Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.775872] ==================================================================
[   16.775922] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.776088] Write of size 1 at addr fff00000c1d24eeb by task kunit_try_catch/158
[   16.776152] 
[   16.776183] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.776288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.776314] Hardware name: linux,dummy-virt (DT)
[   16.776355] Call trace:
[   16.776377]  show_stack+0x20/0x38 (C)
[   16.776559]  dump_stack_lvl+0x8c/0xd0
[   16.776609]  print_report+0x118/0x608
[   16.776655]  kasan_report+0xdc/0x128
[   16.776700]  __asan_report_store1_noabort+0x20/0x30
[   16.776804]  krealloc_less_oob_helper+0xa58/0xc50
[   16.776880]  krealloc_less_oob+0x20/0x38
[   16.776954]  kunit_try_run_case+0x170/0x3f0
[   16.777011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.777065]  kthread+0x328/0x630
[   16.777138]  ret_from_fork+0x10/0x20
[   16.777214] 
[   16.777232] Allocated by task 158:
[   16.777267]  kasan_save_stack+0x3c/0x68
[   16.777308]  kasan_save_track+0x20/0x40
[   16.777357]  kasan_save_alloc_info+0x40/0x58
[   16.777585]  __kasan_krealloc+0x118/0x178
[   16.777653]  krealloc_noprof+0x128/0x360
[   16.777709]  krealloc_less_oob_helper+0x168/0xc50
[   16.777767]  krealloc_less_oob+0x20/0x38
[   16.777803]  kunit_try_run_case+0x170/0x3f0
[   16.777860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.778063]  kthread+0x328/0x630
[   16.778138]  ret_from_fork+0x10/0x20
[   16.778267] 
[   16.778290] The buggy address belongs to the object at fff00000c1d24e00
[   16.778290]  which belongs to the cache kmalloc-256 of size 256
[   16.778411] The buggy address is located 34 bytes to the right of
[   16.778411]  allocated 201-byte region [fff00000c1d24e00, fff00000c1d24ec9)
[   16.778483] 
[   16.778503] The buggy address belongs to the physical page:
[   16.778532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d24
[   16.778583] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.778630] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.778678] page_type: f5(slab)
[   16.778714] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.778764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.778813] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.779047] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.779192] head: 0bfffe0000000001 ffffc1ffc3074901 00000000ffffffff 00000000ffffffff
[   16.779287] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.779445] page dumped because: kasan: bad access detected
[   16.779563] 
[   16.779668] Memory state around the buggy address:
[   16.779748]  fff00000c1d24d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.779842]  fff00000c1d24e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.779884] >fff00000c1d24e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.780124]                                                           ^
[   16.780181]  fff00000c1d24f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.780754]  fff00000c1d24f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.780805] ==================================================================
[   16.802568] ==================================================================
[   16.802623] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.802851] Write of size 1 at addr fff00000c78aa0c9 by task kunit_try_catch/162
[   16.802925] 
[   16.802962] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.803040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.803065] Hardware name: linux,dummy-virt (DT)
[   16.803095] Call trace:
[   16.803117]  show_stack+0x20/0x38 (C)
[   16.803167]  dump_stack_lvl+0x8c/0xd0
[   16.803389]  print_report+0x118/0x608
[   16.803504]  kasan_report+0xdc/0x128
[   16.803589]  __asan_report_store1_noabort+0x20/0x30
[   16.803642]  krealloc_less_oob_helper+0xa48/0xc50
[   16.803716]  krealloc_large_less_oob+0x20/0x38
[   16.803788]  kunit_try_run_case+0x170/0x3f0
[   16.803866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.803950]  kthread+0x328/0x630
[   16.804004]  ret_from_fork+0x10/0x20
[   16.804070] 
[   16.804118] The buggy address belongs to the physical page:
[   16.804355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a8
[   16.804522] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.804574] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.804670] page_type: f8(unknown)
[   16.804736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.804809] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.804894] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.804949] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.805004] head: 0bfffe0000000002 ffffc1ffc31e2a01 00000000ffffffff 00000000ffffffff
[   16.805052] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.805090] page dumped because: kasan: bad access detected
[   16.805119] 
[   16.805136] Memory state around the buggy address:
[   16.805171]  fff00000c78a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.805363]  fff00000c78aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.805478] >fff00000c78aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.805557]                                               ^
[   16.805619]  fff00000c78aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.805686]  fff00000c78aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.805724] ==================================================================
[   16.769776] ==================================================================
[   16.769846] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.770166] Write of size 1 at addr fff00000c1d24eea by task kunit_try_catch/158
[   16.770330] 
[   16.770464] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.770607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.770656] Hardware name: linux,dummy-virt (DT)
[   16.770766] Call trace:
[   16.770805]  show_stack+0x20/0x38 (C)
[   16.770855]  dump_stack_lvl+0x8c/0xd0
[   16.770901]  print_report+0x118/0x608
[   16.770947]  kasan_report+0xdc/0x128
[   16.771122]  __asan_report_store1_noabort+0x20/0x30
[   16.771442]  krealloc_less_oob_helper+0xae4/0xc50
[   16.771642]  krealloc_less_oob+0x20/0x38
[   16.771811]  kunit_try_run_case+0x170/0x3f0
[   16.771898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.771976]  kthread+0x328/0x630
[   16.772212]  ret_from_fork+0x10/0x20
[   16.772319] 
[   16.772346] Allocated by task 158:
[   16.772373]  kasan_save_stack+0x3c/0x68
[   16.772621]  kasan_save_track+0x20/0x40
[   16.772717]  kasan_save_alloc_info+0x40/0x58
[   16.772835]  __kasan_krealloc+0x118/0x178
[   16.772970]  krealloc_noprof+0x128/0x360
[   16.773057]  krealloc_less_oob_helper+0x168/0xc50
[   16.773167]  krealloc_less_oob+0x20/0x38
[   16.773203]  kunit_try_run_case+0x170/0x3f0
[   16.773276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.773623]  kthread+0x328/0x630
[   16.773794]  ret_from_fork+0x10/0x20
[   16.773907] 
[   16.774040] The buggy address belongs to the object at fff00000c1d24e00
[   16.774040]  which belongs to the cache kmalloc-256 of size 256
[   16.774110] The buggy address is located 33 bytes to the right of
[   16.774110]  allocated 201-byte region [fff00000c1d24e00, fff00000c1d24ec9)
[   16.774171] 
[   16.774190] The buggy address belongs to the physical page:
[   16.774225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d24
[   16.774286] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.774330] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.774401] page_type: f5(slab)
[   16.774449] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.774497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.774545] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.774602] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.774649] head: 0bfffe0000000001 ffffc1ffc3074901 00000000ffffffff 00000000ffffffff
[   16.774706] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.774745] page dumped because: kasan: bad access detected
[   16.774774] 
[   16.774791] Memory state around the buggy address:
[   16.774829]  fff00000c1d24d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.774870]  fff00000c1d24e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.774919] >fff00000c1d24e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.774970]                                                           ^
