Hay
Date
July 9, 2025, 12:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.436582] ==================================================================
[   19.436635] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.436685] Write of size 1 at addr fff00000c46e02da by task kunit_try_catch/159
[   19.436738] 
[   19.436845] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.436927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.438412] Hardware name: linux,dummy-virt (DT)
[   19.438471] Call trace:
[   19.438512]  show_stack+0x20/0x38 (C)
[   19.438568]  dump_stack_lvl+0x8c/0xd0
[   19.438614]  print_report+0x118/0x608
[   19.438666]  kasan_report+0xdc/0x128
[   19.438905]  __asan_report_store1_noabort+0x20/0x30
[   19.439165]  krealloc_less_oob_helper+0xa80/0xc50
[   19.439261]  krealloc_less_oob+0x20/0x38
[   19.439306]  kunit_try_run_case+0x170/0x3f0
[   19.439361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.439451]  kthread+0x328/0x630
[   19.439493]  ret_from_fork+0x10/0x20
[   19.439661] 
[   19.439680] Allocated by task 159:
[   19.439718]  kasan_save_stack+0x3c/0x68
[   19.439760]  kasan_save_track+0x20/0x40
[   19.439797]  kasan_save_alloc_info+0x40/0x58
[   19.439837]  __kasan_krealloc+0x118/0x178
[   19.440172]  krealloc_noprof+0x128/0x360
[   19.440228]  krealloc_less_oob_helper+0x168/0xc50
[   19.441131]  krealloc_less_oob+0x20/0x38
[   19.441415]  kunit_try_run_case+0x170/0x3f0
[   19.441585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.441648]  kthread+0x328/0x630
[   19.441892]  ret_from_fork+0x10/0x20
[   19.442153] 
[   19.442208] The buggy address belongs to the object at fff00000c46e0200
[   19.442208]  which belongs to the cache kmalloc-256 of size 256
[   19.442280] The buggy address is located 17 bytes to the right of
[   19.442280]  allocated 201-byte region [fff00000c46e0200, fff00000c46e02c9)
[   19.442708] 
[   19.442733] The buggy address belongs to the physical page:
[   19.442979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046e0
[   19.443310] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.443645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.443844] page_type: f5(slab)
[   19.444197] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.444271] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.444321] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.444370] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.444511] head: 0bfffe0000000001 ffffc1ffc311b801 00000000ffffffff 00000000ffffffff
[   19.444700] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.444794] page dumped because: kasan: bad access detected
[   19.444847] 
[   19.444865] Memory state around the buggy address:
[   19.444897]  fff00000c46e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444941]  fff00000c46e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.444983] >fff00000c46e0280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.445023]                                                     ^
[   19.445059]  fff00000c46e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445164]  fff00000c46e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445313] ==================================================================
[   19.527005] ==================================================================
[   19.527106] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.527159] Write of size 1 at addr fff00000c76ba0d0 by task kunit_try_catch/163
[   19.527208] 
[   19.527492] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.527930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.528245] Hardware name: linux,dummy-virt (DT)
[   19.528387] Call trace:
[   19.528421]  show_stack+0x20/0x38 (C)
[   19.528476]  dump_stack_lvl+0x8c/0xd0
[   19.528728]  print_report+0x118/0x608
[   19.529030]  kasan_report+0xdc/0x128
[   19.529209]  __asan_report_store1_noabort+0x20/0x30
[   19.529316]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.529575]  krealloc_large_less_oob+0x20/0x38
[   19.529626]  kunit_try_run_case+0x170/0x3f0
[   19.530047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530494]  kthread+0x328/0x630
[   19.530732]  ret_from_fork+0x10/0x20
[   19.530950] 
[   19.530971] The buggy address belongs to the physical page:
[   19.531001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076b8
[   19.531385] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.531449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.531502] page_type: f8(unknown)
[   19.531801] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.531865] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.532098] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.532357] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.532810] head: 0bfffe0000000002 ffffc1ffc31dae01 00000000ffffffff 00000000ffffffff
[   19.533234] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.533664] page dumped because: kasan: bad access detected
[   19.534307] 
[   19.534414] Memory state around the buggy address:
[   19.534448]  fff00000c76b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.535203]  fff00000c76ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.535915] >fff00000c76ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.536429]                                                  ^
[   19.536505]  fff00000c76ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.536922]  fff00000c76ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.537369] ==================================================================
[   19.459469] ==================================================================
[   19.459726] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.459779] Write of size 1 at addr fff00000c46e02eb by task kunit_try_catch/159
[   19.459827] 
[   19.459856] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.459935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.459961] Hardware name: linux,dummy-virt (DT)
[   19.459991] Call trace:
[   19.460012]  show_stack+0x20/0x38 (C)
[   19.460115]  dump_stack_lvl+0x8c/0xd0
[   19.460177]  print_report+0x118/0x608
[   19.460223]  kasan_report+0xdc/0x128
[   19.460269]  __asan_report_store1_noabort+0x20/0x30
[   19.460321]  krealloc_less_oob_helper+0xa58/0xc50
[   19.460370]  krealloc_less_oob+0x20/0x38
[   19.460425]  kunit_try_run_case+0x170/0x3f0
[   19.460473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.460525]  kthread+0x328/0x630
[   19.460567]  ret_from_fork+0x10/0x20
[   19.460614] 
[   19.460632] Allocated by task 159:
[   19.460659]  kasan_save_stack+0x3c/0x68
[   19.460726]  kasan_save_track+0x20/0x40
[   19.460763]  kasan_save_alloc_info+0x40/0x58
[   19.460818]  __kasan_krealloc+0x118/0x178
[   19.460901]  krealloc_noprof+0x128/0x360
[   19.461156]  krealloc_less_oob_helper+0x168/0xc50
[   19.461291]  krealloc_less_oob+0x20/0x38
[   19.461430]  kunit_try_run_case+0x170/0x3f0
[   19.461778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.462129]  kthread+0x328/0x630
[   19.462444]  ret_from_fork+0x10/0x20
[   19.462546] 
[   19.462566] The buggy address belongs to the object at fff00000c46e0200
[   19.462566]  which belongs to the cache kmalloc-256 of size 256
[   19.463014] The buggy address is located 34 bytes to the right of
[   19.463014]  allocated 201-byte region [fff00000c46e0200, fff00000c46e02c9)
[   19.463305] 
[   19.463327] The buggy address belongs to the physical page:
[   19.463511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046e0
[   19.463853] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.464154] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.464429] page_type: f5(slab)
[   19.464474] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.464909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.464976] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.465032] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.465280] head: 0bfffe0000000001 ffffc1ffc311b801 00000000ffffffff 00000000ffffffff
[   19.465839] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.466152] page dumped because: kasan: bad access detected
[   19.466210] 
[   19.466230] Memory state around the buggy address:
[   19.466322]  fff00000c46e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.466810]  fff00000c46e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.467054] >fff00000c46e0280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.467095]                                                           ^
