Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.216357] ==================================================================
[   19.216422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.216530] Write of size 1 at addr fff00000c781a0eb by task kunit_try_catch/162
[   19.216614] 
[   19.216731] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.216841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.216867] Hardware name: linux,dummy-virt (DT)
[   19.216902] Call trace:
[   19.217077]  show_stack+0x20/0x38 (C)
[   19.217244]  dump_stack_lvl+0x8c/0xd0
[   19.217299]  print_report+0x118/0x608
[   19.217343]  kasan_report+0xdc/0x128
[   19.217386]  __asan_report_store1_noabort+0x20/0x30
[   19.217489]  krealloc_less_oob_helper+0xa58/0xc50
[   19.217574]  krealloc_large_less_oob+0x20/0x38
[   19.217621]  kunit_try_run_case+0x170/0x3f0
[   19.217861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.217964]  kthread+0x328/0x630
[   19.218017]  ret_from_fork+0x10/0x20
[   19.218062] 
[   19.218262] The buggy address belongs to the physical page:
[   19.218357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   19.218463] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.218600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.218827] page_type: f8(unknown)
[   19.218929] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.218981] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.219058] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.219275] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.219341] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff
[   19.219480] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.219668] page dumped because: kasan: bad access detected
[   19.219853] 
[   19.219920] Memory state around the buggy address:
[   19.219955]  fff00000c7819f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.220023]  fff00000c781a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.220064] >fff00000c781a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.220503]                                                           ^
[   19.220607]  fff00000c781a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.220768]  fff00000c781a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.220849] ==================================================================
[   19.132817] ==================================================================
[   19.132986] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.133041] Write of size 1 at addr fff00000c1b1b8d0 by task kunit_try_catch/158
[   19.133194] 
[   19.133420] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.133510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.133535] Hardware name: linux,dummy-virt (DT)
[   19.133563] Call trace:
[   19.133641]  show_stack+0x20/0x38 (C)
[   19.133694]  dump_stack_lvl+0x8c/0xd0
[   19.133790]  print_report+0x118/0x608
[   19.133834]  kasan_report+0xdc/0x128
[   19.134048]  __asan_report_store1_noabort+0x20/0x30
[   19.134117]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.134165]  krealloc_less_oob+0x20/0x38
[   19.134217]  kunit_try_run_case+0x170/0x3f0
[   19.134262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.134474]  kthread+0x328/0x630
[   19.134528]  ret_from_fork+0x10/0x20
[   19.134574] 
[   19.134592] Allocated by task 158:
[   19.134757]  kasan_save_stack+0x3c/0x68
[   19.134810]  kasan_save_track+0x20/0x40
[   19.134867]  kasan_save_alloc_info+0x40/0x58
[   19.135025]  __kasan_krealloc+0x118/0x178
[   19.135083]  krealloc_noprof+0x128/0x360
[   19.135119]  krealloc_less_oob_helper+0x168/0xc50
[   19.135495]  krealloc_less_oob+0x20/0x38
[   19.135602]  kunit_try_run_case+0x170/0x3f0
[   19.135648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.135689]  kthread+0x328/0x630
[   19.135730]  ret_from_fork+0x10/0x20
[   19.136074] 
[   19.136215] The buggy address belongs to the object at fff00000c1b1b800
[   19.136215]  which belongs to the cache kmalloc-256 of size 256
[   19.136414] The buggy address is located 7 bytes to the right of
[   19.136414]  allocated 201-byte region [fff00000c1b1b800, fff00000c1b1b8c9)
[   19.136535] 
[   19.136565] The buggy address belongs to the physical page:
[   19.136638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1a
[   19.137101] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.137215] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.137358] page_type: f5(slab)
[   19.137448] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.137632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.137701] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.138108] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.138194] head: 0bfffe0000000001 ffffc1ffc306c681 00000000ffffffff 00000000ffffffff
[   19.138687] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.138782] page dumped because: kasan: bad access detected
[   19.138871] 
[   19.139022] Memory state around the buggy address:
[   19.139109]  fff00000c1b1b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139160]  fff00000c1b1b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.139485] >fff00000c1b1b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.139556]                                                  ^
[   19.139703]  fff00000c1b1b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139910]  fff00000c1b1b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.140007] ==================================================================
[   19.210378] ==================================================================
[   19.210422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.210468] Write of size 1 at addr fff00000c781a0ea by task kunit_try_catch/162
[   19.210573] 
[   19.210601] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.210852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.210887] Hardware name: linux,dummy-virt (DT)
[   19.211093] Call trace:
[   19.211137]  show_stack+0x20/0x38 (C)
[   19.211245]  dump_stack_lvl+0x8c/0xd0
[   19.211291]  print_report+0x118/0x608
[   19.211335]  kasan_report+0xdc/0x128
[   19.211378]  __asan_report_store1_noabort+0x20/0x30
[   19.211535]  krealloc_less_oob_helper+0xae4/0xc50
[   19.211986]  krealloc_large_less_oob+0x20/0x38
[   19.212091]  kunit_try_run_case+0x170/0x3f0
[   19.212243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.212348]  kthread+0x328/0x630
[   19.212493]  ret_from_fork+0x10/0x20
[   19.212749] 
[   19.212846] The buggy address belongs to the physical page:
[   19.212985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   19.213097] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.213158] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.213211] page_type: f8(unknown)
[   19.213254] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.213303] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.213361] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.213423] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.213471] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff
[   19.213517] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.213556] page dumped because: kasan: bad access detected
[   19.213595] 
[   19.213612] Memory state around the buggy address:
[   19.213642]  fff00000c7819f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.213682]  fff00000c781a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.213757] >fff00000c781a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.213903]                                                           ^
[   19.214507]  fff00000c781a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.214575]  fff00000c781a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.215150] ==================================================================
[   19.158003] ==================================================================
[   19.158050] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.158507] Write of size 1 at addr fff00000c1b1b8eb by task kunit_try_catch/158
[   19.158576] 
[   19.158700] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.158919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.158953] Hardware name: linux,dummy-virt (DT)
[   19.158999] Call trace:
[   19.159021]  show_stack+0x20/0x38 (C)
[   19.159351]  dump_stack_lvl+0x8c/0xd0
[   19.159504]  print_report+0x118/0x608
[   19.159552]  kasan_report+0xdc/0x128
