fork+0x10/0x20
[   18.156555] 
[   18.156726] The buggy address belongs to the object at fff00000c47a5a00
[   18.156726]  which belongs to the cache kmalloc-256 of size 256
[   18.156824] The buggy address is located 33 bytes to the right of
[   18.156824]  allocated 201-byte region [fff00000c47a5a00, fff00000c47a5ac9)
[   18.157161] 
[   18.157479] The buggy address belongs to the physical page:
[   18.157539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047a4
[   18.157688] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.157766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.158242] page_type: f5(slab)
[   18.158317] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.158520] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.158739] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.158791] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.158979] head: 0bfffe0000000001 ffffc1ffc311e901 00000000ffffffff 00000000ffffffff
[   18.159178] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.159263] page dumped because: kasan: bad access detected
[   18.159411] 
[   18.159437] Memory state around the buggy address:
[   18.159505]  fff00000c47a5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.159966]  fff00000c47a5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.160012] >fff00000c47a5a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.160050]                                                           ^
[   18.160088]  fff00000c47a5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.160129]  fff00000c47a5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.160166] ==================================================================
[   18.212459] ==================================================================
[   18.212507] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.212925] Write of size 1 at addr fff00000c78460da by task kunit_try_catch/162
[   18.213036] 
[   18.213145] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.213225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.213250] Hardware name: linux,dummy-virt (DT)
[   18.213320] Call trace:
[   18.213348]  show_stack+0x20/0x38 (C)
[   18.213421]  dump_stack_lvl+0x8c/0xd0
[   18.213750]  print_report+0x118/0x608
[   18.213810]  kasan_report+0xdc/0x128
[   18.213854]  __asan_report_store1_noabort+0x20/0x30
[   18.213963]  krealloc_less_oob_helper+0xa80/0xc50
[   18.214059]  krealloc_large_less_oob+0x20/0x38
[   18.214231]  kunit_try_run_case+0x170/0x3f0
[   18.214282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.214499]  kthread+0x328/0x630
[   18.214548]  ret_from_fork+0x10/0x20
[   18.214602] 
[   18.214710] The buggy address belongs to the physical page:
[   18.214817] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107844
[   18.215111] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.215356] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.215555] page_type: f8(unknown)
[   18.215630] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.215834] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.216202] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.216321] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.216384] head: 0bfffe0000000002 ffffc1ffc31e1101 00000000ffffffff 00000000ffffffff
[   18.216576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.216799] page dumped because: kasan: bad access detected
[   18.216852] 
[   18.216970] Memory state around the buggy address:
[   18.217151]  fff00000c7845f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.217273]  fff00000c7846000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.217348] >fff00000c7846080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.218399]                                                     ^
[   18.218730]  fff00000c7846100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.219286]  fff00000c7846180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.219361] ==================================================================
[   18.162027] ==================================================================
[   18.162110] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.162165] Write of size 1 at addr fff00000c47a5aeb by task kunit_try_catch/158
[   18.162232] 
[   18.162262] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.162340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.162365] Hardware name: linux,dummy-virt (DT)
[   18.162533] Call trace:
[   18.162645]  show_stack+0x20/0x38 (C)
[   18.162813]  dump_stack_lvl+0x8c/0xd0
[   18.162874]  print_report+0x118/0x608
[   18.162920]  kasan_report+0xdc/0x128
[   18.163605]  __asan_report_store1_noabort+0x20/0x30
[   18.163754]  krealloc_less_oob_helper+0xa58/0xc50
[   18.163855]  krealloc_less_oob+0x20/0x38
[   18.163923]  kunit_try_run_case+0x170/0x3f0
[   18.163970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.164031]  kthread+0x328/0x630
[   18.164072]  ret_from_fork+0x10/0x20
[   18.164118] 
[   18.164157] Allocated by task 158:
[   18.164192]  kasan_save_stack+0x3c/0x68
[   18.164246]  kasan_save_track+0x20/0x40
[   18.164286]  kasan_save_alloc_info+0x40/0x58
[   18.164325]  __kasan_krealloc+0x118/0x178
[   18.164362]  krealloc_noprof+0x128/0x360
[   18.164400]  krealloc_less_oob_helper+0x168/0xc50
[   18.164450]  krealloc_less_oob+0x20/0x38
[   18.164486]  kunit_try_run_case+0x170/0x3f0
[   18.164550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.164592]  kthread+0x328/0x630
[   18.164625]  ret_from_fork+0x10/0x20
[   18.164671] 
[   18.164689] The buggy address belongs to the object at fff00000c47a5a00
[   18.164689]  which belongs to the cache kmalloc-256 of size 256
[   18.164753] The buggy address is located 34 bytes to the right of
[   18.164753]  allocated 201-byte region [fff00000c47a5a00, fff00000c47a5ac9)
[   18.164820] 
[   18.164840] The buggy address belongs to the physical page:
[   18.164893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047a4