[   19.467137]  fff00000c46e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.467650]  fff00000c46e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.468147] ==================================================================
[   19.423840] ==================================================================
[   19.423896] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.424050] Write of size 1 at addr fff00000c46e02c9 by task kunit_try_catch/159
[   19.424160] 
[   19.424208] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.425604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.425879] Hardware name: linux,dummy-virt (DT)
[   19.425980] Call trace:
[   19.426028]  show_stack+0x20/0x38 (C)
[   19.426099]  dump_stack_lvl+0x8c/0xd0
[   19.426145]  print_report+0x118/0x608
[   19.426192]  kasan_report+0xdc/0x128
[   19.426321]  __asan_report_store1_noabort+0x20/0x30
[   19.426412]  krealloc_less_oob_helper+0xa48/0xc50
[   19.426486]  krealloc_less_oob+0x20/0x38
[   19.426568]  kunit_try_run_case+0x170/0x3f0
[   19.426663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.426717]  kthread+0x328/0x630
[   19.426761]  ret_from_fork+0x10/0x20
[   19.426809] 
[   19.426827] Allocated by task 159:
[   19.426861]  kasan_save_stack+0x3c/0x68
[   19.426901]  kasan_save_track+0x20/0x40
[   19.426938]  kasan_save_alloc_info+0x40/0x58
[   19.427099]  __kasan_krealloc+0x118/0x178
[   19.427167]  krealloc_noprof+0x128/0x360
[   19.427223]  krealloc_less_oob_helper+0x168/0xc50
[   19.427269]  krealloc_less_oob+0x20/0x38
[   19.427305]  kunit_try_run_case+0x170/0x3f0
[   19.427342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.427384]  kthread+0x328/0x630
[   19.427542]  ret_from_fork+0x10/0x20
[   19.427580] 
[   19.427606] The buggy address belongs to the object at fff00000c46e0200
[   19.427606]  which belongs to the cache kmalloc-256 of size 256
[   19.427677] The buggy address is located 0 bytes to the right of
[   19.427677]  allocated 201-byte region [fff00000c46e0200, fff00000c46e02c9)
[   19.427740] 
[   19.427765] The buggy address belongs to the physical page:
[   19.427796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046e0
[   19.427852] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.427915] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.427965] page_type: f5(slab)
[   19.428002] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.428075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.428126] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.428174] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.428222] head: 0bfffe0000000001 ffffc1ffc311b801 00000000ffffffff 00000000ffffffff
[   19.428270] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.428310] page dumped because: kasan: bad access detected
[   19.428488] 
[   19.428511] Memory state around the buggy address:
[   19.428543]  fff00000c46e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.428585]  fff00000c46e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.428627] >fff00000c46e0280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.428664]                                               ^
[   19.428704]  fff00000c46e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.428745]  fff00000c46e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.428781] ==================================================================
[   19.578026] ==================================================================
[   19.578199] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.578774] Write of size 1 at addr fff00000c76ba0eb by task kunit_try_catch/163
[   19.579982] 
[   19.580074] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.580236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.580272] Hardware name: linux,dummy-virt (DT)
[   19.580327] Call trace:
[   19.580875]  show_stack+0x20/0x38 (C)
[   19.581966]  dump_stack_lvl+0x8c/0xd0
[   19.582026]  print_report+0x118/0x608
[   19.582081]  kasan_report+0xdc/0x128
[   19.582127]  __asan_report_store1_noabort+0x20/0x30
[   19.582513]  krealloc_less_oob_helper+0xa58/0xc50
[   19.582650]  krealloc_large_less_oob+0x20/0x38
[   19.582699]  kunit_try_run_case+0x170/0x3f0
[   19.582750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.583865]  kthread+0x328/0x630
[   19.584811]  ret_from_fork+0x10/0x20
[   19.585633] 
[   19.585663] The buggy address belongs to the physical page:
[   19.586046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076b8
[   19.586116] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.586530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.587304] page_type: f8(unknown)
[   19.587593] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.588122] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.588622] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.588675] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.588724] head: 0bfffe0000000002 ffffc1ffc31dae01 00000000ffffffff 00000000ffffffff
[   19.588773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.588812] page dumped because: kasan: bad access detected
[   19.588842] 
[   19.588861] Memory state around the buggy address:
[   19.590510]  fff00000c76b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.590973]  fff00000c76ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.591332] >fff00000c76ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.591483]                                                           ^
[   19.591886]  fff00000c76ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.592112]  fff00000c76ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.592153] ==================================================================
[   19.559352] ==================================================================
[   19.559528] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.559579] Write of size 1 at addr fff00000c76ba0ea by task kunit_try_catch/163
[   19.559628] 
[   19.559660] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.559739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.561180] Hardware name: linux,dummy-virt (DT)
[   19.561736] Call trace:
[   19.561878]  show_stack+0x20/0x38 (C)
[   19.562274]  dump_stack_lvl+0x8c/0xd0
[   19.562504]  print_report+0x118/0x608
[   19.562910]  kasan_report+0xdc/0x128
[   19.564438]  __asan_report_store1_noabort+0x20/0x30
[   19.564708]  krealloc_less_oob_helper+0xae4/0xc50
[   19.564923]  krealloc_large_less_oob+0x20/0x38
[   19.565981]  kunit_try_run_case+0x170/0x3f0
[   19.566109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.566212]  kthread+0x328/0x630
[   19.566964]  ret_from_fork+0x10/0x20
[   19.567020] 
[   19.567041] The buggy address belongs to the physical page:
[   19.567078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076b8
[   19.567204] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.567384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.567446] page_type: f8(unknown)
[   19.568186] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.568457] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.568600] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.568773] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.569498] head: 0bfffe0000000002 ffffc1ffc31dae01 00000000ffffffff 00000000ffffffff
[   19.569920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.570702] page dumped because: kasan: bad access detected
[   19.571190] 
[   19.571289] Memory state around the buggy address:
[   19.571421]  fff00000c76b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.571646]  fff00000c76ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.572174] >fff00000c76ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.572240]                                                           ^
[   19.572699]  fff00000c76ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.572849]  fff00000c76ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.573408] ==================================================================
[   19.519392] ==================================================================
[   19.519467] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.519522] Write of size 1 at addr fff00000c76ba0c9 by task kunit_try_catch/163
[   19.519571] 
[   19.519602] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.519681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.519708] Hardware name: linux,dummy-virt (DT)