[   19.159595]  __asan_report_store1_noabort+0x20/0x30
[   19.159911]  krealloc_less_oob_helper+0xa58/0xc50
[   19.159987]  krealloc_less_oob+0x20/0x38
[   19.160086]  kunit_try_run_case+0x170/0x3f0
[   19.160139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.160371]  kthread+0x328/0x630
[   19.160556]  ret_from_fork+0x10/0x20
[   19.160829] 
[   19.160921] Allocated by task 158:
[   19.160950]  kasan_save_stack+0x3c/0x68
[   19.161127]  kasan_save_track+0x20/0x40
[   19.161316]  kasan_save_alloc_info+0x40/0x58
[   19.161398]  __kasan_krealloc+0x118/0x178
[   19.161449]  krealloc_noprof+0x128/0x360
[   19.161605]  krealloc_less_oob_helper+0x168/0xc50
[   19.161866]  krealloc_less_oob+0x20/0x38
[   19.161963]  kunit_try_run_case+0x170/0x3f0
[   19.162015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.162198]  kthread+0x328/0x630
[   19.162387]  ret_from_fork+0x10/0x20
[   19.162464] 
[   19.162593] The buggy address belongs to the object at fff00000c1b1b800
[   19.162593]  which belongs to the cache kmalloc-256 of size 256
[   19.162686] The buggy address is located 34 bytes to the right of
[   19.162686]  allocated 201-byte region [fff00000c1b1b800, fff00000c1b1b8c9)
[   19.162893] 
[   19.163098] The buggy address belongs to the physical page:
[   19.163160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1a
[   19.163339] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.163391] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.163457] page_type: f5(slab)
[   19.163515] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.163564] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.163622] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.163678] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.163738] head: 0bfffe0000000001 ffffc1ffc306c681 00000000ffffffff 00000000ffffffff
[   19.164285] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.164424] page dumped because: kasan: bad access detected
[   19.164510] 
[   19.164654] Memory state around the buggy address:
[   19.164812]  fff00000c1b1b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.164885]  fff00000c1b1b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.164926] >fff00000c1b1b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.165120]                                                           ^
[   19.165165]  fff00000c1b1b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.165470]  fff00000c1b1b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.165580] ==================================================================
[   19.197113] ==================================================================
[   19.197188] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.197240] Write of size 1 at addr fff00000c781a0d0 by task kunit_try_catch/162
[   19.197288] 
[   19.197575] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.197819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.197856] Hardware name: linux,dummy-virt (DT)
[   19.197886] Call trace:
[   19.197945]  show_stack+0x20/0x38 (C)
[   19.198285]  dump_stack_lvl+0x8c/0xd0
[   19.198359]  print_report+0x118/0x608
[   19.198405]  kasan_report+0xdc/0x128
[   19.198448]  __asan_report_store1_noabort+0x20/0x30
[   19.198817]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.198937]  krealloc_large_less_oob+0x20/0x38
[   19.198989]  kunit_try_run_case+0x170/0x3f0
[   19.199033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.199219]  kthread+0x328/0x630
[   19.199274]  ret_from_fork+0x10/0x20
[   19.199320] 
[   19.199470] The buggy address belongs to the physical page:
[   19.199679] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   19.199748] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.199800] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.200135] page_type: f8(unknown)
[   19.200209] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.200315] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.200365] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.200586] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.200641] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff
[   19.201014] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.201153] page dumped because: kasan: bad access detected
[   19.201223] 
[   19.201360] Memory state around the buggy address:
[   19.201435]  fff00000c7819f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.201911]  fff00000c781a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.201995] >fff00000c781a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.202139]                                                  ^
[   19.202215]  fff00000c781a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.202274]  fff00000c781a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.202787] ==================================================================
[   19.141260] ==================================================================
[   19.141382] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.141553] Write of size 1 at addr fff00000c1b1b8da by task kunit_try_catch/158
[   19.141820] 
[   19.141896] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.141985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.142141] Hardware name: linux,dummy-virt (DT)
[   19.142324] Call trace:
[   19.142376]  show_stack+0x20/0x38 (C)
[   19.142427]  dump_stack_lvl+0x8c/0xd0
[   19.142538]  print_report+0x118/0x608
[   19.142624]  kasan_report+0xdc/0x128
[   19.142668]  __asan_report_store1_noabort+0x20/0x30
[   19.142815]  krealloc_less_oob_helper+0xa80/0xc50
[   19.142886]  krealloc_less_oob+0x20/0x38
[   19.143064]  kunit_try_run_case+0x170/0x3f0
[   19.143280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.143356]  kthread+0x328/0x630
[   19.143471]  ret_from_fork+0x10/0x20
[   19.143610] 
[   19.143737] Allocated by task 158:
[   19.143786]  kasan_save_stack+0x3c/0x68
[   19.143860]  kasan_save_track+0x20/0x40
[   19.143899]  kasan_save_alloc_info+0x40/0x58
[   19.144296]  __kasan_krealloc+0x118/0x178
[   19.144407]  krealloc_noprof+0x128/0x360
[   19.144495]  krealloc_less_oob_helper+0x168/0xc50
[   19.144636]  krealloc_less_oob+0x20/0x38
[   19.144694]  kunit_try_run_case+0x170/0x3f0
[   19.144824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.144884]  kthread+0x328/0x630
[   19.144948]  ret_from_fork+0x10/0x20
[   19.145113] 
[   19.145312] The buggy address belongs to the object at fff00000c1b1b800
[   19.145312]  which belongs to the cache kmalloc-256 of size 256
[   19.145411] The buggy address is located 17 bytes to the right of
[   19.145411]  allocated 201-byte region [fff00000c1b1b800, fff00000c1b1b8c9)
[   19.145586] 
[   19.145625] The buggy address belongs to the physical page:
[   19.145739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1a
[   19.145792] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.146175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.146282] page_type: f5(slab)
[   19.146360] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.146507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.146605] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.147066] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.147173] head: 0bfffe0000000001 ffffc1ffc306c681 00000000ffffffff 00000000ffffffff
[   19.147270] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.147412] page dumped because: kasan: bad access detected
[   19.147499] 
[   19.147550] Memory state around the buggy address:
[   19.147656]  fff00000c1b1b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147698]  fff00000c1b1b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.147762] >fff00000c1b1b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.147798]                                                     ^
[   19.148140]  fff00000c1b1b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.148252]  fff00000c1b1b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.148361] ==================================================================
[   19.149672] ==================================================================
[   19.149736] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.149783] Write of size 1 at addr fff00000c1b1b8ea by task kunit_try_catch/158
[   19.149856] 
[   19.149886] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.149963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.149998] Hardware name: linux,dummy-virt (DT)