[   18.164956] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.165009] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.165073] page_type: f5(slab)
[   18.165114] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.165171] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.165226] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.165273] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.165320] head: 0bfffe0000000001 ffffc1ffc311e901 00000000ffffffff 00000000ffffffff
[   18.165365] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.165403] page dumped because: kasan: bad access detected
[   18.165432] 
[   18.165449] Memory state around the buggy address:
[   18.165478]  fff00000c47a5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.165518]  fff00000c47a5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.165564] >fff00000c47a5a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.165600]                                                           ^
[   18.165636]  fff00000c47a5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.165686]  fff00000c47a5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.165722] ==================================================================

[   11.458308] ==================================================================
[   11.458580] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.459070] Write of size 1 at addr ffff888102a2a0d0 by task kunit_try_catch/180
[   11.459570] 
[   11.459661] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.459702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.459714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.459733] Call Trace:
[   11.459747]  <TASK>
[   11.459761]  dump_stack_lvl+0x73/0xb0
[   11.459800]  print_report+0xd1/0x650
[   11.459822]  ? __virt_addr_valid+0x1db/0x2d0
[   11.459844]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.459879]  ? kasan_addr_to_slab+0x11/0xa0
[   11.459899]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.459923]  kasan_report+0x141/0x180
[   11.459956]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.459984]  __asan_report_store1_noabort+0x1b/0x30
[   11.460004]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.460040]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.460066]  ? __kasan_check_write+0x18/0x20
[   11.460085]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.460106]  ? irqentry_exit+0x2a/0x60
[   11.460127]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.460151]  ? trace_hardirqs_on+0x37/0xe0
[   11.460173]  ? __pfx_read_tsc+0x10/0x10
[   11.460197]  krealloc_large_less_oob+0x1c/0x30
[   11.460219]  kunit_try_run_case+0x1a5/0x480
[   11.460243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.460266]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.460288]  ? __kthread_parkme+0x82/0x180
[   11.460308]  ? preempt_count_sub+0x50/0x80
[   11.460331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.460364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.460387]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.460409]  kthread+0x337/0x6f0
[   11.460439]  ? trace_preempt_on+0x20/0xc0
[   11.460469]  ? __pfx_kthread+0x10/0x10
[   11.460490]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.460510]  ? calculate_sigpending+0x7b/0xa0
[   11.460541]  ? __pfx_kthread+0x10/0x10
[   11.460562]  ret_from_fork+0x116/0x1d0
[   11.460580]  ? __pfx_kthread+0x10/0x10
[   11.460600]  ret_from_fork_asm+0x1a/0x30
[   11.460641]  </TASK>
[   11.460652] 
[   11.468640] The buggy address belongs to the physical page:
[   11.469070] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a28
[   11.469837] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.470541] flags: 0x200000000000040(head|node=0|zone=2)
[   11.471262] page_type: f8(unknown)
[   11.471521] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.471986] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.472404] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.472868] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.473285] head: 0200000000000002 ffffea00040a8a01 00000000ffffffff 00000000ffffffff
[   11.473718] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.474134] page dumped because: kasan: bad access detected
[   11.474476] 
[   11.474580] Memory state around the buggy address:
[   11.474986]  ffff888102a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.475398]  ffff888102a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.475861] >ffff888102a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.476175]                                                  ^
[   11.476517]  ffff888102a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.476901]  ffff888102a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.477249] ==================================================================
[   11.516382] ==================================================================
[   11.516923] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.517163] Write of size 1 at addr ffff888102a2a0eb by task kunit_try_catch/180
[   11.517385] 
[   11.517482] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.517523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.517535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.517555] Call Trace:
[   11.517568]  <TASK>
[   11.517582]  dump_stack_lvl+0x73/0xb0
[   11.517607]  print_report+0xd1/0x650
[   11.517628]  ? __virt_addr_valid+0x1db/0x2d0
[   11.517650]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.517694]  ? kasan_addr_to_slab+0x11/0xa0
[   11.517714]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.517737]  kasan_report+0x141/0x180
[   11.517758]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.517786]  __asan_report_store1_noabort+0x1b/0x30
[   11.517806]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.517831]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.517855]  ? __kasan_check_write+0x18/0x20