[   19.519737] Call trace:
[   19.519758]  show_stack+0x20/0x38 (C)
[   19.519807]  dump_stack_lvl+0x8c/0xd0
[   19.519852]  print_report+0x118/0x608
[   19.519898]  kasan_report+0xdc/0x128
[   19.519945]  __asan_report_store1_noabort+0x20/0x30
[   19.519995]  krealloc_less_oob_helper+0xa48/0xc50
[   19.520056]  krealloc_large_less_oob+0x20/0x38
[   19.520106]  kunit_try_run_case+0x170/0x3f0
[   19.520155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.520207]  kthread+0x328/0x630
[   19.520248]  ret_from_fork+0x10/0x20
[   19.520295] 
[   19.520315] The buggy address belongs to the physical page:
[   19.520345] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076b8
[   19.520407] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.520454] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.521235] page_type: f8(unknown)
[   19.521339] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.521391] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.522024] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.522564] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.523307] head: 0bfffe0000000002 ffffc1ffc31dae01 00000000ffffffff 00000000ffffffff
[   19.523358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.524143] page dumped because: kasan: bad access detected
[   19.524365] 
[   19.524387] Memory state around the buggy address:
[   19.524457]  fff00000c76b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.524514]  fff00000c76ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.524557] >fff00000c76ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.524593]                                               ^
[   19.524629]  fff00000c76ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.524675]  fff00000c76ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.525245] ==================================================================
[   19.541978] ==================================================================
[   19.542162] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.542648] Write of size 1 at addr fff00000c76ba0da by task kunit_try_catch/163
[   19.542853] 
[   19.542896] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.543785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.544264] Hardware name: linux,dummy-virt (DT)
[   19.544568] Call trace:
[   19.544639]  show_stack+0x20/0x38 (C)
[   19.545005]  dump_stack_lvl+0x8c/0xd0
[   19.545622]  print_report+0x118/0x608
[   19.546147]  kasan_report+0xdc/0x128
[   19.546387]  __asan_report_store1_noabort+0x20/0x30
[   19.547005]  krealloc_less_oob_helper+0xa80/0xc50
[   19.547518]  krealloc_large_less_oob+0x20/0x38
[   19.547636]  kunit_try_run_case+0x170/0x3f0
[   19.548390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.549044]  kthread+0x328/0x630
[   19.549368]  ret_from_fork+0x10/0x20
[   19.550225] 
[   19.550362] The buggy address belongs to the physical page:
[   19.550539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076b8
[   19.550675] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.550809] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.550864] page_type: f8(unknown)
[   19.551415] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.551472] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.551974] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.552382] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.552861] head: 0bfffe0000000002 ffffc1ffc31dae01 00000000ffffffff 00000000ffffffff
[   19.553500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.554009] page dumped because: kasan: bad access detected
[   19.554055] 
[   19.554073] Memory state around the buggy address:
[   19.554106]  fff00000c76b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.554681]  fff00000c76ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.554731] >fff00000c76ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.555406]                                                     ^
[   19.555869]  fff00000c76ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.556336]  fff00000c76ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.556651] ==================================================================
[   19.429951] ==================================================================
[   19.430009] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.430070] Write of size 1 at addr fff00000c46e02d0 by task kunit_try_catch/159
[   19.430137] 
[   19.430175] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.430266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.430313] Hardware name: linux,dummy-virt (DT)
[   19.430352] Call trace:
[   19.430373]  show_stack+0x20/0x38 (C)
[   19.430444]  dump_stack_lvl+0x8c/0xd0
[   19.430690]  print_report+0x118/0x608
[   19.430747]  kasan_report+0xdc/0x128
[   19.430793]  __asan_report_store1_noabort+0x20/0x30
[   19.430863]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.430921]  krealloc_less_oob+0x20/0x38
[   19.430977]  kunit_try_run_case+0x170/0x3f0
[   19.431033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.431101]  kthread+0x328/0x630
[   19.431144]  ret_from_fork+0x10/0x20
[   19.431202] 
[   19.431221] Allocated by task 159:
[   19.431249]  kasan_save_stack+0x3c/0x68
[   19.432634]  kasan_save_track+0x20/0x40
[   19.432956]  kasan_save_alloc_info+0x40/0x58
[   19.433009]  __kasan_krealloc+0x118/0x178
[   19.433111]  krealloc_noprof+0x128/0x360
[   19.433232]  krealloc_less_oob_helper+0x168/0xc50
[   19.433322]  krealloc_less_oob+0x20/0x38
[   19.433388]  kunit_try_run_case+0x170/0x3f0
[   19.433466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.433533]  kthread+0x328/0x630
[   19.433596]  ret_from_fork+0x10/0x20
[   19.433847] 
[   19.433869] The buggy address belongs to the object at fff00000c46e0200
[   19.433869]  which belongs to the cache kmalloc-256 of size 256
[   19.434014] The buggy address is located 7 bytes to the right of
[   19.434014]  allocated 201-byte region [fff00000c46e0200, fff00000c46e02c9)
[   19.434086] 
[   19.434128] The buggy address belongs to the physical page:
[   19.434166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046e0
[   19.434248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.434325] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.434443] page_type: f5(slab)
[   19.434500] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.434577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.434639] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.434687] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.434753] head: 0bfffe0000000001 ffffc1ffc311b801 00000000ffffffff 00000000ffffffff
[   19.434801] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.434840] page dumped because: kasan: bad access detected
[   19.434870] 
[   19.434888] Memory state around the buggy address:
[   19.434917]  fff00000c46e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.434984]  fff00000c46e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.435131] >fff00000c46e0280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.435222]                                                  ^
[   19.435282]  fff00000c46e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.435339]  fff00000c46e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.435579] ==================================================================
[   19.446320] ==================================================================
[   19.446391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.446880] Write of size 1 at addr fff00000c46e02ea by task kunit_try_catch/159
[   19.446930] 
[   19.446963] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.447042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.447786] Hardware name: linux,dummy-virt (DT)
[   19.448146] Call trace:
[   19.448254]  show_stack+0x20/0x38 (C)
[   19.448543]  dump_stack_lvl+0x8c/0xd0
[   19.448761]  print_report+0x118/0x608
[   19.448893]  kasan_report+0xdc/0x128
[   19.448941]  __asan_report_store1_noabort+0x20/0x30
[   19.448993]  krealloc_less_oob_helper+0xae4/0xc50
[   19.449043]  krealloc_less_oob+0x20/0x38
[   19.449705]  kunit_try_run_case+0x170/0x3f0
[   19.451961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.452029]  kthread+0x328/0x630
[   19.452149]  ret_from_fork+0x10/0x20
[   19.452490] 
[   19.452516] Allocated by task 159:
[   19.452546]  kasan_save_stack+0x3c/0x68
[   19.453149]  kasan_save_track+0x20/0x40
[   19.453189]  kasan_save_alloc_info+0x40/0x58