[   19.150033] Call trace:
[   19.150064]  show_stack+0x20/0x38 (C)
[   19.150110]  dump_stack_lvl+0x8c/0xd0
[   19.150163]  print_report+0x118/0x608
[   19.150215]  kasan_report+0xdc/0x128
[   19.150260]  __asan_report_store1_noabort+0x20/0x30
[   19.150317]  krealloc_less_oob_helper+0xae4/0xc50
[   19.150364]  krealloc_less_oob+0x20/0x38
[   19.150414]  kunit_try_run_case+0x170/0x3f0
[   19.150467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.150518]  kthread+0x328/0x630
[   19.150557]  ret_from_fork+0x10/0x20
[   19.150610] 
[   19.150628] Allocated by task 158:
[   19.150654]  kasan_save_stack+0x3c/0x68
[   19.150693]  kasan_save_track+0x20/0x40
[   19.150739]  kasan_save_alloc_info+0x40/0x58
[   19.150777]  __kasan_krealloc+0x118/0x178
[   19.150986]  krealloc_noprof+0x128/0x360
[   19.151057]  krealloc_less_oob_helper+0x168/0xc50
[   19.151492]  krealloc_less_oob+0x20/0x38
[   19.151564]  kunit_try_run_case+0x170/0x3f0
[   19.151718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.152150]  kthread+0x328/0x630
[   19.152208]  ret_from_fork+0x10/0x20
[   19.152861] 
[   19.152897] The buggy address belongs to the object at fff00000c1b1b800
[   19.152897]  which belongs to the cache kmalloc-256 of size 256
[   19.153098] The buggy address is located 33 bytes to the right of
[   19.153098]  allocated 201-byte region [fff00000c1b1b800, fff00000c1b1b8c9)
[   19.153366] 
[   19.153432] The buggy address belongs to the physical page:
[   19.153498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1a
[   19.153576] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.154303] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.154419] page_type: f5(slab)
[   19.154906] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.155011] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.155452] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.155615] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.155706] head: 0bfffe0000000001 ffffc1ffc306c681 00000000ffffffff 00000000ffffffff
[   19.155763] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.155801] page dumped because: kasan: bad access detected
[   19.156149] 
[   19.156231] Memory state around the buggy address:
[   19.156626]  fff00000c1b1b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.156789]  fff00000c1b1b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.156872] >fff00000c1b1b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.156979]                                                           ^
[   19.157055]  fff00000c1b1b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.157122]  fff00000c1b1b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.157266] ==================================================================
[   19.128498] ==================================================================
[   19.128785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.128847] Write of size 1 at addr fff00000c1b1b8c9 by task kunit_try_catch/158
[   19.128895] 
[   19.128930] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.129008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.129038] Hardware name: linux,dummy-virt (DT)
[   19.129067] Call trace:
[   19.129087]  show_stack+0x20/0x38 (C)
[   19.129133]  dump_stack_lvl+0x8c/0xd0
[   19.129177]  print_report+0x118/0x608
[   19.129231]  kasan_report+0xdc/0x128
[   19.129275]  __asan_report_store1_noabort+0x20/0x30
[   19.129332]  krealloc_less_oob_helper+0xa48/0xc50
[   19.129379]  krealloc_less_oob+0x20/0x38
[   19.129422]  kunit_try_run_case+0x170/0x3f0
[   19.129476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.129526]  kthread+0x328/0x630
[   19.129566]  ret_from_fork+0x10/0x20
[   19.129613] 
[   19.129631] Allocated by task 158:
[   19.129663]  kasan_save_stack+0x3c/0x68
[   19.129720]  kasan_save_track+0x20/0x40
[   19.129756]  kasan_save_alloc_info+0x40/0x58
[   19.129799]  __kasan_krealloc+0x118/0x178
[   19.129835]  krealloc_noprof+0x128/0x360
[   19.129870]  krealloc_less_oob_helper+0x168/0xc50
[   19.129907]  krealloc_less_oob+0x20/0x38
[   19.129950]  kunit_try_run_case+0x170/0x3f0
[   19.129986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.130027]  kthread+0x328/0x630
[   19.130057]  ret_from_fork+0x10/0x20
[   19.130099] 
[   19.130117] The buggy address belongs to the object at fff00000c1b1b800
[   19.130117]  which belongs to the cache kmalloc-256 of size 256
[   19.130171] The buggy address is located 0 bytes to the right of
[   19.130171]  allocated 201-byte region [fff00000c1b1b800, fff00000c1b1b8c9)
[   19.130232] 
[   19.130251] The buggy address belongs to the physical page:
[   19.130288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1a
[   19.130340] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.130386] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.130434] page_type: f5(slab)
[   19.130469] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.130526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.130576] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.130624] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.130678] head: 0bfffe0000000001 ffffc1ffc306c681 00000000ffffffff 00000000ffffffff
[   19.131556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.131629] page dumped because: kasan: bad access detected
[   19.131685] 
[   19.131735] Memory state around the buggy address:
[   19.131800]  fff00000c1b1b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.131868]  fff00000c1b1b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.131917] >fff00000c1b1b880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.131969]                                               ^
[   19.132023]  fff00000c1b1b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.132235]  fff00000c1b1b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.132453] ==================================================================
[   19.204486] ==================================================================
[   19.204535] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.204591] Write of size 1 at addr fff00000c781a0da by task kunit_try_catch/162
[   19.204913] 
[   19.205042] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.205177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.205202] Hardware name: linux,dummy-virt (DT)
[   19.205231] Call trace:
[   19.205251]  show_stack+0x20/0x38 (C)
[   19.205413]  dump_stack_lvl+0x8c/0xd0
[   19.205505]  print_report+0x118/0x608
[   19.205721]  kasan_report+0xdc/0x128
[   19.205774]  __asan_report_store1_noabort+0x20/0x30
[   19.205923]  krealloc_less_oob_helper+0xa80/0xc50
[   19.205974]  krealloc_large_less_oob+0x20/0x38
[   19.206019]  kunit_try_run_case+0x170/0x3f0
[   19.206063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.206128]  kthread+0x328/0x630
[   19.206184]  ret_from_fork+0x10/0x20
[   19.206230] 
[   19.206249] The buggy address belongs to the physical page:
[   19.206610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   19.206752] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.206837] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.206946] page_type: f8(unknown)
[   19.207014] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.207068] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.207134] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.207181] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.207350] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff
[   19.207409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.207554] page dumped because: kasan: bad access detected
[   19.207600] 
[   19.207784] Memory state around the buggy address:
[   19.207881]  fff00000c7819f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.208050]  fff00000c781a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.208091] >fff00000c781a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.208134]                                                     ^
[   19.208490]  fff00000c781a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.208547]  fff00000c781a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.208660] ==================================================================
[   19.190269] ==================================================================