[   11.517893]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.517914]  ? irqentry_exit+0x2a/0x60
[   11.517934]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.517956]  ? trace_hardirqs_on+0x37/0xe0
[   11.517978]  ? __pfx_read_tsc+0x10/0x10
[   11.518001]  krealloc_large_less_oob+0x1c/0x30
[   11.518022]  kunit_try_run_case+0x1a5/0x480
[   11.518045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.518086]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.518107]  ? __kthread_parkme+0x82/0x180
[   11.518127]  ? preempt_count_sub+0x50/0x80
[   11.518166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.518189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.518210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.518232]  kthread+0x337/0x6f0
[   11.518251]  ? trace_preempt_on+0x20/0xc0
[   11.518271]  ? __pfx_kthread+0x10/0x10
[   11.518291]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.518328]  ? calculate_sigpending+0x7b/0xa0
[   11.518350]  ? __pfx_kthread+0x10/0x10
[   11.518371]  ret_from_fork+0x116/0x1d0
[   11.518388]  ? __pfx_kthread+0x10/0x10
[   11.518408]  ret_from_fork_asm+0x1a/0x30
[   11.518437]  </TASK>
[   11.518448] 
[   11.526229] The buggy address belongs to the physical page:
[   11.526551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a28
[   11.527119] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.527489] flags: 0x200000000000040(head|node=0|zone=2)
[   11.527772] page_type: f8(unknown)
[   11.527935] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.528160] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.528443] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.528945] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.529283] head: 0200000000000002 ffffea00040a8a01 00000000ffffffff 00000000ffffffff
[   11.529654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.529950] page dumped because: kasan: bad access detected
[   11.530238] 
[   11.530364] Memory state around the buggy address:
[   11.530619]  ffff888102a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.530927]  ffff888102a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.531249] >ffff888102a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.531566]                                                           ^
[   11.531935]  ffff888102a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.532140]  ffff888102a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.532343] ==================================================================
[   11.270891] ==================================================================
[   11.271451] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.271807] Write of size 1 at addr ffff88810033e4d0 by task kunit_try_catch/176
[   11.272095] 
[   11.272252] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.272296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.272308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.272328] Call Trace:
[   11.272340]  <TASK>
[   11.272355]  dump_stack_lvl+0x73/0xb0
[   11.272380]  print_report+0xd1/0x650
[   11.272401]  ? __virt_addr_valid+0x1db/0x2d0
[   11.272422]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.272444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.272477]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.272499]  kasan_report+0x141/0x180
[   11.272521]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.272548]  __asan_report_store1_noabort+0x1b/0x30
[   11.272567]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.272592]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.272614]  ? finish_task_switch.isra.0+0x153/0x700
[   11.272635]  ? __switch_to+0x47/0xf50
[   11.272659]  ? __schedule+0x10cc/0x2b60
[   11.272679]  ? __pfx_read_tsc+0x10/0x10
[   11.272702]  krealloc_less_oob+0x1c/0x30
[   11.272723]  kunit_try_run_case+0x1a5/0x480
[   11.272746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.272767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.272789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.272811]  ? __kthread_parkme+0x82/0x180
[   11.272830]  ? preempt_count_sub+0x50/0x80
[   11.272851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.272874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.272895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.272917]  kthread+0x337/0x6f0
[   11.272935]  ? trace_preempt_on+0x20/0xc0
[   11.272957]  ? __pfx_kthread+0x10/0x10
[   11.272977]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.272997]  ? calculate_sigpending+0x7b/0xa0
[   11.273019]  ? __pfx_kthread+0x10/0x10
[   11.273040]  ret_from_fork+0x116/0x1d0
[   11.273057]  ? __pfx_kthread+0x10/0x10
[   11.273077]  ret_from_fork_asm+0x1a/0x30
[   11.273106]  </TASK>
[   11.273116] 
[   11.281218] Allocated by task 176:
[   11.281356]  kasan_save_stack+0x45/0x70
[   11.281546]  kasan_save_track+0x18/0x40
[   11.281797]  kasan_save_alloc_info+0x3b/0x50
[   11.282030]  __kasan_krealloc+0x190/0x1f0
[   11.282286]  krealloc_noprof+0xf3/0x340
[   11.282476]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.282660]  krealloc_less_oob+0x1c/0x30
[   11.282858]  kunit_try_run_case+0x1a5/0x480
[   11.283046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.283438]  kthread+0x337/0x6f0
[   11.283621]  ret_from_fork+0x116/0x1d0
[   11.283842]  ret_from_fork_asm+0x1a/0x30
[   11.284027] 
[   11.284127] The buggy address belongs to the object at ffff88810033e400
[   11.284127]  which belongs to the cache kmalloc-256 of size 256
[   11.284677] The buggy address is located 7 bytes to the right of
[   11.284677]  allocated 201-byte region [ffff88810033e400, ffff88810033e4c9)
[   11.285170] 
[   11.285349] The buggy address belongs to the physical page:
[   11.285609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   11.285983] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.286368] flags: 0x200000000000040(head|node=0|zone=2)
[   11.286579] page_type: f5(slab)