[   19.453228]  __kasan_krealloc+0x118/0x178
[   19.453266]  krealloc_noprof+0x128/0x360
[   19.453305]  krealloc_less_oob_helper+0x168/0xc50
[   19.453344]  krealloc_less_oob+0x20/0x38
[   19.453380]  kunit_try_run_case+0x170/0x3f0
[   19.454215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.454277]  kthread+0x328/0x630
[   19.454311]  ret_from_fork+0x10/0x20
[   19.454681] 
[   19.454704] The buggy address belongs to the object at fff00000c46e0200
[   19.454704]  which belongs to the cache kmalloc-256 of size 256
[   19.454762] The buggy address is located 33 bytes to the right of
[   19.454762]  allocated 201-byte region [fff00000c46e0200, fff00000c46e02c9)
[   19.454826] 
[   19.454844] The buggy address belongs to the physical page:
[   19.454874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046e0
[   19.455982] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.456117] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.456172] page_type: f5(slab)
[   19.456210] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.456260] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.456308] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.456357] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.456416] head: 0bfffe0000000001 ffffc1ffc311b801 00000000ffffffff 00000000ffffffff
[   19.456488] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.456529] page dumped because: kasan: bad access detected
[   19.456613] 
[   19.456674] Memory state around the buggy address:
[   19.456711]  fff00000c46e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.456832]  fff00000c46e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.456912] >fff00000c46e0280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.457190]                                                           ^
[   19.457236]  fff00000c46e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.457641]  fff00000c46e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.457992] ==================================================================

[   12.426863] ==================================================================
[   12.427959] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.429036] Write of size 1 at addr ffff88810a5da0c9 by task kunit_try_catch/179
[   12.429520] 
[   12.429744] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.429793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.429806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.429827] Call Trace:
[   12.429842]  <TASK>
[   12.429863]  dump_stack_lvl+0x73/0xb0
[   12.429901]  print_report+0xd1/0x650
[   12.429937]  ? __virt_addr_valid+0x1db/0x2d0
[   12.430027]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.430051]  ? kasan_addr_to_slab+0x11/0xa0
[   12.430071]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.430095]  kasan_report+0x141/0x180
[   12.430117]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.430145]  __asan_report_store1_noabort+0x1b/0x30
[   12.430169]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.430195]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.430219]  ? finish_task_switch.isra.0+0x153/0x700
[   12.430244]  ? __switch_to+0x47/0xf50
[   12.430270]  ? __schedule+0x10cc/0x2b60
[   12.430293]  ? __pfx_read_tsc+0x10/0x10
[   12.430317]  krealloc_large_less_oob+0x1c/0x30
[   12.430340]  kunit_try_run_case+0x1a5/0x480
[   12.430366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.430389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.430414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.430437]  ? __kthread_parkme+0x82/0x180
[   12.430459]  ? preempt_count_sub+0x50/0x80
[   12.430482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.430506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.430531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.430557]  kthread+0x337/0x6f0
[   12.430578]  ? trace_preempt_on+0x20/0xc0
[   12.430602]  ? __pfx_kthread+0x10/0x10
[   12.430623]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.430645]  ? calculate_sigpending+0x7b/0xa0
[   12.430670]  ? __pfx_kthread+0x10/0x10
[   12.430691]  ret_from_fork+0x116/0x1d0
[   12.430717]  ? __pfx_kthread+0x10/0x10
[   12.430737]  ret_from_fork_asm+0x1a/0x30
[   12.430768]  </TASK>
[   12.430779] 
[   12.443650] The buggy address belongs to the physical page:
[   12.443850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a5d8
[   12.444470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.445197] flags: 0x200000000000040(head|node=0|zone=2)
[   12.445684] page_type: f8(unknown)
[   12.446038] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.446830] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.447384] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.447617] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.447844] head: 0200000000000002 ffffea0004297601 00000000ffffffff 00000000ffffffff
[   12.448311] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.448710] page dumped because: kasan: bad access detected
[   12.448883] 
[   12.449137] Memory state around the buggy address:
[   12.449561]  ffff88810a5d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.450249]  ffff88810a5da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.450858] >ffff88810a5da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.451267]                                               ^
[   12.451446]  ffff88810a5da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.451657]  ffff88810a5da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.451866] ==================================================================
[   12.260772] ==================================================================
[   12.261359] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.261815] Write of size 1 at addr ffff888100a17cc9 by task kunit_try_catch/175
[   12.262131] 
[   12.262257] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.262304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.262327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.262349] Call Trace:
[   12.262361]  <TASK>
[   12.262380]  dump_stack_lvl+0x73/0xb0
[   12.262412]  print_report+0xd1/0x650
[   12.262435]  ? __virt_addr_valid+0x1db/0x2d0
[   12.262468]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.262492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.262515]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.262550]  kasan_report+0x141/0x180
[   12.262571]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.262600]  __asan_report_store1_noabort+0x1b/0x30
[   12.262633]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.262660]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.262684]  ? finish_task_switch.isra.0+0x153/0x700
[   12.262725]  ? __switch_to+0x47/0xf50
[   12.262753]  ? __schedule+0x10cc/0x2b60
[   12.262777]  ? __pfx_read_tsc+0x10/0x10
[   12.262805]  krealloc_less_oob+0x1c/0x30
[   12.262826]  kunit_try_run_case+0x1a5/0x480
[   12.262852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.262874]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.262898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.262938]  ? __kthread_parkme+0x82/0x180
[   12.262960]  ? preempt_count_sub+0x50/0x80
[   12.262982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.263017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.263042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.263067]  kthread+0x337/0x6f0
[   12.263086]  ? trace_preempt_on+0x20/0xc0
[   12.263110]  ? __pfx_kthread+0x10/0x10
[   12.263130]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.263160]  ? calculate_sigpending+0x7b/0xa0
[   12.263184]  ? __pfx_kthread+0x10/0x10
[   12.263205]  ret_from_fork+0x116/0x1d0
[   12.263233]  ? __pfx_kthread+0x10/0x10
[   12.263254]  ret_from_fork_asm+0x1a/0x30
[   12.263293]  </TASK>
[   12.263304] 
[   12.270794] Allocated by task 175:
[   12.270977]  kasan_save_stack+0x45/0x70
[   12.271125]  kasan_save_track+0x18/0x40
[   12.271260]  kasan_save_alloc_info+0x3b/0x50
[   12.271435]  __kasan_krealloc+0x190/0x1f0
[   12.271684]  krealloc_noprof+0xf3/0x340
[   12.271874]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.272108]  krealloc_less_oob+0x1c/0x30
[   12.272355]  kunit_try_run_case+0x1a5/0x480
[   12.272560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.272773]  kthread+0x337/0x6f0
[   12.272967]  ret_from_fork+0x116/0x1d0
[   12.273133]  ret_from_fork_asm+0x1a/0x30
[   12.273296] 