[   19.190334] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.190383] Write of size 1 at addr fff00000c781a0c9 by task kunit_try_catch/162
[   19.190431] 
[   19.190462] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.190550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.190575] Hardware name: linux,dummy-virt (DT)
[   19.190604] Call trace:
[   19.190630]  show_stack+0x20/0x38 (C)
[   19.190675]  dump_stack_lvl+0x8c/0xd0
[   19.190936]  print_report+0x118/0x608
[   19.190991]  kasan_report+0xdc/0x128
[   19.191036]  __asan_report_store1_noabort+0x20/0x30
[   19.191925]  krealloc_less_oob_helper+0xa48/0xc50
[   19.192250]  krealloc_large_less_oob+0x20/0x38
[   19.192302]  kunit_try_run_case+0x170/0x3f0
[   19.192365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.192756]  kthread+0x328/0x630
[   19.192814]  ret_from_fork+0x10/0x20
[   19.193099] 
[   19.193273] The buggy address belongs to the physical page:
[   19.193325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   19.193531] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.193896] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.194093] page_type: f8(unknown)
[   19.194259] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.194357] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.194503] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.194623] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.194724] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff
[   19.195122] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.195170] page dumped because: kasan: bad access detected
[   19.195218] 
[   19.195292] Memory state around the buggy address:
[   19.195575]  fff00000c7819f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.195660]  fff00000c781a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.195802] >fff00000c781a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.195840]                                               ^
[   19.195874]  fff00000c781a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.195914]  fff00000c781a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.195961] ==================================================================

[   12.760682] ==================================================================
[   12.761035] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.761450] Write of size 1 at addr ffff888102b6a0ea by task kunit_try_catch/179
[   12.761890] 
[   12.761977] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.762019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.762030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.762063] Call Trace:
[   12.762074]  <TASK>
[   12.762088]  dump_stack_lvl+0x73/0xb0
[   12.762114]  print_report+0xd1/0x650
[   12.762134]  ? __virt_addr_valid+0x1db/0x2d0
[   12.762155]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.762177]  ? kasan_addr_to_slab+0x11/0xa0
[   12.762196]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.762218]  kasan_report+0x141/0x180
[   12.762239]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.762266]  __asan_report_store1_noabort+0x1b/0x30
[   12.762289]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.762313]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.762335]  ? finish_task_switch.isra.0+0x153/0x700
[   12.762356]  ? __switch_to+0x47/0xf50
[   12.762381]  ? __schedule+0x10cc/0x2b60
[   12.762402]  ? __pfx_read_tsc+0x10/0x10
[   12.762424]  krealloc_large_less_oob+0x1c/0x30
[   12.762446]  kunit_try_run_case+0x1a5/0x480
[   12.762468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.762488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.762521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.762543]  ? __kthread_parkme+0x82/0x180
[   12.762561]  ? preempt_count_sub+0x50/0x80
[   12.762595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.762618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.762639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.762661]  kthread+0x337/0x6f0
[   12.762678]  ? trace_preempt_on+0x20/0xc0
[   12.762700]  ? __pfx_kthread+0x10/0x10
[   12.762728]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.762755]  ? calculate_sigpending+0x7b/0xa0
[   12.762777]  ? __pfx_kthread+0x10/0x10
[   12.762809]  ret_from_fork+0x116/0x1d0
[   12.762826]  ? __pfx_kthread+0x10/0x10
[   12.762845]  ret_from_fork_asm+0x1a/0x30
[   12.762874]  </TASK>
[   12.762885] 
[   12.771473] The buggy address belongs to the physical page:
[   12.771745] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68
[   12.772117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.772421] flags: 0x200000000000040(head|node=0|zone=2)
[   12.773164] page_type: f8(unknown)
[   12.773329] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.773549] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.774157] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.774537] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.775258] head: 0200000000000002 ffffea00040ada01 00000000ffffffff 00000000ffffffff
[   12.776416] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.776806] page dumped because: kasan: bad access detected
[   12.777073] 
[   12.777389] Memory state around the buggy address:
[   12.777793]  ffff888102b69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.778358]  ffff888102b6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.779325] >ffff888102b6a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.779983]                                                           ^
[   12.780315]  ffff888102b6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.781025]  ffff888102b6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.781471] ==================================================================
[   12.742285] ==================================================================
[   12.742645] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.743034] Write of size 1 at addr ffff888102b6a0da by task kunit_try_catch/179
[   12.743267] 
[   12.743357] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.743400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.743412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.743433] Call Trace:
[   12.743445]  <TASK>
[   12.743462]  dump_stack_lvl+0x73/0xb0
[   12.743516]  print_report+0xd1/0x650
[   12.743538]  ? __virt_addr_valid+0x1db/0x2d0
[   12.743559]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.743582]  ? kasan_addr_to_slab+0x11/0xa0
[   12.743601]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.743623]  kasan_report+0x141/0x180
[   12.743644]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.743671]  __asan_report_store1_noabort+0x1b/0x30
[   12.743705]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.743742]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.743777]  ? finish_task_switch.isra.0+0x153/0x700
[   12.743800]  ? __switch_to+0x47/0xf50
[   12.743826]  ? __schedule+0x10cc/0x2b60
[   12.743848]  ? __pfx_read_tsc+0x10/0x10
[   12.743871]  krealloc_large_less_oob+0x1c/0x30
[   12.743892]  kunit_try_run_case+0x1a5/0x480
[   12.743916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.743936]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.743959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.743981]  ? __kthread_parkme+0x82/0x180
[   12.744000]  ? preempt_count_sub+0x50/0x80
[   12.744022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.744058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.744080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.744101]  kthread+0x337/0x6f0
[   12.744119]  ? trace_preempt_on+0x20/0xc0
[   12.744141]  ? __pfx_kthread+0x10/0x10
[   12.744160]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.744180]  ? calculate_sigpending+0x7b/0xa0
[   12.744203]  ? __pfx_kthread+0x10/0x10
[   12.744223]  ret_from_fork+0x116/0x1d0
[   12.744240]  ? __pfx_kthread+0x10/0x10
[   12.744260]  ret_from_fork_asm+0x1a/0x30
[   12.744289]  </TASK>
[   12.744301] 
[   12.753392] The buggy address belongs to the physical page:
[   12.753716] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68
[   12.753998] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.754484] flags: 0x200000000000040(head|node=0|zone=2)
[   12.754845] page_type: f8(unknown)
[   12.754973] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.755423] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.755806] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.756028] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.756256] head: 0200000000000002 ffffea00040ada01 00000000ffffffff 00000000ffffffff