[   11.286702] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.286932] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.287163] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.287548] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.288223] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   11.288578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.288931] page dumped because: kasan: bad access detected
[   11.289135] 
[   11.289361] Memory state around the buggy address:
[   11.289620]  ffff88810033e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.289987]  ffff88810033e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.290227] >ffff88810033e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.290438]                                                  ^
[   11.290715]  ffff88810033e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.291170]  ffff88810033e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.291560] ==================================================================
[   11.292134] ==================================================================
[   11.292513] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.292984] Write of size 1 at addr ffff88810033e4da by task kunit_try_catch/176
[   11.293371] 
[   11.293490] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.293531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.293543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.293563] Call Trace:
[   11.293575]  <TASK>
[   11.293590]  dump_stack_lvl+0x73/0xb0
[   11.293616]  print_report+0xd1/0x650
[   11.293637]  ? __virt_addr_valid+0x1db/0x2d0
[   11.293658]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.293680]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.293701]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.293724]  kasan_report+0x141/0x180
[   11.293745]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.293772]  __asan_report_store1_noabort+0x1b/0x30
[   11.293792]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.293816]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.293839]  ? finish_task_switch.isra.0+0x153/0x700
[   11.293860]  ? __switch_to+0x47/0xf50
[   11.293884]  ? __schedule+0x10cc/0x2b60
[   11.293905]  ? __pfx_read_tsc+0x10/0x10
[   11.293927]  krealloc_less_oob+0x1c/0x30
[   11.293948]  kunit_try_run_case+0x1a5/0x480
[   11.293970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.293991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.294013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.294035]  ? __kthread_parkme+0x82/0x180
[   11.294053]  ? preempt_count_sub+0x50/0x80
[   11.294075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.294097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.294119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.294140]  kthread+0x337/0x6f0
[   11.294159]  ? trace_preempt_on+0x20/0xc0
[   11.294180]  ? __pfx_kthread+0x10/0x10
[   11.294200]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.294220]  ? calculate_sigpending+0x7b/0xa0
[   11.294242]  ? __pfx_kthread+0x10/0x10
[   11.294262]  ret_from_fork+0x116/0x1d0
[   11.294280]  ? __pfx_kthread+0x10/0x10
[   11.294299]  ret_from_fork_asm+0x1a/0x30
[   11.294328]  </TASK>
[   11.294338] 
[   11.302304] Allocated by task 176:
[   11.302966]  kasan_save_stack+0x45/0x70
[   11.303558]  kasan_save_track+0x18/0x40
[   11.304196]  kasan_save_alloc_info+0x3b/0x50
[   11.304800]  __kasan_krealloc+0x190/0x1f0
[   11.305048]  krealloc_noprof+0xf3/0x340
[   11.305433]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.306027]  krealloc_less_oob+0x1c/0x30
[   11.306800]  kunit_try_run_case+0x1a5/0x480
[   11.307057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.307586]  kthread+0x337/0x6f0
[   11.308134]  ret_from_fork+0x116/0x1d0
[   11.308878]  ret_from_fork_asm+0x1a/0x30
[   11.309341] 
[   11.309439] The buggy address belongs to the object at ffff88810033e400
[   11.309439]  which belongs to the cache kmalloc-256 of size 256
[   11.310384] The buggy address is located 17 bytes to the right of
[   11.310384]  allocated 201-byte region [ffff88810033e400, ffff88810033e4c9)
[   11.312013] 
[   11.312414] The buggy address belongs to the physical page:
[   11.313038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   11.313313] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.314210] flags: 0x200000000000040(head|node=0|zone=2)
[   11.314709] page_type: f5(slab)
[   11.315079] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.315615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.316380] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.316888] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.317123] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   11.317807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.318565] page dumped because: kasan: bad access detected
[   11.319076] 
[   11.319279] Memory state around the buggy address:
[   11.319824]  ffff88810033e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.320544]  ffff88810033e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.321094] >ffff88810033e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.321681]                                                     ^
[   11.322304]  ffff88810033e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.322938]  ffff88810033e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.323488] ==================================================================
[   11.241135] ==================================================================
[   11.241878] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.242591] Write of size 1 at addr ffff88810033e4c9 by task kunit_try_catch/176
[   11.243314] 
[   11.243480] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.243525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.243537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.243558] Call Trace:
[   11.243571]  <TASK>
[   11.243586]  dump_stack_lvl+0x73/0xb0
[   11.243613]  print_report+0xd1/0x650
[   11.243635]  ? __virt_addr_valid+0x1db/0x2d0
[   11.243656]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.243678]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.243699]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.243722]  kasan_report+0x141/0x180
[   11.243743]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.243770]  __asan_report_store1_noabort+0x1b/0x30
[   11.243789]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.243814]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.243837]  ? finish_task_switch.isra.0+0x153/0x700
[   11.243857]  ? __switch_to+0x47/0xf50
[   11.243882]  ? __schedule+0x10cc/0x2b60
[   11.243903]  ? __pfx_read_tsc+0x10/0x10
[   11.243926]  krealloc_less_oob+0x1c/0x30
[   11.243946]  kunit_try_run_case+0x1a5/0x480
[   11.243969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.243990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.244011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.244033]  ? __kthread_parkme+0x82/0x180
[   11.244053]  ? preempt_count_sub+0x50/0x80
[   11.244075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.244097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.244118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.244140]  kthread+0x337/0x6f0
[   11.244158]  ? trace_preempt_on+0x20/0xc0
[   11.244180]  ? __pfx_kthread+0x10/0x10
[   11.244200]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.244220]  ? calculate_sigpending+0x7b/0xa0
[   11.244242]  ? __pfx_kthread+0x10/0x10
[   11.244262]  ret_from_fork+0x116/0x1d0
[   11.244279]  ? __pfx_kthread+0x10/0x10
[   11.244299]  ret_from_fork_asm+0x1a/0x30
[   11.244328]  </TASK>
[   11.244339] 
[   11.257730] Allocated by task 176:
[   11.258098]  kasan_save_stack+0x45/0x70
[   11.258536]  kasan_save_track+0x18/0x40
[   11.258928]  kasan_save_alloc_info+0x3b/0x50
[   11.259111]  __kasan_krealloc+0x190/0x1f0
[   11.259302]  krealloc_noprof+0xf3/0x340
[   11.259672]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.260153]  krealloc_less_oob+0x1c/0x30
[   11.260568]  kunit_try_run_case+0x1a5/0x480
[   11.260955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.261165]  kthread+0x337/0x6f0
[   11.261710]  ret_from_fork+0x116/0x1d0
[   11.262090]  ret_from_fork_asm+0x1a/0x30
[   11.262503] 
[   11.262630] The buggy address belongs to the object at ffff88810033e400
[   11.262630]  which belongs to the cache kmalloc-256 of size 256
[   11.263027] The buggy address is located 0 bytes to the right of
[   11.263027]  allocated 201-byte region [ffff88810033e400, ffff88810033e4c9)
[   11.263506] 
[   11.263611] The buggy address belongs to the physical page:
[   11.263988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   11.264320] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.264668] flags: 0x200000000000040(head|node=0|zone=2)
[   11.264940] page_type: f5(slab)
[   11.265101] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.265601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.265868] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.266394] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.266738] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   11.267030] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.267318] page dumped because: kasan: bad access detected
[   11.267626] 
[   11.267722] Memory state around the buggy address:
[   11.267952]  ffff88810033e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.268227]  ffff88810033e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.268544] >ffff88810033e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.268807]                                               ^
[   11.269124]  ffff88810033e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.269506]  ffff88810033e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.269876] ==================================================================
[   11.477822] ==================================================================
[   11.478088] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.479023] Write of size 1 at addr ffff888102a2a0da by task kunit_try_catch/180
[   11.479266] 
[   11.479359] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.479401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.479414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.479435] Call Trace:
[   11.479463]  <TASK>
[   11.479479]  dump_stack_lvl+0x73/0xb0
[   11.479508]  print_report+0xd1/0x650
[   11.479529]  ? __virt_addr_valid+0x1db/0x2d0
[   11.479550]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.479572]  ? kasan_addr_to_slab+0x11/0xa0
[   11.479592]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.479614]  kasan_report+0x141/0x180
[   11.479635]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.479685]  __asan_report_store1_noabort+0x1b/0x30
[   11.479706]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.479731]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.479756]  ? __kasan_check_write+0x18/0x20
[   11.479774]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.479795]  ? irqentry_exit+0x2a/0x60
[   11.479815]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.479838]  ? trace_hardirqs_on+0x37/0xe0
[   11.479860]  ? __pfx_read_tsc+0x10/0x10
[   11.479883]  krealloc_large_less_oob+0x1c/0x30
[   11.479904]  kunit_try_run_case+0x1a5/0x480
[   11.479928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.479951]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.479973]  ? __kthread_parkme+0x82/0x180
[   11.479992]  ? preempt_count_sub+0x50/0x80
[   11.480014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.480036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.480058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.480079]  kthread+0x337/0x6f0
[   11.480098]  ? trace_preempt_on+0x20/0xc0
[   11.480118]  ? __pfx_kthread+0x10/0x10