[   12.273390] The buggy address belongs to the object at ffff888100a17c00
[   12.273390]  which belongs to the cache kmalloc-256 of size 256
[   12.273880] The buggy address is located 0 bytes to the right of
[   12.273880]  allocated 201-byte region [ffff888100a17c00, ffff888100a17cc9)
[   12.274511] 
[   12.274623] The buggy address belongs to the physical page:
[   12.274844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16
[   12.275211] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.275540] flags: 0x200000000000040(head|node=0|zone=2)
[   12.275759] page_type: f5(slab)
[   12.275937] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.276232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.276520] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.276747] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.276985] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff
[   12.277334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.277670] page dumped because: kasan: bad access detected
[   12.277919] 
[   12.278023] Memory state around the buggy address:
[   12.278249]  ffff888100a17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.278567]  ffff888100a17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.278783] >ffff888100a17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.279002]                                               ^
[   12.279174]  ffff888100a17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.279430]  ffff888100a17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.279766] ==================================================================
[   12.281496] ==================================================================
[   12.281876] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.282317] Write of size 1 at addr ffff888100a17cd0 by task kunit_try_catch/175
[   12.282664] 
[   12.282787] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.282840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.282852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.282872] Call Trace:
[   12.282884]  <TASK>
[   12.282914]  dump_stack_lvl+0x73/0xb0
[   12.282954]  print_report+0xd1/0x650
[   12.282976]  ? __virt_addr_valid+0x1db/0x2d0
[   12.282999]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.283023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.283045]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.283069]  kasan_report+0x141/0x180
[   12.283090]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.283118]  __asan_report_store1_noabort+0x1b/0x30
[   12.283143]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.283169]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.283193]  ? finish_task_switch.isra.0+0x153/0x700
[   12.283217]  ? __switch_to+0x47/0xf50
[   12.283269]  ? __schedule+0x10cc/0x2b60
[   12.283291]  ? __pfx_read_tsc+0x10/0x10
[   12.283327]  krealloc_less_oob+0x1c/0x30
[   12.283349]  kunit_try_run_case+0x1a5/0x480
[   12.283373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.283407]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.283431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.283455]  ? __kthread_parkme+0x82/0x180
[   12.283487]  ? preempt_count_sub+0x50/0x80
[   12.283509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.283533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.283569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.283594]  kthread+0x337/0x6f0
[   12.283622]  ? trace_preempt_on+0x20/0xc0
[   12.283646]  ? __pfx_kthread+0x10/0x10
[   12.283666]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.283687]  ? calculate_sigpending+0x7b/0xa0
[   12.283711]  ? __pfx_kthread+0x10/0x10
[   12.283732]  ret_from_fork+0x116/0x1d0
[   12.283759]  ? __pfx_kthread+0x10/0x10
[   12.283779]  ret_from_fork_asm+0x1a/0x30
[   12.283810]  </TASK>
[   12.283820] 
[   12.291032] Allocated by task 175:
[   12.291183]  kasan_save_stack+0x45/0x70
[   12.291367]  kasan_save_track+0x18/0x40
[   12.291571]  kasan_save_alloc_info+0x3b/0x50
[   12.291813]  __kasan_krealloc+0x190/0x1f0
[   12.292041]  krealloc_noprof+0xf3/0x340
[   12.292282]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.292533]  krealloc_less_oob+0x1c/0x30
[   12.292750]  kunit_try_run_case+0x1a5/0x480
[   12.292983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.293219]  kthread+0x337/0x6f0
[   12.293396]  ret_from_fork+0x116/0x1d0
[   12.293527]  ret_from_fork_asm+0x1a/0x30
[   12.293721] 
[   12.293827] The buggy address belongs to the object at ffff888100a17c00
[   12.293827]  which belongs to the cache kmalloc-256 of size 256
[   12.294338] The buggy address is located 7 bytes to the right of
[   12.294338]  allocated 201-byte region [ffff888100a17c00, ffff888100a17cc9)
[   12.294855] 
[   12.294971] The buggy address belongs to the physical page:
[   12.295196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16
[   12.295556] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.295887] flags: 0x200000000000040(head|node=0|zone=2)
[   12.296090] page_type: f5(slab)
[   12.296210] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.296459] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.296686] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.297061] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.297421] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff
[   12.297755] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.298101] page dumped because: kasan: bad access detected
[   12.298374] 
[   12.298467] Memory state around the buggy address:
[   12.298673]  ffff888100a17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.298965]  ffff888100a17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.299176] >ffff888100a17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.299408]                                                  ^
[   12.299666]  ffff888100a17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.300013]  ffff888100a17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.300402] ==================================================================
[   12.342446] ==================================================================
[   12.342741] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.343117] Write of size 1 at addr ffff888100a17ceb by task kunit_try_catch/175
[   12.343462] 
[   12.343576] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.343616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.343637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.343656] Call Trace:
[   12.343668]  <TASK>
[   12.343684]  dump_stack_lvl+0x73/0xb0
[   12.343726]  print_report+0xd1/0x650
[   12.343749]  ? __virt_addr_valid+0x1db/0x2d0
[   12.343771]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.343794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.343826]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.343850]  kasan_report+0x141/0x180
[   12.343871]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.343911]  __asan_report_store1_noabort+0x1b/0x30
[   12.343944]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.343970]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.344003]  ? finish_task_switch.isra.0+0x153/0x700
[   12.344027]  ? __switch_to+0x47/0xf50
[   12.344051]  ? __schedule+0x10cc/0x2b60
[   12.344079]  ? __pfx_read_tsc+0x10/0x10
[   12.344103]  krealloc_less_oob+0x1c/0x30
[   12.344125]  kunit_try_run_case+0x1a5/0x480
[   12.344149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.344171]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.344195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.344218]  ? __kthread_parkme+0x82/0x180
[   12.344245]  ? preempt_count_sub+0x50/0x80
[   12.344268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.344292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.344316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.344340]  kthread+0x337/0x6f0
[   12.344359]  ? trace_preempt_on+0x20/0xc0
[   12.344382]  ? __pfx_kthread+0x10/0x10
[   12.344402]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.344423]  ? calculate_sigpending+0x7b/0xa0
[   12.344447]  ? __pfx_kthread+0x10/0x10
[   12.344468]  ret_from_fork+0x116/0x1d0
[   12.344485]  ? __pfx_kthread+0x10/0x10
[   12.344505]  ret_from_fork_asm+0x1a/0x30
[   12.344536]  </TASK>
[   12.344545] 
[   12.351683] Allocated by task 175:
[   12.351811]  kasan_save_stack+0x45/0x70
[   12.351966]  kasan_save_track+0x18/0x40