[   16.775006]  fff00000c1d24f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775074]  fff00000c1d24f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775119] ==================================================================
[   16.813982] ==================================================================
[   16.814016] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.814059] Write of size 1 at addr fff00000c78aa0ea by task kunit_try_catch/162
[   16.814105] 
[   16.814133] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.814208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.814257] Hardware name: linux,dummy-virt (DT)
[   16.814288] Call trace:
[   16.814308]  show_stack+0x20/0x38 (C)
[   16.814368]  dump_stack_lvl+0x8c/0xd0
[   16.814414]  print_report+0x118/0x608
[   16.814606]  kasan_report+0xdc/0x128
[   16.814796]  __asan_report_store1_noabort+0x20/0x30
[   16.814879]  krealloc_less_oob_helper+0xae4/0xc50
[   16.814968]  krealloc_large_less_oob+0x20/0x38
[   16.815054]  kunit_try_run_case+0x170/0x3f0
[   16.815164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.815283]  kthread+0x328/0x630
[   16.815432]  ret_from_fork+0x10/0x20
[   16.815499] 
[   16.815518] The buggy address belongs to the physical page:
[   16.815546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a8
[   16.815596] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.815641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.815909] page_type: f8(unknown)
[   16.816018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.816066] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.816157] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.816225] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.816298] head: 0bfffe0000000002 ffffc1ffc31e2a01 00000000ffffffff 00000000ffffffff
[   16.816449] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.816556] page dumped because: kasan: bad access detected
[   16.816691] 
[   16.816741] Memory state around the buggy address:
[   16.816793]  fff00000c78a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.816834]  fff00000c78aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.816903] >fff00000c78aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.816959]                                                           ^
[   16.816996]  fff00000c78aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.817039]  fff00000c78aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.817074] ==================================================================
[   16.811468] ==================================================================
[   16.811541] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.811613] Write of size 1 at addr fff00000c78aa0da by task kunit_try_catch/162
[   16.811688] 
[   16.811717] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.811795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.812051] Hardware name: linux,dummy-virt (DT)
[   16.812092] Call trace:
[   16.812194]  show_stack+0x20/0x38 (C)
[   16.812248]  dump_stack_lvl+0x8c/0xd0
[   16.812304]  print_report+0x118/0x608
[   16.812363]  kasan_report+0xdc/0x128
[   16.812619]  __asan_report_store1_noabort+0x20/0x30
[   16.812717]  krealloc_less_oob_helper+0xa80/0xc50
[   16.812821]  krealloc_large_less_oob+0x20/0x38
[   16.812894]  kunit_try_run_case+0x170/0x3f0
[   16.812944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.812996]  kthread+0x328/0x630
[   16.813038]  ret_from_fork+0x10/0x20
[   16.813084] 
[   16.813103] The buggy address belongs to the physical page:
[   16.813151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a8
[   16.813202] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.813246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.813294] page_type: f8(unknown)
[   16.813331] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.813399] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.813447] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.813493] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.813540] head: 0bfffe0000000002 ffffc1ffc31e2a01 00000000ffffffff 00000000ffffffff
[   16.813587] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.813625] page dumped because: kasan: bad access detected
[   16.813653] 
[   16.813672] Memory state around the buggy address:
[   16.813701]  fff00000c78a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.813741]  fff00000c78aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.813781] >fff00000c78aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.813816]                                                     ^
[   16.813851]  fff00000c78aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.813891]  fff00000c78aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.813933] ==================================================================
[   16.760586] ==================================================================
[   16.760661] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.760710] Write of size 1 at addr fff00000c1d24ed0 by task kunit_try_catch/158
[   16.760758] 
[   16.760788] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.760866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.760896] Hardware name: linux,dummy-virt (DT)
[   16.760936] Call trace:
[   16.760958]  show_stack+0x20/0x38 (C)
[   16.761006]  dump_stack_lvl+0x8c/0xd0
[   16.761053]  print_report+0x118/0x608
[   16.761099]  kasan_report+0xdc/0x128
[   16.761150]  __asan_report_store1_noabort+0x20/0x30
[   16.761202]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.761258]  krealloc_less_oob+0x20/0x38
[   16.761311]  kunit_try_run_case+0x170/0x3f0
[   16.761380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.761442]  kthread+0x328/0x630
[   16.761483]  ret_from_fork+0x10/0x20
[   16.761529] 
[   16.761552] Allocated by task 158:
[   16.761578]  kasan_save_stack+0x3c/0x68
[   16.761617]  kasan_save_track+0x20/0x40
[   16.761653]  kasan_save_alloc_info+0x40/0x58
[   16.761692]  __kasan_krealloc+0x118/0x178
[   16.761729]  krealloc_noprof+0x128/0x360
[   16.761770]  krealloc_less_oob_helper+0x168/0xc50
[   16.761810]  krealloc_less_oob+0x20/0x38
[   16.761851]  kunit_try_run_case+0x170/0x3f0
[   16.761888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.761961]  kthread+0x328/0x630
[   16.761993]  ret_from_fork+0x10/0x20
[   16.762027] 
[   16.762045] The buggy address belongs to the object at fff00000c1d24e00
[   16.762045]  which belongs to the cache kmalloc-256 of size 256
[   16.762099] The buggy address is located 7 bytes to the right of
[   16.762099]  allocated 201-byte region [fff00000c1d24e00, fff00000c1d24ec9)
[   16.762159] 
[   16.762204] The buggy address belongs to the physical page:
[   16.762235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d24
[   16.762285] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.762358] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.762409] page_type: f5(slab)
[   16.762444] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.762492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.762539] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.762586] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.762633] head: 0bfffe0000000001 ffffc1ffc3074901 00000000ffffffff 00000000ffffffff
[   16.762680] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.762717] page dumped because: kasan: bad access detected
[   16.762747] 
[   16.762764] Memory state around the buggy address:
[   16.762793]  fff00000c1d24d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.762864]  fff00000c1d24e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.762953] >fff00000c1d24e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.763012]                                                  ^
[   16.763064]  fff00000c1d24f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.763144]  fff00000c1d24f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.763256] ==================================================================
[   16.805852] ==================================================================
[   16.805940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.806479] Write of size 1 at addr fff00000c78aa0d0 by task kunit_try_catch/162
[   16.806554] 
[   16.806597] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.806693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.806727] Hardware name: linux,dummy-virt (DT)
[   16.806755] Call trace:
[   16.806775]  show_stack+0x20/0x38 (C)
[   16.806824]  dump_stack_lvl+0x8c/0xd0
[   16.806890]  print_report+0x118/0x608
[   16.806938]  kasan_report+0xdc/0x128
[   16.806983]  __asan_report_store1_noabort+0x20/0x30
[   16.807160]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.807217]  krealloc_large_less_oob+0x20/0x38
[   16.807265]  kunit_try_run_case+0x170/0x3f0
[   16.807490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.807658]  kthread+0x328/0x630
[   16.807804]  ret_from_fork+0x10/0x20
[   16.807913] 
[   16.808030] The buggy address belongs to the physical page:
[   16.808085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a8
[   16.808135] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.808196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.808542] page_type: f8(unknown)
[   16.808685] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.808802] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.808914] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.808994] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.809128] head: 0bfffe0000000002 ffffc1ffc31e2a01 00000000ffffffff 00000000ffffffff
[   16.809256] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.809397] page dumped because: kasan: bad access detected
[   16.809428] 
[   16.809445] Memory state around the buggy address:
[   16.809533]  fff00000c78a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.809856]  fff00000c78aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.810113] >fff00000c78aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.810206]                                                  ^
[   16.810313]  fff00000c78aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.810378]  fff00000c78aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.810416] ==================================================================
[   16.754555] ==================================================================
[   16.754733] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.754811] Write of size 1 at addr fff00000c1d24ec9 by task kunit_try_catch/158
[   16.754883] 
[   16.754923] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.755007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.755033] Hardware name: linux,dummy-virt (DT)
[   16.755201] Call trace:
[   16.755317]  show_stack+0x20/0x38 (C)
[   16.755526]  dump_stack_lvl+0x8c/0xd0
[   16.755620]  print_report+0x118/0x608
[   16.755742]  kasan_report+0xdc/0x128
[   16.755836]  __asan_report_store1_noabort+0x20/0x30
[   16.755889]  krealloc_less_oob_helper+0xa48/0xc50
[   16.756248]  krealloc_less_oob+0x20/0x38
[   16.756411]  kunit_try_run_case+0x170/0x3f0
[   16.756579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.756635]  kthread+0x328/0x630
[   16.756678]  ret_from_fork+0x10/0x20
[   16.756728] 
[   16.756746] Allocated by task 158:
[   16.756773]  kasan_save_stack+0x3c/0x68
[   16.756963]  kasan_save_track+0x20/0x40
[   16.757042]  kasan_save_alloc_info+0x40/0x58
[   16.757156]  __kasan_krealloc+0x118/0x178
[   16.757204]  krealloc_noprof+0x128/0x360
[   16.757241]  krealloc_less_oob_helper+0x168/0xc50
[   16.757280]  krealloc_less_oob+0x20/0x38
[   16.757315]  kunit_try_run_case+0x170/0x3f0
[   16.757499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.757603]  kthread+0x328/0x630
[   16.757683]  ret_from_fork+0x10/0x20
[   16.757731] 
[   16.757750] The buggy address belongs to the object at fff00000c1d24e00
[   16.757750]  which belongs to the cache kmalloc-256 of size 256
[   16.757807] The buggy address is located 0 bytes to the right of
[   16.757807]  allocated 201-byte region [fff00000c1d24e00, fff00000c1d24ec9)
[   16.757868] 
[   16.757891] The buggy address belongs to the physical page:
[   16.757952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d24
[   16.758009] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.758173] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.758290] page_type: f5(slab)
[   16.758365] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.758436] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.758486] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.758533] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.758580] head: 0bfffe0000000001 ffffc1ffc3074901 00000000ffffffff 00000000ffffffff
[   16.758743] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.758809] page dumped because: kasan: bad access detected
[   16.758918] 
[   16.759021] Memory state around the buggy address:
[   16.759063]  fff00000c1d24d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759143]  fff00000c1d24e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.759214] >fff00000c1d24e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.759251]                                               ^
[   16.759285]  fff00000c1d24f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759363]  fff00000c1d24f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759556] ==================================================================
[   16.817534] ==================================================================
[   16.817578] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.817693] Write of size 1 at addr fff00000c78aa0eb by task kunit_try_catch/162
[   16.817779] 
[   16.817817] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.817927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.818061] Hardware name: linux,dummy-virt (DT)
[   16.818169] Call trace:
[   16.818315]  show_stack+0x20/0x38 (C)
[   16.818390]  dump_stack_lvl+0x8c/0xd0
[   16.818537]  print_report+0x118/0x608
[   16.818753]  kasan_report+0xdc/0x128
[   16.818949]  __asan_report_store1_noabort+0x20/0x30
[   16.819036]  krealloc_less_oob_helper+0xa58/0xc50
[   16.819130]  krealloc_large_less_oob+0x20/0x38
[   16.819252]  kunit_try_run_case+0x170/0x3f0
[   16.819443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.819529]  kthread+0x328/0x630
[   16.819641]  ret_from_fork+0x10/0x20
[   16.819901] 
[   16.819924] The buggy address belongs to the physical page:
[   16.819954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a8
[   16.820415] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.820578] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.820663] page_type: f8(unknown)
[   16.820716] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.820869] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.821201] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.821272] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.821416] head: 0bfffe0000000002 ffffc1ffc31e2a01 00000000ffffffff 00000000ffffffff
[   16.821552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.821707] page dumped because: kasan: bad access detected
[   16.821797] 
[   16.821947] Memory state around the buggy address:
[   16.821990]  fff00000c78a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.822031]  fff00000c78aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.822072] >fff00000c78aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.822108]                                                           ^
[   16.822146]  fff00000c78aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.822186]  fff00000c78aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.822625] ==================================================================
[   16.764211] ==================================================================
[   16.764405] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.764461] Write of size 1 at addr fff00000c1d24eda by task kunit_try_catch/158
[   16.764605] 
[   16.764664] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.764743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.764786] Hardware name: linux,dummy-virt (DT)
[   16.764815] Call trace:
[   16.764836]  show_stack+0x20/0x38 (C)
[   16.764901]  dump_stack_lvl+0x8c/0xd0
[   16.764948]  print_report+0x118/0x608
[   16.764993]  kasan_report+0xdc/0x128
[   16.765234]  __asan_report_store1_noabort+0x20/0x30
[   16.765298]  krealloc_less_oob_helper+0xa80/0xc50
[   16.765379]  krealloc_less_oob+0x20/0x38
[   16.765444]  kunit_try_run_case+0x170/0x3f0
[   16.765510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.765569]  kthread+0x328/0x630
[   16.765637]  ret_from_fork+0x10/0x20
[   16.765731] 
[   16.765779] Allocated by task 158:
[   16.765807]  kasan_save_stack+0x3c/0x68
[   16.765873]  kasan_save_track+0x20/0x40
[   16.766026]  kasan_save_alloc_info+0x40/0x58
[   16.766136]  __kasan_krealloc+0x118/0x178