[   11.480138]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.480157]  ? calculate_sigpending+0x7b/0xa0
[   11.480179]  ? __pfx_kthread+0x10/0x10
[   11.480200]  ret_from_fork+0x116/0x1d0
[   11.480217]  ? __pfx_kthread+0x10/0x10
[   11.480237]  ret_from_fork_asm+0x1a/0x30
[   11.480266]  </TASK>
[   11.480277] 
[   11.488415] The buggy address belongs to the physical page:
[   11.488621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a28
[   11.488903] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.489406] flags: 0x200000000000040(head|node=0|zone=2)
[   11.489893] page_type: f8(unknown)
[   11.490217] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.491186] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.491619] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.492632] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.493358] head: 0200000000000002 ffffea00040a8a01 00000000ffffffff 00000000ffffffff
[   11.494035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.494280] page dumped because: kasan: bad access detected
[   11.494466] 
[   11.494541] Memory state around the buggy address:
[   11.494773]  ffff888102a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.495361]  ffff888102a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.495979] >ffff888102a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.496575]                                                     ^
[   11.497206]  ffff888102a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.497906]  ffff888102a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.498529] ==================================================================
[   11.499156] ==================================================================
[   11.499391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.500080] Write of size 1 at addr ffff888102a2a0ea by task kunit_try_catch/180
[   11.500580] 
[   11.500694] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.500733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.500746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.500766] Call Trace:
[   11.500781]  <TASK>
[   11.500796]  dump_stack_lvl+0x73/0xb0
[   11.500823]  print_report+0xd1/0x650
[   11.500844]  ? __virt_addr_valid+0x1db/0x2d0
[   11.500865]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.500887]  ? kasan_addr_to_slab+0x11/0xa0
[   11.500907]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.500930]  kasan_report+0x141/0x180
[   11.500951]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.500979]  __asan_report_store1_noabort+0x1b/0x30
[   11.500999]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.501024]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.501049]  ? __kasan_check_write+0x18/0x20
[   11.501068]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.501089]  ? irqentry_exit+0x2a/0x60
[   11.501110]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.501133]  ? trace_hardirqs_on+0x37/0xe0
[   11.501154]  ? __pfx_read_tsc+0x10/0x10
[   11.501177]  krealloc_large_less_oob+0x1c/0x30
[   11.501199]  kunit_try_run_case+0x1a5/0x480
[   11.501222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.501245]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.501301]  ? __kthread_parkme+0x82/0x180
[   11.501323]  ? preempt_count_sub+0x50/0x80
[   11.501346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.501368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.501396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.501418]  kthread+0x337/0x6f0
[   11.501437]  ? trace_preempt_on+0x20/0xc0
[   11.501476]  ? __pfx_kthread+0x10/0x10
[   11.501496]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.501517]  ? calculate_sigpending+0x7b/0xa0
[   11.501540]  ? __pfx_kthread+0x10/0x10
[   11.501560]  ret_from_fork+0x116/0x1d0
[   11.501578]  ? __pfx_kthread+0x10/0x10
[   11.501597]  ret_from_fork_asm+0x1a/0x30
[   11.501627]  </TASK>
[   11.501638] 
[   11.509797] The buggy address belongs to the physical page:
[   11.510047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a28
[   11.510375] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.510705] flags: 0x200000000000040(head|node=0|zone=2)
[   11.510919] page_type: f8(unknown)
[   11.511093] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.511431] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.511787] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.512074] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.512607] head: 0200000000000002 ffffea00040a8a01 00000000ffffffff 00000000ffffffff
[   11.512941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.513279] page dumped because: kasan: bad access detected
[   11.513513] 
[   11.513584] Memory state around the buggy address:
[   11.513839]  ffff888102a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.514152]  ffff888102a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.514387] >ffff888102a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.514741]                                                           ^
[   11.515049]  ffff888102a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.515379]  ffff888102a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.515694] ==================================================================
[   11.324118] ==================================================================
[   11.324527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.325284] Write of size 1 at addr ffff88810033e4ea by task kunit_try_catch/176
[   11.325887] 
[   11.326068] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.326122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.326133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.326153] Call Trace:
[   11.326170]  <TASK>
[   11.326187]  dump_stack_lvl+0x73/0xb0
[   11.326214]  print_report+0xd1/0x650
[   11.326235]  ? __virt_addr_valid+0x1db/0x2d0