[   12.352160]  kasan_save_alloc_info+0x3b/0x50
[   12.352402]  __kasan_krealloc+0x190/0x1f0
[   12.352602]  krealloc_noprof+0xf3/0x340
[   12.352819]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.353055]  krealloc_less_oob+0x1c/0x30
[   12.353268]  kunit_try_run_case+0x1a5/0x480
[   12.353503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.353707]  kthread+0x337/0x6f0
[   12.353827]  ret_from_fork+0x116/0x1d0
[   12.353964]  ret_from_fork_asm+0x1a/0x30
[   12.354163] 
[   12.354297] The buggy address belongs to the object at ffff888100a17c00
[   12.354297]  which belongs to the cache kmalloc-256 of size 256
[   12.354849] The buggy address is located 34 bytes to the right of
[   12.354849]  allocated 201-byte region [ffff888100a17c00, ffff888100a17cc9)
[   12.355366] 
[   12.355452] The buggy address belongs to the physical page:
[   12.355708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16
[   12.356070] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.356410] flags: 0x200000000000040(head|node=0|zone=2)
[   12.356648] page_type: f5(slab)
[   12.356808] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.357119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.357369] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.357595] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.357914] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff
[   12.358271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.358608] page dumped because: kasan: bad access detected
[   12.358862] 
[   12.358966] Memory state around the buggy address:
[   12.359196]  ffff888100a17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.359528]  ffff888100a17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.359741] >ffff888100a17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.359959]                                                           ^
[   12.360204]  ffff888100a17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.360576]  ffff888100a17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.360919] ==================================================================
[   12.322362] ==================================================================
[   12.322628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.323152] Write of size 1 at addr ffff888100a17cea by task kunit_try_catch/175
[   12.323519] 
[   12.323634] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.323676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.323687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.323707] Call Trace:
[   12.323735]  <TASK>
[   12.323754]  dump_stack_lvl+0x73/0xb0
[   12.323783]  print_report+0xd1/0x650
[   12.323817]  ? __virt_addr_valid+0x1db/0x2d0
[   12.323840]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.323863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.323893]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.323917]  kasan_report+0x141/0x180
[   12.323952]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.323981]  __asan_report_store1_noabort+0x1b/0x30
[   12.324005]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.324031]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.324056]  ? finish_task_switch.isra.0+0x153/0x700
[   12.324079]  ? __switch_to+0x47/0xf50
[   12.324113]  ? __schedule+0x10cc/0x2b60
[   12.324135]  ? __pfx_read_tsc+0x10/0x10
[   12.324170]  krealloc_less_oob+0x1c/0x30
[   12.324191]  kunit_try_run_case+0x1a5/0x480
[   12.324215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.324237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.324280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.324303]  ? __kthread_parkme+0x82/0x180
[   12.324324]  ? preempt_count_sub+0x50/0x80
[   12.324347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.324370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.324394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.324428]  kthread+0x337/0x6f0
[   12.324446]  ? trace_preempt_on+0x20/0xc0
[   12.324470]  ? __pfx_kthread+0x10/0x10
[   12.324502]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.324523]  ? calculate_sigpending+0x7b/0xa0
[   12.324547]  ? __pfx_kthread+0x10/0x10
[   12.324568]  ret_from_fork+0x116/0x1d0
[   12.324586]  ? __pfx_kthread+0x10/0x10
[   12.324606]  ret_from_fork_asm+0x1a/0x30
[   12.324636]  </TASK>
[   12.324647] 
[   12.331854] Allocated by task 175:
[   12.332043]  kasan_save_stack+0x45/0x70
[   12.332188]  kasan_save_track+0x18/0x40
[   12.332341]  kasan_save_alloc_info+0x3b/0x50
[   12.332579]  __kasan_krealloc+0x190/0x1f0
[   12.332778]  krealloc_noprof+0xf3/0x340
[   12.332962]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.333130]  krealloc_less_oob+0x1c/0x30
[   12.333317]  kunit_try_run_case+0x1a5/0x480
[   12.333528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.333810]  kthread+0x337/0x6f0
[   12.334011]  ret_from_fork+0x116/0x1d0
[   12.334214]  ret_from_fork_asm+0x1a/0x30
[   12.334395] 
[   12.334514] The buggy address belongs to the object at ffff888100a17c00
[   12.334514]  which belongs to the cache kmalloc-256 of size 256
[   12.334975] The buggy address is located 33 bytes to the right of
[   12.334975]  allocated 201-byte region [ffff888100a17c00, ffff888100a17cc9)
[   12.335526] 
[   12.335622] The buggy address belongs to the physical page:
[   12.335867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16
[   12.336210] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.336542] flags: 0x200000000000040(head|node=0|zone=2)
[   12.336721] page_type: f5(slab)
[   12.336841] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.337077] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.337451] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.337783] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.338121] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff
[   12.338484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.338715] page dumped because: kasan: bad access detected
[   12.338883] 
[   12.338969] Memory state around the buggy address:
[   12.339197]  ffff888100a17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.339554]  ffff888100a17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.339885] >ffff888100a17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.340220]                                                           ^
[   12.340457]  ffff888100a17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.340696]  ffff888100a17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.341073] ==================================================================
[   12.472982] ==================================================================
[   12.473539] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.473903] Write of size 1 at addr ffff88810a5da0da by task kunit_try_catch/179
[   12.474248] 
[   12.474596] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.474643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.474655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.474674] Call Trace:
[   12.474687]  <TASK>
[   12.474709]  dump_stack_lvl+0x73/0xb0
[   12.474798]  print_report+0xd1/0x650
[   12.474824]  ? __virt_addr_valid+0x1db/0x2d0
[   12.474847]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.474870]  ? kasan_addr_to_slab+0x11/0xa0
[   12.474890]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.474913]  kasan_report+0x141/0x180
[   12.474948]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.474976]  __asan_report_store1_noabort+0x1b/0x30
[   12.475000]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.475026]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.475098]  ? finish_task_switch.isra.0+0x153/0x700
[   12.475123]  ? __switch_to+0x47/0xf50
[   12.475147]  ? __schedule+0x10cc/0x2b60
[   12.475169]  ? __pfx_read_tsc+0x10/0x10
[   12.475193]  krealloc_large_less_oob+0x1c/0x30
[   12.475216]  kunit_try_run_case+0x1a5/0x480
[   12.475240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.475274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.475298]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.475321]  ? __kthread_parkme+0x82/0x180
[   12.475341]  ? preempt_count_sub+0x50/0x80
[   12.475363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.475387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.475411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.475435]  kthread+0x337/0x6f0
[   12.475453]  ? trace_preempt_on+0x20/0xc0