[   12.757029] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.757626] page dumped because: kasan: bad access detected
[   12.757950] 
[   12.758030] Memory state around the buggy address:
[   12.758313]  ffff888102b69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.758564]  ffff888102b6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.758772] >ffff888102b6a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.759023]                                                     ^
[   12.759576]  ffff888102b6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.759814]  ffff888102b6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.760018] ==================================================================
[   12.783100] ==================================================================
[   12.783419] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.783996] Write of size 1 at addr ffff888102b6a0eb by task kunit_try_catch/179
[   12.784935] 
[   12.785064] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.785111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.785123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.785144] Call Trace:
[   12.785158]  <TASK>
[   12.785174]  dump_stack_lvl+0x73/0xb0
[   12.785203]  print_report+0xd1/0x650
[   12.785225]  ? __virt_addr_valid+0x1db/0x2d0
[   12.785247]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.785270]  ? kasan_addr_to_slab+0x11/0xa0
[   12.785290]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.785313]  kasan_report+0x141/0x180
[   12.785334]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.785362]  __asan_report_store1_noabort+0x1b/0x30
[   12.785385]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.785409]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.785432]  ? finish_task_switch.isra.0+0x153/0x700
[   12.785454]  ? __switch_to+0x47/0xf50
[   12.785481]  ? __schedule+0x10cc/0x2b60
[   12.785502]  ? __pfx_read_tsc+0x10/0x10
[   12.785526]  krealloc_large_less_oob+0x1c/0x30
[   12.785548]  kunit_try_run_case+0x1a5/0x480
[   12.785579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.785600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.785622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.785645]  ? __kthread_parkme+0x82/0x180
[   12.785664]  ? preempt_count_sub+0x50/0x80
[   12.785686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.785709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.785731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.785752]  kthread+0x337/0x6f0
[   12.785771]  ? trace_preempt_on+0x20/0xc0
[   12.785794]  ? __pfx_kthread+0x10/0x10
[   12.785813]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.785833]  ? calculate_sigpending+0x7b/0xa0
[   12.785856]  ? __pfx_kthread+0x10/0x10
[   12.785876]  ret_from_fork+0x116/0x1d0
[   12.785894]  ? __pfx_kthread+0x10/0x10
[   12.785914]  ret_from_fork_asm+0x1a/0x30
[   12.785944]  </TASK>
[   12.785955] 
[   12.798661] The buggy address belongs to the physical page:
[   12.798904] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68
[   12.799827] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.800724] flags: 0x200000000000040(head|node=0|zone=2)
[   12.800999] page_type: f8(unknown)
[   12.801495] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.801846] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.802526] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.803216] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.804321] head: 0200000000000002 ffffea00040ada01 00000000ffffffff 00000000ffffffff
[   12.804873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.805740] page dumped because: kasan: bad access detected
[   12.806150] 
[   12.806258] Memory state around the buggy address:
[   12.806471]  ffff888102b69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.807262]  ffff888102b6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.807872] >ffff888102b6a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.808455]                                                           ^
[   12.809282]  ffff888102b6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.809746]  ffff888102b6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.810428] ==================================================================
[   12.510016] ==================================================================
[   12.510408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.510869] Write of size 1 at addr ffff8881003466d0 by task kunit_try_catch/175
[   12.511469] 
[   12.511706] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.511753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.511765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.511786] Call Trace:
[   12.511800]  <TASK>
[   12.511818]  dump_stack_lvl+0x73/0xb0
[   12.511869]  print_report+0xd1/0x650
[   12.511890]  ? __virt_addr_valid+0x1db/0x2d0
[   12.511912]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.511934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.511959]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.511981]  kasan_report+0x141/0x180
[   12.512002]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.512029]  __asan_report_store1_noabort+0x1b/0x30
[   12.512322]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.512359]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.512381]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.512410]  ? __pfx_krealloc_less_oob+0x10/0x10
[   12.512437]  krealloc_less_oob+0x1c/0x30
[   12.512459]  kunit_try_run_case+0x1a5/0x480
[   12.512482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.512520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.512545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.512567]  ? __kthread_parkme+0x82/0x180
[   12.512587]  ? preempt_count_sub+0x50/0x80
[   12.512610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.512633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.512654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.512675]  kthread+0x337/0x6f0
[   12.512693]  ? trace_preempt_on+0x20/0xc0
[   12.512716]  ? __pfx_kthread+0x10/0x10
[   12.512736]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.512755]  ? calculate_sigpending+0x7b/0xa0
[   12.512778]  ? __pfx_kthread+0x10/0x10
[   12.512799]  ret_from_fork+0x116/0x1d0
[   12.512817]  ? __pfx_kthread+0x10/0x10
[   12.512837]  ret_from_fork_asm+0x1a/0x30
[   12.512867]  </TASK>
[   12.512878] 
[   12.524233] Allocated by task 175:
[   12.524395]  kasan_save_stack+0x45/0x70
[   12.524913]  kasan_save_track+0x18/0x40
[   12.525122]  kasan_save_alloc_info+0x3b/0x50
[   12.525758]  __kasan_krealloc+0x190/0x1f0
[   12.525970]  krealloc_noprof+0xf3/0x340
[   12.526445]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.526763]  krealloc_less_oob+0x1c/0x30
[   12.526988]  kunit_try_run_case+0x1a5/0x480
[   12.527387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.527830]  kthread+0x337/0x6f0
[   12.528003]  ret_from_fork+0x116/0x1d0
[   12.528279]  ret_from_fork_asm+0x1a/0x30
[   12.528464] 
[   12.528570] The buggy address belongs to the object at ffff888100346600
[   12.528570]  which belongs to the cache kmalloc-256 of size 256
[   12.529086] The buggy address is located 7 bytes to the right of
[   12.529086]  allocated 201-byte region [ffff888100346600, ffff8881003466c9)
[   12.530259] 
[   12.530362] The buggy address belongs to the physical page:
[   12.530578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.531203] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.531645] flags: 0x200000000000040(head|node=0|zone=2)
[   12.531982] page_type: f5(slab)
[   12.532255] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.532758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.533408] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.533998] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.534631] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.534938] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.535581] page dumped because: kasan: bad access detected
[   12.535843] 
[   12.535943] Memory state around the buggy address:
[   12.536396]  ffff888100346580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.536849]  ffff888100346600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.537522] >ffff888100346680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.537823]                                                  ^
[   12.538126]  ffff888100346700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.538676]  ffff888100346780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.539161] ==================================================================
[   12.686779] ==================================================================
[   12.687263] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.687584] Write of size 1 at addr ffff888102b6a0c9 by task kunit_try_catch/179
[   12.687888] 
[   12.687994] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.688051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.688063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.688439] Call Trace:
[   12.688453]  <TASK>
[   12.688472]  dump_stack_lvl+0x73/0xb0
[   12.688527]  print_report+0xd1/0x650
[   12.688567]  ? __virt_addr_valid+0x1db/0x2d0
[   12.688590]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.688624]  ? kasan_addr_to_slab+0x11/0xa0
[   12.688644]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.688666]  kasan_report+0x141/0x180
[   12.688799]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.688832]  __asan_report_store1_noabort+0x1b/0x30
[   12.688855]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.688880]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.688902]  ? finish_task_switch.isra.0+0x153/0x700
[   12.688925]  ? __switch_to+0x47/0xf50
[   12.688951]  ? __schedule+0x10cc/0x2b60
[   12.688973]  ? __pfx_read_tsc+0x10/0x10
[   12.688997]  krealloc_large_less_oob+0x1c/0x30
[   12.689019]  kunit_try_run_case+0x1a5/0x480
[   12.689054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.689075]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.689098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.689121]  ? __kthread_parkme+0x82/0x180
[   12.689141]  ? preempt_count_sub+0x50/0x80
[   12.689163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.689199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.689221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.689243]  kthread+0x337/0x6f0
[   12.689273]  ? trace_preempt_on+0x20/0xc0
[   12.689296]  ? __pfx_kthread+0x10/0x10
[   12.689315]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.689346]  ? calculate_sigpending+0x7b/0xa0
[   12.689370]  ? __pfx_kthread+0x10/0x10
[   12.689390]  ret_from_fork+0x116/0x1d0
[   12.689420]  ? __pfx_kthread+0x10/0x10
[   12.689440]  ret_from_fork_asm+0x1a/0x30
[   12.689472]  </TASK>
[   12.689496] 
[   12.702451] The buggy address belongs to the physical page:
[   12.702922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68
[   12.703563] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.704139] flags: 0x200000000000040(head|node=0|zone=2)
[   12.704581] page_type: f8(unknown)
[   12.704893] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.705403] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.705944] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.706517] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.706983] head: 0200000000000002 ffffea00040ada01 00000000ffffffff 00000000ffffffff
[   12.707453] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.708015] page dumped because: kasan: bad access detected
[   12.708506] 
[   12.708632] Memory state around the buggy address:
[   12.709113]  ffff888102b69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.709566]  ffff888102b6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.710009] >ffff888102b6a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.710460]                                               ^
[   12.710895]  ffff888102b6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.711417]  ffff888102b6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.711866] ==================================================================
[   12.540170] ==================================================================
[   12.540490] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.540968] Write of size 1 at addr ffff8881003466da by task kunit_try_catch/175
[   12.541802] 
[   12.541937] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.541984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.542013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.542035] Call Trace:
[   12.542067]  <TASK>
[   12.542139]  dump_stack_lvl+0x73/0xb0
[   12.542170]  print_report+0xd1/0x650
[   12.542192]  ? __virt_addr_valid+0x1db/0x2d0
[   12.542214]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.542236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.542261]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.542283]  kasan_report+0x141/0x180
[   12.542304]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.542331]  __asan_report_store1_noabort+0x1b/0x30
[   12.542354]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.542379]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.542400]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.542430]  ? __pfx_krealloc_less_oob+0x10/0x10
[   12.542456]  krealloc_less_oob+0x1c/0x30
[   12.542476]  kunit_try_run_case+0x1a5/0x480
[   12.542498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.542519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.542542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.542563]  ? __kthread_parkme+0x82/0x180
[   12.542583]  ? preempt_count_sub+0x50/0x80
[   12.542606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.542628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.542650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.542671]  kthread+0x337/0x6f0
[   12.542690]  ? trace_preempt_on+0x20/0xc0
[   12.542711]  ? __pfx_kthread+0x10/0x10
[   12.542731]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.542750]  ? calculate_sigpending+0x7b/0xa0
[   12.542773]  ? __pfx_kthread+0x10/0x10
[   12.542793]  ret_from_fork+0x116/0x1d0
[   12.542811]  ? __pfx_kthread+0x10/0x10
[   12.542830]  ret_from_fork_asm+0x1a/0x30
[   12.542861]  </TASK>
[   12.542872] 
[   12.554723] Allocated by task 175:
[   12.554932]  kasan_save_stack+0x45/0x70
[   12.555277]  kasan_save_track+0x18/0x40
[   12.555621]  kasan_save_alloc_info+0x3b/0x50
[   12.555829]  __kasan_krealloc+0x190/0x1f0
[   12.556014]  krealloc_noprof+0xf3/0x340
[   12.556239]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.556746]  krealloc_less_oob+0x1c/0x30
[   12.556946]  kunit_try_run_case+0x1a5/0x480
[   12.557525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.557978]  kthread+0x337/0x6f0
[   12.558283]  ret_from_fork+0x116/0x1d0
[   12.558645]  ret_from_fork_asm+0x1a/0x30
[   12.558846] 
[   12.558946] The buggy address belongs to the object at ffff888100346600
[   12.558946]  which belongs to the cache kmalloc-256 of size 256
[   12.559810] The buggy address is located 17 bytes to the right of
[   12.559810]  allocated 201-byte region [ffff888100346600, ffff8881003466c9)
[   12.560834] 
[   12.561089] The buggy address belongs to the physical page:
[   12.561721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.562246] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.562650] flags: 0x200000000000040(head|node=0|zone=2)
[   12.562886] page_type: f5(slab)
[   12.563330] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.563654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.563980] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.564521] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.564943] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.565722] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.566199] page dumped because: kasan: bad access detected
[   12.566466] 
[   12.566775] Memory state around the buggy address:
[   12.567015]  ffff888100346580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.567382]  ffff888100346600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.567936] >ffff888100346680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.568414]                                                     ^
[   12.568894]  ffff888100346700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.569602]  ffff888100346780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.569932] ==================================================================