[   11.326256]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.326288]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.326309]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.326332]  kasan_report+0x141/0x180
[   11.326364]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.326391]  __asan_report_store1_noabort+0x1b/0x30
[   11.326410]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.326435]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.326466]  ? finish_task_switch.isra.0+0x153/0x700
[   11.326486]  ? __switch_to+0x47/0xf50
[   11.326510]  ? __schedule+0x10cc/0x2b60
[   11.326531]  ? __pfx_read_tsc+0x10/0x10
[   11.326554]  krealloc_less_oob+0x1c/0x30
[   11.326575]  kunit_try_run_case+0x1a5/0x480
[   11.326597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.326618]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.326640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.326671]  ? __kthread_parkme+0x82/0x180
[   11.326691]  ? preempt_count_sub+0x50/0x80
[   11.326713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.326745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.326767]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.326789]  kthread+0x337/0x6f0
[   11.326807]  ? trace_preempt_on+0x20/0xc0
[   11.326829]  ? __pfx_kthread+0x10/0x10
[   11.326848]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.326868]  ? calculate_sigpending+0x7b/0xa0
[   11.326890]  ? __pfx_kthread+0x10/0x10
[   11.326911]  ret_from_fork+0x116/0x1d0
[   11.326928]  ? __pfx_kthread+0x10/0x10
[   11.326947]  ret_from_fork_asm+0x1a/0x30
[   11.326977]  </TASK>
[   11.326988] 
[   11.341230] Allocated by task 176:
[   11.341660]  kasan_save_stack+0x45/0x70
[   11.342067]  kasan_save_track+0x18/0x40
[   11.342633]  kasan_save_alloc_info+0x3b/0x50
[   11.342835]  __kasan_krealloc+0x190/0x1f0
[   11.343507]  krealloc_noprof+0xf3/0x340
[   11.343915]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.344372]  krealloc_less_oob+0x1c/0x30
[   11.344532]  kunit_try_run_case+0x1a5/0x480
[   11.344690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.345260]  kthread+0x337/0x6f0
[   11.345675]  ret_from_fork+0x116/0x1d0
[   11.346035]  ret_from_fork_asm+0x1a/0x30
[   11.346443] 
[   11.346703] The buggy address belongs to the object at ffff88810033e400
[   11.346703]  which belongs to the cache kmalloc-256 of size 256
[   11.347757] The buggy address is located 33 bytes to the right of
[   11.347757]  allocated 201-byte region [ffff88810033e400, ffff88810033e4c9)
[   11.348575] 
[   11.348654] The buggy address belongs to the physical page:
[   11.349171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   11.349920] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.350150] flags: 0x200000000000040(head|node=0|zone=2)
[   11.350369] page_type: f5(slab)
[   11.350745] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.351531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.352279] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.353157] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.353706] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   11.354425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.354933] page dumped because: kasan: bad access detected
[   11.355349] 
[   11.355424] Memory state around the buggy address:
[   11.355593]  ffff88810033e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.355868]  ffff88810033e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.356611] >ffff88810033e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.357355]                                                           ^
[   11.358150]  ffff88810033e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.358875]  ffff88810033e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.359516] ==================================================================
[   11.441545] ==================================================================
[   11.442066] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.442475] Write of size 1 at addr ffff888102a2a0c9 by task kunit_try_catch/180
[   11.442837] 
[   11.442972] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.443027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.443048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.443070] Call Trace:
[   11.443084]  <TASK>
[   11.443100]  dump_stack_lvl+0x73/0xb0
[   11.443137]  print_report+0xd1/0x650
[   11.443159]  ? __virt_addr_valid+0x1db/0x2d0
[   11.443180]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.443203]  ? kasan_addr_to_slab+0x11/0xa0
[   11.443223]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.443246]  kasan_report+0x141/0x180
[   11.443268]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.443304]  __asan_report_store1_noabort+0x1b/0x30
[   11.443324]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.443349]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.443385]  ? __kasan_check_write+0x18/0x20
[   11.443403]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.443424]  ? irqentry_exit+0x2a/0x60
[   11.443447]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.443478]  ? trace_hardirqs_on+0x37/0xe0
[   11.443500]  ? __pfx_read_tsc+0x10/0x10
[   11.443524]  krealloc_large_less_oob+0x1c/0x30
[   11.443554]  kunit_try_run_case+0x1a5/0x480
[   11.443579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.443612]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.443635]  ? __kthread_parkme+0x82/0x180
[   11.443654]  ? preempt_count_sub+0x50/0x80
[   11.443677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.443700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.443722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.443753]  kthread+0x337/0x6f0
[   11.443772]  ? trace_preempt_on+0x20/0xc0
[   11.443794]  ? __pfx_kthread+0x10/0x10
[   11.443825]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.443847]  ? calculate_sigpending+0x7b/0xa0
[   11.443870]  ? __pfx_kthread+0x10/0x10