[   16.766175]  krealloc_noprof+0x128/0x360
[   16.766211]  krealloc_less_oob_helper+0x168/0xc50
[   16.766250]  krealloc_less_oob+0x20/0x38
[   16.766285]  kunit_try_run_case+0x170/0x3f0
[   16.766322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.766431]  kthread+0x328/0x630
[   16.766474]  ret_from_fork+0x10/0x20
[   16.766509] 
[   16.766527] The buggy address belongs to the object at fff00000c1d24e00
[   16.766527]  which belongs to the cache kmalloc-256 of size 256
[   16.766589] The buggy address is located 17 bytes to the right of
[   16.766589]  allocated 201-byte region [fff00000c1d24e00, fff00000c1d24ec9)
[   16.766691] 
[   16.766769] The buggy address belongs to the physical page:
[   16.766824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d24
[   16.766921] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.766998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.767085] page_type: f5(slab)
[   16.767202] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.767328] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.767455] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.767567] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.767617] head: 0bfffe0000000001 ffffc1ffc3074901 00000000ffffffff 00000000ffffffff
[   16.767936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.768073] page dumped because: kasan: bad access detected
[   16.768151] 
[   16.768189] Memory state around the buggy address:
[   16.768218]  fff00000c1d24d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.768383]  fff00000c1d24e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.768646] >fff00000c1d24e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.768724]                                                     ^
[   16.768807]  fff00000c1d24f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.768893]  fff00000c1d24f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.768940] ==================================================================

[   12.262767] ==================================================================
[   12.263303] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.263622] Write of size 1 at addr ffff888100a964da by task kunit_try_catch/175
[   12.263871] 
[   12.264157] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.264202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.264213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.264233] Call Trace:
[   12.264248]  <TASK>
[   12.264263]  dump_stack_lvl+0x73/0xb0
[   12.264292]  print_report+0xd1/0x650
[   12.264314]  ? __virt_addr_valid+0x1db/0x2d0
[   12.264336]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.264360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.264382]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.264406]  kasan_report+0x141/0x180
[   12.264427]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.264455]  __asan_report_store1_noabort+0x1b/0x30
[   12.264480]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.264505]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.264530]  ? finish_task_switch.isra.0+0x153/0x700
[   12.264553]  ? __switch_to+0x47/0xf50
[   12.264577]  ? __schedule+0x10cc/0x2b60
[   12.264598]  ? __pfx_read_tsc+0x10/0x10
[   12.264621]  krealloc_less_oob+0x1c/0x30
[   12.264642]  kunit_try_run_case+0x1a5/0x480
[   12.264666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.264688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.264711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.264734]  ? __kthread_parkme+0x82/0x180
[   12.264753]  ? preempt_count_sub+0x50/0x80
[   12.264775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.264799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.264841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.264866]  kthread+0x337/0x6f0
[   12.264884]  ? trace_preempt_on+0x20/0xc0
[   12.264907]  ? __pfx_kthread+0x10/0x10
[   12.264927]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.264996]  ? calculate_sigpending+0x7b/0xa0
[   12.265021]  ? __pfx_kthread+0x10/0x10
[   12.265056]  ret_from_fork+0x116/0x1d0
[   12.265074]  ? __pfx_kthread+0x10/0x10
[   12.265094]  ret_from_fork_asm+0x1a/0x30
[   12.265125]  </TASK>
[   12.265134] 
[   12.273329] Allocated by task 175:
[   12.273459]  kasan_save_stack+0x45/0x70
[   12.273658]  kasan_save_track+0x18/0x40
[   12.274021]  kasan_save_alloc_info+0x3b/0x50
[   12.274289]  __kasan_krealloc+0x190/0x1f0
[   12.274477]  krealloc_noprof+0xf3/0x340
[   12.274613]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.274863]  krealloc_less_oob+0x1c/0x30
[   12.275136]  kunit_try_run_case+0x1a5/0x480
[   12.275344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.275520]  kthread+0x337/0x6f0
[   12.275639]  ret_from_fork+0x116/0x1d0
[   12.275796]  ret_from_fork_asm+0x1a/0x30
[   12.276167] 
[   12.276269] The buggy address belongs to the object at ffff888100a96400
[   12.276269]  which belongs to the cache kmalloc-256 of size 256
[   12.276798] The buggy address is located 17 bytes to the right of
[   12.276798]  allocated 201-byte region [ffff888100a96400, ffff888100a964c9)
[   12.277405] 
[   12.277485] The buggy address belongs to the physical page:
[   12.277657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96
[   12.278227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.278729] flags: 0x200000000000040(head|node=0|zone=2)
[   12.278901] page_type: f5(slab)
[   12.279018] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.279811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.280281] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.280518] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.281042] head: 0200000000000001 ffffea000402a581 00000000ffffffff 00000000ffffffff
[   12.281378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.281633] page dumped because: kasan: bad access detected
[   12.281896] 
[   12.281988] Memory state around the buggy address:
[   12.282180]  ffff888100a96380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.282613]  ffff888100a96400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.283131] >ffff888100a96480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.283406]                                                     ^
[   12.283663]  ffff888100a96500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.284070]  ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.284290] ==================================================================
[   12.307333] ==================================================================
[   12.307601] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.308046] Write of size 1 at addr ffff888100a964eb by task kunit_try_catch/175
[   12.308280] 
[   12.308389] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.308429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.308439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.308458] Call Trace:
[   12.308472]  <TASK>
[   12.308485]  dump_stack_lvl+0x73/0xb0
[   12.308514]  print_report+0xd1/0x650
[   12.308538]  ? __virt_addr_valid+0x1db/0x2d0
[   12.308563]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.308592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.308615]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.308640]  kasan_report+0x141/0x180
[   12.308661]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.308689]  __asan_report_store1_noabort+0x1b/0x30
[   12.308714]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.308739]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.308766]  ? finish_task_switch.isra.0+0x153/0x700
[   12.308789]  ? __switch_to+0x47/0xf50
[   12.308813]  ? __schedule+0x10cc/0x2b60
[   12.308834]  ? __pfx_read_tsc+0x10/0x10
[   12.308857]  krealloc_less_oob+0x1c/0x30
[   12.308878]  kunit_try_run_case+0x1a5/0x480
[   12.308902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.308925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.309165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.309191]  ? __kthread_parkme+0x82/0x180
[   12.309211]  ? preempt_count_sub+0x50/0x80
[   12.309234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.309258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.309283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.309308]  kthread+0x337/0x6f0
[   12.309326]  ? trace_preempt_on+0x20/0xc0
[   12.309349]  ? __pfx_kthread+0x10/0x10
[   12.309369]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.309390]  ? calculate_sigpending+0x7b/0xa0