[   12.602394] ==================================================================
[   12.602937] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.603628] Write of size 1 at addr ffff8881003466eb by task kunit_try_catch/175
[   12.603945] 
[   12.604066] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.604111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.604124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.604147] Call Trace:
[   12.604165]  <TASK>
[   12.604184]  dump_stack_lvl+0x73/0xb0
[   12.604214]  print_report+0xd1/0x650
[   12.604236]  ? __virt_addr_valid+0x1db/0x2d0
[   12.604257]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.604279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.604304]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.604327]  kasan_report+0x141/0x180
[   12.604348]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.604376]  __asan_report_store1_noabort+0x1b/0x30
[   12.604399]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.604423]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.604444]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.604473]  ? __pfx_krealloc_less_oob+0x10/0x10
[   12.604499]  krealloc_less_oob+0x1c/0x30
[   12.604519]  kunit_try_run_case+0x1a5/0x480
[   12.604543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.604564]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.604587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.604608]  ? __kthread_parkme+0x82/0x180
[   12.604628]  ? preempt_count_sub+0x50/0x80
[   12.604652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.604674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.604695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.604717]  kthread+0x337/0x6f0
[   12.604736]  ? trace_preempt_on+0x20/0xc0
[   12.604757]  ? __pfx_kthread+0x10/0x10
[   12.604777]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.604797]  ? calculate_sigpending+0x7b/0xa0
[   12.604820]  ? __pfx_kthread+0x10/0x10
[   12.604840]  ret_from_fork+0x116/0x1d0
[   12.604859]  ? __pfx_kthread+0x10/0x10
[   12.604878]  ret_from_fork_asm+0x1a/0x30
[   12.604908]  </TASK>
[   12.604919] 
[   12.616644] Allocated by task 175:
[   12.616806]  kasan_save_stack+0x45/0x70
[   12.617398]  kasan_save_track+0x18/0x40
[   12.617608]  kasan_save_alloc_info+0x3b/0x50
[   12.617777]  __kasan_krealloc+0x190/0x1f0
[   12.618140]  krealloc_noprof+0xf3/0x340
[   12.618314]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.618810]  krealloc_less_oob+0x1c/0x30
[   12.619051]  kunit_try_run_case+0x1a5/0x480
[   12.619595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.619857]  kthread+0x337/0x6f0
[   12.620186]  ret_from_fork+0x116/0x1d0
[   12.620456]  ret_from_fork_asm+0x1a/0x30
[   12.620841] 
[   12.620944] The buggy address belongs to the object at ffff888100346600
[   12.620944]  which belongs to the cache kmalloc-256 of size 256
[   12.621721] The buggy address is located 34 bytes to the right of
[   12.621721]  allocated 201-byte region [ffff888100346600, ffff8881003466c9)
[   12.622575] 
[   12.622704] The buggy address belongs to the physical page:
[   12.623201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.623522] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.623858] flags: 0x200000000000040(head|node=0|zone=2)
[   12.624095] page_type: f5(slab)
[   12.624579] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.624953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.625523] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.626007] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.626528] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.626962] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.627589] page dumped because: kasan: bad access detected
[   12.628010] 
[   12.628228] Memory state around the buggy address:
[   12.628412]  ffff888100346580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.629163]  ffff888100346600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.629752] >ffff888100346680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.630197]                                                           ^
[   12.630619]  ffff888100346700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.630916]  ffff888100346780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.631637] ==================================================================
[   12.712746] ==================================================================
[   12.713429] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.713929] Write of size 1 at addr ffff888102b6a0d0 by task kunit_try_catch/179
[   12.714721] 
[   12.715067] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.715119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.715131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.715153] Call Trace:
[   12.715165]  <TASK>
[   12.715182]  dump_stack_lvl+0x73/0xb0
[   12.715212]  print_report+0xd1/0x650
[   12.715233]  ? __virt_addr_valid+0x1db/0x2d0
[   12.715255]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.715278]  ? kasan_addr_to_slab+0x11/0xa0
[   12.715297]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.715320]  kasan_report+0x141/0x180
[   12.715341]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.715368]  __asan_report_store1_noabort+0x1b/0x30
[   12.715391]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.715416]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.715438]  ? finish_task_switch.isra.0+0x153/0x700
[   12.715459]  ? __switch_to+0x47/0xf50
[   12.715486]  ? __schedule+0x10cc/0x2b60
[   12.715507]  ? __pfx_read_tsc+0x10/0x10
[   12.715532]  krealloc_large_less_oob+0x1c/0x30
[   12.715553]  kunit_try_run_case+0x1a5/0x480
[   12.715577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.715598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.715620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.715642]  ? __kthread_parkme+0x82/0x180
[   12.715662]  ? preempt_count_sub+0x50/0x80
[   12.715683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.715705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.715727]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.715748]  kthread+0x337/0x6f0
[   12.715766]  ? trace_preempt_on+0x20/0xc0
[   12.715789]  ? __pfx_kthread+0x10/0x10
[   12.715808]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.715828]  ? calculate_sigpending+0x7b/0xa0
[   12.715851]  ? __pfx_kthread+0x10/0x10
[   12.715871]  ret_from_fork+0x116/0x1d0
[   12.715888]  ? __pfx_kthread+0x10/0x10
[   12.715907]  ret_from_fork_asm+0x1a/0x30
[   12.715937]  </TASK>
[   12.715949] 
[   12.729532] The buggy address belongs to the physical page:
[   12.730067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68
[   12.730887] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.731401] flags: 0x200000000000040(head|node=0|zone=2)
[   12.731720] page_type: f8(unknown)
[   12.732106] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.732576] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.733022] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.733613] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.733964] head: 0200000000000002 ffffea00040ada01 00000000ffffffff 00000000ffffffff
[   12.734631] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.735261] page dumped because: kasan: bad access detected
[   12.735473] 
[   12.735549] Memory state around the buggy address:
[   12.736528]  ffff888102b69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.738253]  ffff888102b6a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.738474] >ffff888102b6a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.738682]                                                  ^
[   12.738859]  ffff888102b6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.739202]  ffff888102b6a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.739464] ==================================================================
[   12.470281] ==================================================================
[   12.470866] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.471397] Write of size 1 at addr ffff8881003466c9 by task kunit_try_catch/175
[   12.472336] 
[   12.472599] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.472647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.472658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.472679] Call Trace:
[   12.472691]  <TASK>
[   12.472708]  dump_stack_lvl+0x73/0xb0
[   12.472738]  print_report+0xd1/0x650
[   12.472760]  ? __virt_addr_valid+0x1db/0x2d0
[   12.472781]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.472803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.472828]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.472850]  kasan_report+0x141/0x180
[   12.472870]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.472897]  __asan_report_store1_noabort+0x1b/0x30
[   12.472920]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.472944]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.472965]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.472994]  ? __pfx_krealloc_less_oob+0x10/0x10
[   12.473019]  krealloc_less_oob+0x1c/0x30
[   12.473057]  kunit_try_run_case+0x1a5/0x480
[   12.473081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.473101]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.473125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.473146]  ? __kthread_parkme+0x82/0x180
[   12.473166]  ? preempt_count_sub+0x50/0x80
[   12.473189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.473210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.473232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.473253]  kthread+0x337/0x6f0
[   12.473271]  ? trace_preempt_on+0x20/0xc0
[   12.473293]  ? __pfx_kthread+0x10/0x10
[   12.473312]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.473332]  ? calculate_sigpending+0x7b/0xa0
[   12.473354]  ? __pfx_kthread+0x10/0x10
[   12.473375]  ret_from_fork+0x116/0x1d0
[   12.473392]  ? __pfx_kthread+0x10/0x10
[   12.473412]  ret_from_fork_asm+0x1a/0x30
[   12.473442]  </TASK>
[   12.473453] 
[   12.488594] Allocated by task 175:
[   12.488783]  kasan_save_stack+0x45/0x70
[   12.488983]  kasan_save_track+0x18/0x40
[   12.491034]  kasan_save_alloc_info+0x3b/0x50
[   12.491285]  __kasan_krealloc+0x190/0x1f0
[   12.491476]  krealloc_noprof+0xf3/0x340
[   12.492325]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.492903]  krealloc_less_oob+0x1c/0x30
[   12.493333]  kunit_try_run_case+0x1a5/0x480
[   12.494275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.494597]  kthread+0x337/0x6f0
[   12.494907]  ret_from_fork+0x116/0x1d0
[   12.495673]  ret_from_fork_asm+0x1a/0x30
[   12.495951] 
[   12.496307] The buggy address belongs to the object at ffff888100346600
[   12.496307]  which belongs to the cache kmalloc-256 of size 256
[   12.497486] The buggy address is located 0 bytes to the right of
[   12.497486]  allocated 201-byte region [ffff888100346600, ffff8881003466c9)
[   12.498822] 
[   12.498953] The buggy address belongs to the physical page:
[   12.499974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.500502] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.500822] flags: 0x200000000000040(head|node=0|zone=2)
[   12.501543] page_type: f5(slab)
[   12.501721] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.502054] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.502428] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.503236] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.503781] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.504111] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.504639] page dumped because: kasan: bad access detected
[   12.504991] 
[   12.505082] Memory state around the buggy address:
[   12.505461]  ffff888100346580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.506198]  ffff888100346600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.506502] >ffff888100346680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.506933]                                               ^
[   12.507496]  ffff888100346700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.507826]  ffff888100346780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.508492] ==================================================================
[   12.571325] ==================================================================
[   12.572434] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.572881] Write of size 1 at addr ffff8881003466ea by task kunit_try_catch/175
[   12.573431] 
[   12.573692] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.573741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.573753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.573774] Call Trace:
[   12.573789]  <TASK>
[   12.573807]  dump_stack_lvl+0x73/0xb0
[   12.573837]  print_report+0xd1/0x650
[   12.573858]  ? __virt_addr_valid+0x1db/0x2d0
[   12.573879]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.573902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.573926]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.573949]  kasan_report+0x141/0x180
[   12.573971]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.573999]  __asan_report_store1_noabort+0x1b/0x30
[   12.574021]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.574061]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.574082]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.574111]  ? __pfx_krealloc_less_oob+0x10/0x10
[   12.574137]  krealloc_less_oob+0x1c/0x30
[   12.574157]  kunit_try_run_case+0x1a5/0x480
[   12.574181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.574202]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.574224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.574247]  ? __kthread_parkme+0x82/0x180
[   12.574266]  ? preempt_count_sub+0x50/0x80
[   12.574289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.574311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.574333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.574355]  kthread+0x337/0x6f0
[   12.574373]  ? trace_preempt_on+0x20/0xc0
[   12.574394]  ? __pfx_kthread+0x10/0x10
[   12.574414]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.574433]  ? calculate_sigpending+0x7b/0xa0
[   12.574456]  ? __pfx_kthread+0x10/0x10
[   12.574477]  ret_from_fork+0x116/0x1d0
[   12.574495]  ? __pfx_kthread+0x10/0x10
[   12.574514]  ret_from_fork_asm+0x1a/0x30
[   12.574545]  </TASK>
[   12.574555] 
[   12.586322] Allocated by task 175:
[   12.586730]  kasan_save_stack+0x45/0x70
[   12.586945]  kasan_save_track+0x18/0x40
[   12.587341]  kasan_save_alloc_info+0x3b/0x50
[   12.587802]  __kasan_krealloc+0x190/0x1f0
[   12.587998]  krealloc_noprof+0xf3/0x340
[   12.588401]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.588692]  krealloc_less_oob+0x1c/0x30
[   12.588910]  kunit_try_run_case+0x1a5/0x480
[   12.589372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.589642]  kthread+0x337/0x6f0
[   12.589820]  ret_from_fork+0x116/0x1d0
[   12.590230]  ret_from_fork_asm+0x1a/0x30
[   12.590412] 
[   12.590512] The buggy address belongs to the object at ffff888100346600
[   12.590512]  which belongs to the cache kmalloc-256 of size 256
[   12.591515] The buggy address is located 33 bytes to the right of
[   12.591515]  allocated 201-byte region [ffff888100346600, ffff8881003466c9)
[   12.592374] 
[   12.592809] The buggy address belongs to the physical page:
[   12.593073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.593712] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.594253] flags: 0x200000000000040(head|node=0|zone=2)
[   12.594520] page_type: f5(slab)
[   12.594695] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.594986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.595825] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.596357] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.596824] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.597388] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.597918] page dumped because: kasan: bad access detected
[   12.598213] 
[   12.598500] Memory state around the buggy address:
[   12.598822]  ffff888100346580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.599145]  ffff888100346600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.599794] >ffff888100346680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.600263]                                                           ^
[   12.600530]  ffff888100346700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.600994]  ffff888100346780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.601472] ==================================================================