[   12.475477]  ? __pfx_kthread+0x10/0x10
[   12.475497]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.475518]  ? calculate_sigpending+0x7b/0xa0
[   12.475542]  ? __pfx_kthread+0x10/0x10
[   12.475562]  ret_from_fork+0x116/0x1d0
[   12.475580]  ? __pfx_kthread+0x10/0x10
[   12.475600]  ret_from_fork_asm+0x1a/0x30
[   12.475631]  </TASK>
[   12.475641] 
[   12.483285] The buggy address belongs to the physical page:
[   12.483563] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a5d8
[   12.483911] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.484328] flags: 0x200000000000040(head|node=0|zone=2)
[   12.484542] page_type: f8(unknown)
[   12.484667] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.484948] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.485444] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.485762] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.486387] head: 0200000000000002 ffffea0004297601 00000000ffffffff 00000000ffffffff
[   12.486674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.486910] page dumped because: kasan: bad access detected
[   12.487206] 
[   12.487395] Memory state around the buggy address:
[   12.487634]  ffff88810a5d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.487994]  ffff88810a5da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.488292] >ffff88810a5da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.488502]                                                     ^
[   12.488778]  ffff88810a5da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.489171]  ffff88810a5da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.489518] ==================================================================
[   12.506115] ==================================================================
[   12.506474] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.506791] Write of size 1 at addr ffff88810a5da0eb by task kunit_try_catch/179
[   12.507309] 
[   12.507448] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.507490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.507501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.507520] Call Trace:
[   12.507537]  <TASK>
[   12.507554]  dump_stack_lvl+0x73/0xb0
[   12.507586]  print_report+0xd1/0x650
[   12.507609]  ? __virt_addr_valid+0x1db/0x2d0
[   12.507631]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.507655]  ? kasan_addr_to_slab+0x11/0xa0
[   12.507675]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.507699]  kasan_report+0x141/0x180
[   12.507720]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.507748]  __asan_report_store1_noabort+0x1b/0x30
[   12.507773]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.507799]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.507823]  ? finish_task_switch.isra.0+0x153/0x700
[   12.507846]  ? __switch_to+0x47/0xf50
[   12.507870]  ? __schedule+0x10cc/0x2b60
[   12.507892]  ? __pfx_read_tsc+0x10/0x10
[   12.507917]  krealloc_large_less_oob+0x1c/0x30
[   12.508017]  kunit_try_run_case+0x1a5/0x480
[   12.508041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.508064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.508089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.508112]  ? __kthread_parkme+0x82/0x180
[   12.508132]  ? preempt_count_sub+0x50/0x80
[   12.508154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.508178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.508202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.508226]  kthread+0x337/0x6f0
[   12.508244]  ? trace_preempt_on+0x20/0xc0
[   12.508268]  ? __pfx_kthread+0x10/0x10
[   12.508304]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.508325]  ? calculate_sigpending+0x7b/0xa0
[   12.508349]  ? __pfx_kthread+0x10/0x10
[   12.508369]  ret_from_fork+0x116/0x1d0
[   12.508388]  ? __pfx_kthread+0x10/0x10
[   12.508408]  ret_from_fork_asm+0x1a/0x30
[   12.508438]  </TASK>
[   12.508448] 
[   12.515881] The buggy address belongs to the physical page:
[   12.516173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a5d8
[   12.516548] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.516868] flags: 0x200000000000040(head|node=0|zone=2)
[   12.517148] page_type: f8(unknown)
[   12.517317] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.517604] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.517916] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.518386] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.518647] head: 0200000000000002 ffffea0004297601 00000000ffffffff 00000000ffffffff
[   12.518882] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.519299] page dumped because: kasan: bad access detected
[   12.519551] 
[   12.519642] Memory state around the buggy address:
[   12.519862]  ffff88810a5d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.520248]  ffff88810a5da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.520577] >ffff88810a5da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.520885]                                                           ^
[   12.521242]  ffff88810a5da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.521474]  ffff88810a5da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.521722] ==================================================================
[   12.301543] ==================================================================
[   12.301874] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.302659] Write of size 1 at addr ffff888100a17cda by task kunit_try_catch/175
[   12.303059] 
[   12.303178] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.303221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.303232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.303277] Call Trace:
[   12.303296]  <TASK>
[   12.303316]  dump_stack_lvl+0x73/0xb0
[   12.303361]  print_report+0xd1/0x650
[   12.303383]  ? __virt_addr_valid+0x1db/0x2d0
[   12.303407]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.303433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.303456]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.303490]  kasan_report+0x141/0x180
[   12.303511]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.303552]  __asan_report_store1_noabort+0x1b/0x30
[   12.303578]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.303603]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.303628]  ? finish_task_switch.isra.0+0x153/0x700
[   12.303651]  ? __switch_to+0x47/0xf50
[   12.303676]  ? __schedule+0x10cc/0x2b60
[   12.303698]  ? __pfx_read_tsc+0x10/0x10
[   12.303731]  krealloc_less_oob+0x1c/0x30
[   12.303752]  kunit_try_run_case+0x1a5/0x480
[   12.303777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.303810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.303834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.303858]  ? __kthread_parkme+0x82/0x180
[   12.303879]  ? preempt_count_sub+0x50/0x80
[   12.303901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.303934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.303958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.303983]  kthread+0x337/0x6f0
[   12.304002]  ? trace_preempt_on+0x20/0xc0
[   12.304025]  ? __pfx_kthread+0x10/0x10
[   12.304045]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.304066]  ? calculate_sigpending+0x7b/0xa0
[   12.304090]  ? __pfx_kthread+0x10/0x10
[   12.304111]  ret_from_fork+0x116/0x1d0
[   12.304129]  ? __pfx_kthread+0x10/0x10
[   12.304158]  ret_from_fork_asm+0x1a/0x30
[   12.304189]  </TASK>
[   12.304199] 
[   12.311521] Allocated by task 175:
[   12.311660]  kasan_save_stack+0x45/0x70
[   12.311888]  kasan_save_track+0x18/0x40
[   12.312084]  kasan_save_alloc_info+0x3b/0x50
[   12.312317]  __kasan_krealloc+0x190/0x1f0
[   12.312499]  krealloc_noprof+0xf3/0x340
[   12.312631]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.312789]  krealloc_less_oob+0x1c/0x30
[   12.312997]  kunit_try_run_case+0x1a5/0x480
[   12.313206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.313510]  kthread+0x337/0x6f0
[   12.313693]  ret_from_fork+0x116/0x1d0
[   12.313902]  ret_from_fork_asm+0x1a/0x30
[   12.314102] 
[   12.314171] The buggy address belongs to the object at ffff888100a17c00
[   12.314171]  which belongs to the cache kmalloc-256 of size 256
[   12.314545] The buggy address is located 17 bytes to the right of
[   12.314545]  allocated 201-byte region [ffff888100a17c00, ffff888100a17cc9)
[   12.315106] 