[   12.309413]  ? __pfx_kthread+0x10/0x10
[   12.309434]  ret_from_fork+0x116/0x1d0
[   12.309479]  ? __pfx_kthread+0x10/0x10
[   12.309500]  ret_from_fork_asm+0x1a/0x30
[   12.309530]  </TASK>
[   12.309539] 
[   12.317703] Allocated by task 175:
[   12.317985]  kasan_save_stack+0x45/0x70
[   12.318171]  kasan_save_track+0x18/0x40
[   12.318333]  kasan_save_alloc_info+0x3b/0x50
[   12.318540]  __kasan_krealloc+0x190/0x1f0
[   12.318703]  krealloc_noprof+0xf3/0x340
[   12.318853]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.319254]  krealloc_less_oob+0x1c/0x30
[   12.319486]  kunit_try_run_case+0x1a5/0x480
[   12.319669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.319845]  kthread+0x337/0x6f0
[   12.319968]  ret_from_fork+0x116/0x1d0
[   12.320305]  ret_from_fork_asm+0x1a/0x30
[   12.320503] 
[   12.320599] The buggy address belongs to the object at ffff888100a96400
[   12.320599]  which belongs to the cache kmalloc-256 of size 256
[   12.321406] The buggy address is located 34 bytes to the right of
[   12.321406]  allocated 201-byte region [ffff888100a96400, ffff888100a964c9)
[   12.321990] 
[   12.322137] The buggy address belongs to the physical page:
[   12.322394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96
[   12.322763] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.323243] flags: 0x200000000000040(head|node=0|zone=2)
[   12.323517] page_type: f5(slab)
[   12.323687] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.324176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.324531] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.325135] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.325446] head: 0200000000000001 ffffea000402a581 00000000ffffffff 00000000ffffffff
[   12.325898] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.326239] page dumped because: kasan: bad access detected
[   12.326492] 
[   12.326612] Memory state around the buggy address:
[   12.326884]  ffff888100a96380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.327286]  ffff888100a96400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.327580] >ffff888100a96480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.328024]                                                           ^
[   12.328287]  ffff888100a96500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.328607]  ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.328932] ==================================================================
[   12.203925] ==================================================================
[   12.204408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.204732] Write of size 1 at addr ffff888100a964c9 by task kunit_try_catch/175
[   12.205257] 
[   12.205372] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.205417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.205688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.205712] Call Trace:
[   12.205723]  <TASK>
[   12.205738]  dump_stack_lvl+0x73/0xb0
[   12.205781]  print_report+0xd1/0x650
[   12.205803]  ? __virt_addr_valid+0x1db/0x2d0
[   12.205825]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.205859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.205942]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.205967]  kasan_report+0x141/0x180
[   12.205988]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.206025]  __asan_report_store1_noabort+0x1b/0x30
[   12.206061]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.206098]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.206123]  ? finish_task_switch.isra.0+0x153/0x700
[   12.206146]  ? __switch_to+0x47/0xf50
[   12.206172]  ? __schedule+0x10cc/0x2b60
[   12.206193]  ? __pfx_read_tsc+0x10/0x10
[   12.206217]  krealloc_less_oob+0x1c/0x30
[   12.206239]  kunit_try_run_case+0x1a5/0x480
[   12.206264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.206287]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.206310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.206335]  ? __kthread_parkme+0x82/0x180
[   12.206356]  ? preempt_count_sub+0x50/0x80
[   12.206378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.206402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.206427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.206452]  kthread+0x337/0x6f0
[   12.206472]  ? trace_preempt_on+0x20/0xc0
[   12.206496]  ? __pfx_kthread+0x10/0x10
[   12.206516]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.206538]  ? calculate_sigpending+0x7b/0xa0
[   12.206561]  ? __pfx_kthread+0x10/0x10
[   12.206581]  ret_from_fork+0x116/0x1d0
[   12.206599]  ? __pfx_kthread+0x10/0x10
[   12.206619]  ret_from_fork_asm+0x1a/0x30
[   12.206649]  </TASK>
[   12.206659] 
[   12.215261] Allocated by task 175:
[   12.215393]  kasan_save_stack+0x45/0x70
[   12.215580]  kasan_save_track+0x18/0x40
[   12.215769]  kasan_save_alloc_info+0x3b/0x50
[   12.216008]  __kasan_krealloc+0x190/0x1f0
[   12.216162]  krealloc_noprof+0xf3/0x340
[   12.216298]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.216869]  krealloc_less_oob+0x1c/0x30
[   12.217225]  kunit_try_run_case+0x1a5/0x480
[   12.217483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.217667]  kthread+0x337/0x6f0
[   12.217790]  ret_from_fork+0x116/0x1d0
[   12.217966]  ret_from_fork_asm+0x1a/0x30
[   12.218168] 
[   12.218274] The buggy address belongs to the object at ffff888100a96400
[   12.218274]  which belongs to the cache kmalloc-256 of size 256
[   12.218797] The buggy address is located 0 bytes to the right of
[   12.218797]  allocated 201-byte region [ffff888100a96400, ffff888100a964c9)
[   12.219704] 
[   12.219806] The buggy address belongs to the physical page:
[   12.220262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96
[   12.220603] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.221088] flags: 0x200000000000040(head|node=0|zone=2)
[   12.221340] page_type: f5(slab)
[   12.221512] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.221768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.222383] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.222673] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.223237] head: 0200000000000001 ffffea000402a581 00000000ffffffff 00000000ffffffff
[   12.223572] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.224054] page dumped because: kasan: bad access detected
[   12.224293] 
[   12.224363] Memory state around the buggy address:
[   12.224532]  ffff888100a96380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.224851]  ffff888100a96400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.225104] >ffff888100a96480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.225417]                                               ^
[   12.225645]  ffff888100a96500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.225888]  ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.226249] ==================================================================
[   12.420198] ==================================================================
[   12.420487] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.420784] Write of size 1 at addr ffff888102a520ea by task kunit_try_catch/179
[   12.421259] 
[   12.421344] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.421383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.421393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.421411] Call Trace:
[   12.421423]  <TASK>
[   12.421435]  dump_stack_lvl+0x73/0xb0
[   12.421462]  print_report+0xd1/0x650
[   12.421483]  ? __virt_addr_valid+0x1db/0x2d0
[   12.421504]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.421528]  ? kasan_addr_to_slab+0x11/0xa0
[   12.421548]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.421572]  kasan_report+0x141/0x180
[   12.421593]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.421621]  __asan_report_store1_noabort+0x1b/0x30
[   12.421646]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.421671]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.421696]  ? finish_task_switch.isra.0+0x153/0x700
[   12.421718]  ? __switch_to+0x47/0xf50
[   12.421743]  ? __schedule+0x10cc/0x2b60
[   12.421763]  ? __pfx_read_tsc+0x10/0x10
[   12.421786]  krealloc_large_less_oob+0x1c/0x30
[   12.421890]  kunit_try_run_case+0x1a5/0x480
[   12.421913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.421936]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.421975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.421999]  ? __kthread_parkme+0x82/0x180