[   11.443893]  ret_from_fork+0x116/0x1d0
[   11.443911]  ? __pfx_kthread+0x10/0x10
[   11.443931]  ret_from_fork_asm+0x1a/0x30
[   11.443961]  </TASK>
[   11.443972] 
[   11.452034] The buggy address belongs to the physical page:
[   11.452306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a28
[   11.452569] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.453057] flags: 0x200000000000040(head|node=0|zone=2)
[   11.453284] page_type: f8(unknown)
[   11.453477] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.453824] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.454089] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.454464] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.454775] head: 0200000000000002 ffffea00040a8a01 00000000ffffffff 00000000ffffffff
[   11.455102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.455330] page dumped because: kasan: bad access detected
[   11.455518] 
[   11.455610] Memory state around the buggy address:
[   11.455848]  ffff888102a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.456174]  ffff888102a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.456500] >ffff888102a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.456870]                                               ^
[   11.457049]  ffff888102a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.457324]  ffff888102a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.457685] ==================================================================
[   11.360065] ==================================================================
[   11.360800] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.361418] Write of size 1 at addr ffff88810033e4eb by task kunit_try_catch/176
[   11.362141] 
[   11.362247] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.362290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.362301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.362328] Call Trace:
[   11.362344]  <TASK>
[   11.362360]  dump_stack_lvl+0x73/0xb0
[   11.362387]  print_report+0xd1/0x650
[   11.362408]  ? __virt_addr_valid+0x1db/0x2d0
[   11.362429]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.362460]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.362482]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.362504]  kasan_report+0x141/0x180
[   11.362525]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.362562]  __asan_report_store1_noabort+0x1b/0x30
[   11.362582]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.362606]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.362629]  ? finish_task_switch.isra.0+0x153/0x700
[   11.362649]  ? __switch_to+0x47/0xf50
[   11.362673]  ? __schedule+0x10cc/0x2b60
[   11.362694]  ? __pfx_read_tsc+0x10/0x10
[   11.362717]  krealloc_less_oob+0x1c/0x30
[   11.362737]  kunit_try_run_case+0x1a5/0x480
[   11.362760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.362781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.362803]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.362826]  ? __kthread_parkme+0x82/0x180
[   11.362844]  ? preempt_count_sub+0x50/0x80
[   11.362866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.362888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.362909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.362931]  kthread+0x337/0x6f0
[   11.362949]  ? trace_preempt_on+0x20/0xc0
[   11.362971]  ? __pfx_kthread+0x10/0x10
[   11.362991]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.363011]  ? calculate_sigpending+0x7b/0xa0
[   11.363033]  ? __pfx_kthread+0x10/0x10
[   11.363054]  ret_from_fork+0x116/0x1d0
[   11.363071]  ? __pfx_kthread+0x10/0x10
[   11.363090]  ret_from_fork_asm+0x1a/0x30
[   11.363120]  </TASK>
[   11.363130] 
[   11.377265] Allocated by task 176:
[   11.377685]  kasan_save_stack+0x45/0x70
[   11.378115]  kasan_save_track+0x18/0x40
[   11.378449]  kasan_save_alloc_info+0x3b/0x50
[   11.378870]  __kasan_krealloc+0x190/0x1f0
[   11.379013]  krealloc_noprof+0xf3/0x340
[   11.379148]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.379353]  krealloc_less_oob+0x1c/0x30
[   11.379794]  kunit_try_run_case+0x1a5/0x480
[   11.380234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.381059]  kthread+0x337/0x6f0
[   11.381483]  ret_from_fork+0x116/0x1d0
[   11.381887]  ret_from_fork_asm+0x1a/0x30
[   11.382281] 
[   11.382558] The buggy address belongs to the object at ffff88810033e400
[   11.382558]  which belongs to the cache kmalloc-256 of size 256
[   11.383240] The buggy address is located 34 bytes to the right of
[   11.383240]  allocated 201-byte region [ffff88810033e400, ffff88810033e4c9)
[   11.384467] 
[   11.384673] The buggy address belongs to the physical page:
[   11.384971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   11.385770] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.386262] flags: 0x200000000000040(head|node=0|zone=2)
[   11.386833] page_type: f5(slab)
[   11.386972] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.387769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.388003] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.388347] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.389104] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   11.389927] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.390986] page dumped because: kasan: bad access detected
[   11.391363] 
[   11.391439] Memory state around the buggy address:
[   11.391611]  ffff88810033e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.392169]  ffff88810033e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.392918] >ffff88810033e480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.393574]                                                           ^
[   11.394197]  ffff88810033e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.394796]  ffff88810033e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.395099] ==================================================================