[   12.315213] The buggy address belongs to the physical page:
[   12.315453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16
[   12.315697] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.315937] flags: 0x200000000000040(head|node=0|zone=2)
[   12.316190] page_type: f5(slab)
[   12.316410] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.316758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.317114] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.317493] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.317818] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff
[   12.318795] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.319166] page dumped because: kasan: bad access detected
[   12.319459] 
[   12.319561] Memory state around the buggy address:
[   12.319775]  ffff888100a17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.320072]  ffff888100a17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.320376] >ffff888100a17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.320675]                                                     ^
[   12.320896]  ffff888100a17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.321163]  ffff888100a17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.321508] ==================================================================
[   12.489839] ==================================================================
[   12.490235] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.490610] Write of size 1 at addr ffff88810a5da0ea by task kunit_try_catch/179
[   12.490903] 
[   12.491002] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.491043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.491054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.491073] Call Trace:
[   12.491088]  <TASK>
[   12.491104]  dump_stack_lvl+0x73/0xb0
[   12.491132]  print_report+0xd1/0x650
[   12.491154]  ? __virt_addr_valid+0x1db/0x2d0
[   12.491176]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.491199]  ? kasan_addr_to_slab+0x11/0xa0
[   12.491219]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.491243]  kasan_report+0x141/0x180
[   12.491264]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.491292]  __asan_report_store1_noabort+0x1b/0x30
[   12.491316]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.491343]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.491367]  ? finish_task_switch.isra.0+0x153/0x700
[   12.491390]  ? __switch_to+0x47/0xf50
[   12.491414]  ? __schedule+0x10cc/0x2b60
[   12.491435]  ? __pfx_read_tsc+0x10/0x10
[   12.491460]  krealloc_large_less_oob+0x1c/0x30
[   12.491483]  kunit_try_run_case+0x1a5/0x480
[   12.491506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.491528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.491551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.491575]  ? __kthread_parkme+0x82/0x180
[   12.491595]  ? preempt_count_sub+0x50/0x80
[   12.491617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.491641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.491664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.491689]  kthread+0x337/0x6f0
[   12.491708]  ? trace_preempt_on+0x20/0xc0
[   12.491731]  ? __pfx_kthread+0x10/0x10
[   12.491751]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.491772]  ? calculate_sigpending+0x7b/0xa0
[   12.491796]  ? __pfx_kthread+0x10/0x10
[   12.491816]  ret_from_fork+0x116/0x1d0
[   12.491834]  ? __pfx_kthread+0x10/0x10
[   12.491854]  ret_from_fork_asm+0x1a/0x30
[   12.491884]  </TASK>
[   12.491894] 
[   12.499537] The buggy address belongs to the physical page:
[   12.499756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a5d8
[   12.500066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.500393] flags: 0x200000000000040(head|node=0|zone=2)
[   12.500660] page_type: f8(unknown)
[   12.500844] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.501277] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.501618] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.501900] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.502351] head: 0200000000000002 ffffea0004297601 00000000ffffffff 00000000ffffffff
[   12.502737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.503155] page dumped because: kasan: bad access detected
[   12.503432] 
[   12.503527] Memory state around the buggy address:
[   12.503753]  ffff88810a5d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.504142]  ffff88810a5da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.504440] >ffff88810a5da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.504651]                                                           ^
[   12.505016]  ffff88810a5da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.505368]  ffff88810a5da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.505689] ==================================================================
[   12.452939] ==================================================================
[   12.453837] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.454593] Write of size 1 at addr ffff88810a5da0d0 by task kunit_try_catch/179
[   12.455537] 
[   12.455757] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.455803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.455814] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.455833] Call Trace:
[   12.455852]  <TASK>
[   12.455871]  dump_stack_lvl+0x73/0xb0
[   12.455904]  print_report+0xd1/0x650
[   12.455966]  ? __virt_addr_valid+0x1db/0x2d0
[   12.455991]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.456014]  ? kasan_addr_to_slab+0x11/0xa0
[   12.456034]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.456058]  kasan_report+0x141/0x180
[   12.456079]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.456107]  __asan_report_store1_noabort+0x1b/0x30
[   12.456145]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.456171]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.456195]  ? finish_task_switch.isra.0+0x153/0x700
[   12.456218]  ? __switch_to+0x47/0xf50
[   12.456259]  ? __schedule+0x10cc/0x2b60
[   12.456282]  ? __pfx_read_tsc+0x10/0x10
[   12.456306]  krealloc_large_less_oob+0x1c/0x30
[   12.456328]  kunit_try_run_case+0x1a5/0x480
[   12.456352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.456374]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.456398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.456422]  ? __kthread_parkme+0x82/0x180
[   12.456442]  ? preempt_count_sub+0x50/0x80
[   12.456464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.456487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.456511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.456536]  kthread+0x337/0x6f0
[   12.456554]  ? trace_preempt_on+0x20/0xc0
[   12.456577]  ? __pfx_kthread+0x10/0x10
[   12.456597]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.456618]  ? calculate_sigpending+0x7b/0xa0
[   12.456641]  ? __pfx_kthread+0x10/0x10
[   12.456662]  ret_from_fork+0x116/0x1d0
[   12.456680]  ? __pfx_kthread+0x10/0x10
[   12.456700]  ret_from_fork_asm+0x1a/0x30
[   12.456730]  </TASK>
[   12.456740] 
[   12.466287] The buggy address belongs to the physical page:
[   12.466574] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a5d8
[   12.466932] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.467231] flags: 0x200000000000040(head|node=0|zone=2)
[   12.467712] page_type: f8(unknown)
[   12.467872] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.468112] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.468389] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.468793] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.469177] head: 0200000000000002 ffffea0004297601 00000000ffffffff 00000000ffffffff
[   12.469411] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.469986] page dumped because: kasan: bad access detected
[   12.470247] 
[   12.470341] Memory state around the buggy address:
[   12.470569]  ffff88810a5d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.470855]  ffff88810a5da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.471216] >ffff88810a5da080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.471642]                                                  ^
[   12.471865]  ffff88810a5da100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.472366]  ffff88810a5da180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.472580] ==================================================================