[   12.422018]  ? preempt_count_sub+0x50/0x80
[   12.422049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.422073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.422097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.422122]  kthread+0x337/0x6f0
[   12.422140]  ? trace_preempt_on+0x20/0xc0
[   12.422163]  ? __pfx_kthread+0x10/0x10
[   12.422183]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.422203]  ? calculate_sigpending+0x7b/0xa0
[   12.422226]  ? __pfx_kthread+0x10/0x10
[   12.422247]  ret_from_fork+0x116/0x1d0
[   12.422265]  ? __pfx_kthread+0x10/0x10
[   12.422285]  ret_from_fork_asm+0x1a/0x30
[   12.422315]  </TASK>
[   12.422324] 
[   12.432101] The buggy address belongs to the physical page:
[   12.432350] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a50
[   12.432672] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.433532] flags: 0x200000000000040(head|node=0|zone=2)
[   12.434163] page_type: f8(unknown)
[   12.434391] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.435044] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.435535] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.436169] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.436724] head: 0200000000000002 ffffea00040a9401 00000000ffffffff 00000000ffffffff
[   12.437477] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.438083] page dumped because: kasan: bad access detected
[   12.438448] 
[   12.438543] Memory state around the buggy address:
[   12.438753]  ffff888102a51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.439378]  ffff888102a52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.439679] >ffff888102a52080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.439978]                                                           ^
[   12.440257]  ffff888102a52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.440546]  ffff888102a52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.440833] ==================================================================
[   12.371383] ==================================================================
[   12.371855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.372196] Write of size 1 at addr ffff888102a520c9 by task kunit_try_catch/179
[   12.372497] 
[   12.372593] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.372636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.372647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.372666] Call Trace:
[   12.372679]  <TASK>
[   12.372693]  dump_stack_lvl+0x73/0xb0
[   12.372722]  print_report+0xd1/0x650
[   12.372743]  ? __virt_addr_valid+0x1db/0x2d0
[   12.372765]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.372788]  ? kasan_addr_to_slab+0x11/0xa0
[   12.372807]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.372829]  kasan_report+0x141/0x180
[   12.372850]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.372877]  __asan_report_store1_noabort+0x1b/0x30
[   12.372900]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.372924]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.372947]  ? finish_task_switch.isra.0+0x153/0x700
[   12.372969]  ? __switch_to+0x47/0xf50
[   12.372993]  ? __schedule+0x10cc/0x2b60
[   12.373013]  ? __pfx_read_tsc+0x10/0x10
[   12.373073]  krealloc_large_less_oob+0x1c/0x30
[   12.373098]  kunit_try_run_case+0x1a5/0x480
[   12.373125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.373149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.373173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.373196]  ? __kthread_parkme+0x82/0x180
[   12.373227]  ? preempt_count_sub+0x50/0x80
[   12.373256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.373280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.373304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.373329]  kthread+0x337/0x6f0
[   12.373348]  ? trace_preempt_on+0x20/0xc0
[   12.373371]  ? __pfx_kthread+0x10/0x10
[   12.373391]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.373412]  ? calculate_sigpending+0x7b/0xa0
[   12.373436]  ? __pfx_kthread+0x10/0x10
[   12.373456]  ret_from_fork+0x116/0x1d0
[   12.373474]  ? __pfx_kthread+0x10/0x10
[   12.373511]  ret_from_fork_asm+0x1a/0x30
[   12.373541]  </TASK>
[   12.373551] 
[   12.381464] The buggy address belongs to the physical page:
[   12.381729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a50
[   12.382095] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.382444] flags: 0x200000000000040(head|node=0|zone=2)
[   12.382658] page_type: f8(unknown)
[   12.382928] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.383277] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.383618] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.383984] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.384231] head: 0200000000000002 ffffea00040a9401 00000000ffffffff 00000000ffffffff
[   12.384570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.385089] page dumped because: kasan: bad access detected
[   12.385313] 
[   12.385410] Memory state around the buggy address:
[   12.385596]  ffff888102a51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.385851]  ffff888102a52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.386185] >ffff888102a52080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.386504]                                               ^
[   12.386734]  ffff888102a52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.387146]  ffff888102a52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.387421] ==================================================================
[   12.404083] ==================================================================
[   12.404384] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.404678] Write of size 1 at addr ffff888102a520da by task kunit_try_catch/179
[   12.405170] 
[   12.405273] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.405312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.405322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.405341] Call Trace:
[   12.405354]  <TASK>
[   12.405367]  dump_stack_lvl+0x73/0xb0
[   12.405397]  print_report+0xd1/0x650
[   12.405419]  ? __virt_addr_valid+0x1db/0x2d0
[   12.405441]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.405465]  ? kasan_addr_to_slab+0x11/0xa0
[   12.405486]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.405510]  kasan_report+0x141/0x180
[   12.405532]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.405560]  __asan_report_store1_noabort+0x1b/0x30
[   12.405585]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.405610]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.405635]  ? finish_task_switch.isra.0+0x153/0x700
[   12.405657]  ? __switch_to+0x47/0xf50
[   12.405681]  ? __schedule+0x10cc/0x2b60
[   12.405702]  ? __pfx_read_tsc+0x10/0x10
[   12.405726]  krealloc_large_less_oob+0x1c/0x30
[   12.405748]  kunit_try_run_case+0x1a5/0x480
[   12.405771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.405869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.405897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.405921]  ? __kthread_parkme+0x82/0x180
[   12.405941]  ? preempt_count_sub+0x50/0x80
[   12.405979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.406005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.406039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.406064]  kthread+0x337/0x6f0
[   12.406082]  ? trace_preempt_on+0x20/0xc0
[   12.406105]  ? __pfx_kthread+0x10/0x10
[   12.406125]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.406146]  ? calculate_sigpending+0x7b/0xa0
[   12.406169]  ? __pfx_kthread+0x10/0x10
[   12.406190]  ret_from_fork+0x116/0x1d0
[   12.406208]  ? __pfx_kthread+0x10/0x10
[   12.406229]  ret_from_fork_asm+0x1a/0x30
[   12.406259]  </TASK>
[   12.406268] 
[   12.413672] The buggy address belongs to the physical page:
[   12.414027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a50
[   12.414399] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.414734] flags: 0x200000000000040(head|node=0|zone=2)
[   12.415087] page_type: f8(unknown)
[   12.415259] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.415564] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.415917] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.416191] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.416485] head: 0200000000000002 ffffea00040a9401 00000000ffffffff 00000000ffffffff
[   12.416980] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.417361] page dumped because: kasan: bad access detected
[   12.417537] 
[   12.417606] Memory state around the buggy address:
[   12.417770]  ffff888102a51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.418198]  ffff888102a52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.418518] >ffff888102a52080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.418895]                                                     ^
[   12.419190]  ffff888102a52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.419470]  ffff888102a52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.419765] ==================================================================
[   12.284764] ==================================================================
[   12.285265] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.285727] Write of size 1 at addr ffff888100a964ea by task kunit_try_catch/175
[   12.286142] 
[   12.286249] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.286292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.286302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.286321] Call Trace:
[   12.286335]  <TASK>
[   12.286349]  dump_stack_lvl+0x73/0xb0
[   12.286377]  print_report+0xd1/0x650
[   12.286397]  ? __virt_addr_valid+0x1db/0x2d0
[   12.286419]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.286442]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.286464]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.286488]  kasan_report+0x141/0x180
[   12.286509]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.286537]  __asan_report_store1_noabort+0x1b/0x30
[   12.286561]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.286587]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.286612]  ? finish_task_switch.isra.0+0x153/0x700
[   12.286633]  ? __switch_to+0x47/0xf50
[   12.286657]  ? __schedule+0x10cc/0x2b60
[   12.286677]  ? __pfx_read_tsc+0x10/0x10
[   12.286701]  krealloc_less_oob+0x1c/0x30
[   12.286721]  kunit_try_run_case+0x1a5/0x480
[   12.286746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.286768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.286791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.286815]  ? __kthread_parkme+0x82/0x180
[   12.286989]  ? preempt_count_sub+0x50/0x80
[   12.287013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.287053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.287078]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.287102]  kthread+0x337/0x6f0
[   12.287120]  ? trace_preempt_on+0x20/0xc0
[   12.287143]  ? __pfx_kthread+0x10/0x10
[   12.287163]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.287184]  ? calculate_sigpending+0x7b/0xa0
[   12.287207]  ? __pfx_kthread+0x10/0x10
[   12.287228]  ret_from_fork+0x116/0x1d0
[   12.287246]  ? __pfx_kthread+0x10/0x10
[   12.287265]  ret_from_fork_asm+0x1a/0x30
[   12.287295]  </TASK>
[   12.287304] 
[   12.295688] Allocated by task 175:
[   12.295929]  kasan_save_stack+0x45/0x70
[   12.296157]  kasan_save_track+0x18/0x40
[   12.296347]  kasan_save_alloc_info+0x3b/0x50
[   12.296559]  __kasan_krealloc+0x190/0x1f0
[   12.296746]  krealloc_noprof+0xf3/0x340
[   12.297110]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.297315]  krealloc_less_oob+0x1c/0x30
[   12.297464]  kunit_try_run_case+0x1a5/0x480
[   12.297673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.297896]  kthread+0x337/0x6f0
[   12.298158]  ret_from_fork+0x116/0x1d0
[   12.298369]  ret_from_fork_asm+0x1a/0x30
[   12.298602] 
[   12.298692] The buggy address belongs to the object at ffff888100a96400
[   12.298692]  which belongs to the cache kmalloc-256 of size 256
[   12.299392] The buggy address is located 33 bytes to the right of
[   12.299392]  allocated 201-byte region [ffff888100a96400, ffff888100a964c9)
[   12.299789] 
[   12.299988] The buggy address belongs to the physical page:
[   12.300452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96
[   12.300744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.300995] flags: 0x200000000000040(head|node=0|zone=2)
[   12.301281] page_type: f5(slab)
[   12.301599] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.302050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.302399] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.302712] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.302943] head: 0200000000000001 ffffea000402a581 00000000ffffffff 00000000ffffffff
[   12.303285] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.303712] page dumped because: kasan: bad access detected
[   12.303882] 
[   12.303957] Memory state around the buggy address:
[   12.304122]  ffff888100a96380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.304938]  ffff888100a96400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.305409] >ffff888100a96480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.305720]                                                           ^
[   12.306194]  ffff888100a96500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.306450]  ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.306760] ==================================================================
[   12.442389] ==================================================================
[   12.442758] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.443359] Write of size 1 at addr ffff888102a520eb by task kunit_try_catch/179
[   12.444040] 
[   12.444256] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.444301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.444313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.444331] Call Trace:
[   12.444443]  <TASK>
[   12.444460]  dump_stack_lvl+0x73/0xb0
[   12.444491]  print_report+0xd1/0x650
[   12.444512]  ? __virt_addr_valid+0x1db/0x2d0
[   12.444534]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.444557]  ? kasan_addr_to_slab+0x11/0xa0
[   12.444609]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.444634]  kasan_report+0x141/0x180
[   12.444655]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.444683]  __asan_report_store1_noabort+0x1b/0x30
[   12.444708]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.444734]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.444758]  ? finish_task_switch.isra.0+0x153/0x700
[   12.444779]  ? __switch_to+0x47/0xf50
[   12.444987]  ? __schedule+0x10cc/0x2b60
[   12.445015]  ? __pfx_read_tsc+0x10/0x10
[   12.445050]  krealloc_large_less_oob+0x1c/0x30
[   12.445074]  kunit_try_run_case+0x1a5/0x480
[   12.445097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.445121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.445149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.445173]  ? __kthread_parkme+0x82/0x180
[   12.445193]  ? preempt_count_sub+0x50/0x80
[   12.445215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.445239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.445263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.445287]  kthread+0x337/0x6f0
[   12.445306]  ? trace_preempt_on+0x20/0xc0
[   12.445328]  ? __pfx_kthread+0x10/0x10
[   12.445347]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.445368]  ? calculate_sigpending+0x7b/0xa0
[   12.445392]  ? __pfx_kthread+0x10/0x10
[   12.445413]  ret_from_fork+0x116/0x1d0
[   12.445430]  ? __pfx_kthread+0x10/0x10
[   12.445450]  ret_from_fork_asm+0x1a/0x30
[   12.445480]  </TASK>
[   12.445490] 
[   12.456663] The buggy address belongs to the physical page:
[   12.457354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a50
[   12.458076] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.458464] flags: 0x200000000000040(head|node=0|zone=2)
[   12.458703] page_type: f8(unknown)
[   12.459221] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.459581] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.460245] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.460582] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.461369] head: 0200000000000002 ffffea00040a9401 00000000ffffffff 00000000ffffffff
[   12.461707] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.462339] page dumped because: kasan: bad access detected
[   12.462588] 
[   12.462678] Memory state around the buggy address:
[   12.463027]  ffff888102a51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.463343]  ffff888102a52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.463634] >ffff888102a52080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.464314]                                                           ^
[   12.464545]  ffff888102a52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.464982]  ffff888102a52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.465296] ==================================================================
[   12.226998] ==================================================================
[   12.227323] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.227646] Write of size 1 at addr ffff888100a964d0 by task kunit_try_catch/175
[   12.228181] 
[   12.228300] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.228341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.228351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.228484] Call Trace:
[   12.228502]  <TASK>
[   12.228515]  dump_stack_lvl+0x73/0xb0
[   12.228545]  print_report+0xd1/0x650
[   12.228566]  ? __virt_addr_valid+0x1db/0x2d0
[   12.228587]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.228611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.228633]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.228657]  kasan_report+0x141/0x180
[   12.228678]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.228717]  __asan_report_store1_noabort+0x1b/0x30
[   12.228742]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.228779]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.228803]  ? finish_task_switch.isra.0+0x153/0x700
[   12.228825]  ? __switch_to+0x47/0xf50
[   12.228849]  ? __schedule+0x10cc/0x2b60
[   12.228870]  ? __pfx_read_tsc+0x10/0x10
[   12.228934]  krealloc_less_oob+0x1c/0x30
[   12.228958]  kunit_try_run_case+0x1a5/0x480
[   12.228983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.229005]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.229039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.229062]  ? __kthread_parkme+0x82/0x180
[   12.229082]  ? preempt_count_sub+0x50/0x80
[   12.229128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.229152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.229187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.229212]  kthread+0x337/0x6f0
[   12.229230]  ? trace_preempt_on+0x20/0xc0
[   12.229252]  ? __pfx_kthread+0x10/0x10
[   12.229281]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.229302]  ? calculate_sigpending+0x7b/0xa0
[   12.229326]  ? __pfx_kthread+0x10/0x10
[   12.229358]  ret_from_fork+0x116/0x1d0
[   12.229376]  ? __pfx_kthread+0x10/0x10
[   12.229396]  ret_from_fork_asm+0x1a/0x30
[   12.229426]  </TASK>
[   12.229444] 
[   12.241554] Allocated by task 175:
[   12.242403]  kasan_save_stack+0x45/0x70
[   12.243081]  kasan_save_track+0x18/0x40
[   12.244117]  kasan_save_alloc_info+0x3b/0x50
[   12.244705]  __kasan_krealloc+0x190/0x1f0
[   12.244874]  krealloc_noprof+0xf3/0x340
[   12.245012]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.245188]  krealloc_less_oob+0x1c/0x30
[   12.245326]  kunit_try_run_case+0x1a5/0x480
[   12.245475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.245651]  kthread+0x337/0x6f0
[   12.245770]  ret_from_fork+0x116/0x1d0
[   12.245901]  ret_from_fork_asm+0x1a/0x30
[   12.246509] 
[   12.246744] The buggy address belongs to the object at ffff888100a96400
[   12.246744]  which belongs to the cache kmalloc-256 of size 256
[   12.248671] The buggy address is located 7 bytes to the right of
[   12.248671]  allocated 201-byte region [ffff888100a96400, ffff888100a964c9)
[   12.250314] 
[   12.250661] The buggy address belongs to the physical page:
[   12.251386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a96
[   12.252390] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.253369] flags: 0x200000000000040(head|node=0|zone=2)
[   12.254069] page_type: f5(slab)
[   12.254597] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.255474] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.256113] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.257073] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.257538] head: 0200000000000001 ffffea000402a581 00000000ffffffff 00000000ffffffff
[   12.257776] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.258404] page dumped because: kasan: bad access detected
[   12.258957] 
[   12.259162] Memory state around the buggy address:
[   12.259600]  ffff888100a96380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.260148]  ffff888100a96400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.260756] >ffff888100a96480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.261324]                                                  ^
[   12.261510]  ffff888100a96500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.261725]  ffff888100a96580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.261952] ==================================================================
[   12.387950] ==================================================================
[   12.388206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.388506] Write of size 1 at addr ffff888102a520d0 by task kunit_try_catch/179
[   12.388992] 
[   12.389090] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.389129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.389140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.389157] Call Trace:
[   12.389168]  <TASK>
[   12.389181]  dump_stack_lvl+0x73/0xb0
[   12.389208]  print_report+0xd1/0x650
[   12.389230]  ? __virt_addr_valid+0x1db/0x2d0
[   12.389252]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.389276]  ? kasan_addr_to_slab+0x11/0xa0
[   12.389296]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.389320]  kasan_report+0x141/0x180
[   12.389341]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.389370]  __asan_report_store1_noabort+0x1b/0x30
[   12.389395]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.389420]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.389445]  ? finish_task_switch.isra.0+0x153/0x700
[   12.389467]  ? __switch_to+0x47/0xf50
[   12.389490]  ? __schedule+0x10cc/0x2b60
[   12.389511]  ? __pfx_read_tsc+0x10/0x10
[   12.389534]  krealloc_large_less_oob+0x1c/0x30
[   12.389556]  kunit_try_run_case+0x1a5/0x480
[   12.389579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.389601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.389624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.389647]  ? __kthread_parkme+0x82/0x180
[   12.389667]  ? preempt_count_sub+0x50/0x80
[   12.389689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.389713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.389737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.389761]  kthread+0x337/0x6f0
[   12.389779]  ? trace_preempt_on+0x20/0xc0
[   12.389870]  ? __pfx_kthread+0x10/0x10
[   12.389894]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.389933]  ? calculate_sigpending+0x7b/0xa0
[   12.389957]  ? __pfx_kthread+0x10/0x10
[   12.389978]  ret_from_fork+0x116/0x1d0
[   12.389996]  ? __pfx_kthread+0x10/0x10
[   12.390016]  ret_from_fork_asm+0x1a/0x30
[   12.390054]  </TASK>
[   12.390064] 
[   12.397867] The buggy address belongs to the physical page:
[   12.398074] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a50
[   12.398428] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.398733] flags: 0x200000000000040(head|node=0|zone=2)
[   12.398956] page_type: f8(unknown)
[   12.399233] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.399549] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.399913] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.400231] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.400462] head: 0200000000000002 ffffea00040a9401 00000000ffffffff 00000000ffffffff
[   12.400713] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.401220] page dumped because: kasan: bad access detected
[   12.401472] 
[   12.401563] Memory state around the buggy address:
[   12.401743]  ffff888102a51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.402116]  ffff888102a52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.402365] >ffff888102a52080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.402684]                                                  ^
[   12.403061]  ffff888102a52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.403357]  ffff888102a52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.403608] ==================================================================