Hay
Date
July 16, 2025, 3:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.530284] ==================================================================
[   16.530487] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.530671] Write of size 1 at addr fff00000c638a2da by task kunit_try_catch/158
[   16.530813] 
[   16.530847] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.530927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.530996] Hardware name: linux,dummy-virt (DT)
[   16.531064] Call trace:
[   16.531113]  show_stack+0x20/0x38 (C)
[   16.531291]  dump_stack_lvl+0x8c/0xd0
[   16.531537]  print_report+0x118/0x5d0
[   16.531624]  kasan_report+0xdc/0x128
[   16.531699]  __asan_report_store1_noabort+0x20/0x30
[   16.531902]  krealloc_less_oob_helper+0xa80/0xc50
[   16.531979]  krealloc_less_oob+0x20/0x38
[   16.532146]  kunit_try_run_case+0x170/0x3f0
[   16.532244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.532381]  kthread+0x328/0x630
[   16.532423]  ret_from_fork+0x10/0x20
[   16.532496] 
[   16.532643] Allocated by task 158:
[   16.532694]  kasan_save_stack+0x3c/0x68
[   16.532913]  kasan_save_track+0x20/0x40
[   16.533149]  kasan_save_alloc_info+0x40/0x58
[   16.533368]  __kasan_krealloc+0x118/0x178
[   16.533538]  krealloc_noprof+0x128/0x360
[   16.533593]  krealloc_less_oob_helper+0x168/0xc50
[   16.533741]  krealloc_less_oob+0x20/0x38
[   16.533810]  kunit_try_run_case+0x170/0x3f0
[   16.534009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.534203]  kthread+0x328/0x630
[   16.534284]  ret_from_fork+0x10/0x20
[   16.534412] 
[   16.534430] The buggy address belongs to the object at fff00000c638a200
[   16.534430]  which belongs to the cache kmalloc-256 of size 256
[   16.534491] The buggy address is located 17 bytes to the right of
[   16.534491]  allocated 201-byte region [fff00000c638a200, fff00000c638a2c9)
[   16.534567] 
[   16.534593] The buggy address belongs to the physical page:
[   16.534625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   16.534677] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.534894] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.535046] page_type: f5(slab)
[   16.535103] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.535287] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.535363] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.535520] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.535596] head: 0bfffe0000000001 ffffc1ffc318e281 00000000ffffffff 00000000ffffffff
[   16.535661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.535703] page dumped because: kasan: bad access detected
[   16.536080] 
[   16.536300] Memory state around the buggy address:
[   16.536370]  fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.536434]  fff00000c638a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.536545] >fff00000c638a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.536612]                                                     ^
[   16.536701]  fff00000c638a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.536755]  fff00000c638a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.536792] ==================================================================
[   16.523164] ==================================================================
[   16.523212] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.523273] Write of size 1 at addr fff00000c638a2d0 by task kunit_try_catch/158
[   16.523322] 
[   16.523351] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.523429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.523454] Hardware name: linux,dummy-virt (DT)
[   16.523483] Call trace:
[   16.523504]  show_stack+0x20/0x38 (C)
[   16.523550]  dump_stack_lvl+0x8c/0xd0
[   16.523595]  print_report+0x118/0x5d0
[   16.523641]  kasan_report+0xdc/0x128
[   16.523685]  __asan_report_store1_noabort+0x20/0x30
[   16.524876]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.524956]  krealloc_less_oob+0x20/0x38
[   16.525014]  kunit_try_run_case+0x170/0x3f0
[   16.525081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.525147]  kthread+0x328/0x630
[   16.525189]  ret_from_fork+0x10/0x20
[   16.525254] 
[   16.525271] Allocated by task 158:
[   16.525313]  kasan_save_stack+0x3c/0x68
[   16.525403]  kasan_save_track+0x20/0x40
[   16.525462]  kasan_save_alloc_info+0x40/0x58
[   16.525502]  __kasan_krealloc+0x118/0x178
[   16.525544]  krealloc_noprof+0x128/0x360
[   16.525586]  krealloc_less_oob_helper+0x168/0xc50
[   16.525624]  krealloc_less_oob+0x20/0x38
[   16.525658]  kunit_try_run_case+0x170/0x3f0
[   16.525694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.525883]  kthread+0x328/0x630
[   16.525926]  ret_from_fork+0x10/0x20
[   16.526139] 
[   16.526296] The buggy address belongs to the object at fff00000c638a200
[   16.526296]  which belongs to the cache kmalloc-256 of size 256
[   16.526495] The buggy address is located 7 bytes to the right of
[   16.526495]  allocated 201-byte region [fff00000c638a200, fff00000c638a2c9)
[   16.526578] 
[   16.526788] The buggy address belongs to the physical page:
[   16.526829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   16.526964] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.527058] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.527177] page_type: f5(slab)
[   16.527240] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.527418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.527471] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.527534] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.527879] head: 0bfffe0000000001 ffffc1ffc318e281 00000000ffffffff 00000000ffffffff
[   16.528011] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.528089] page dumped because: kasan: bad access detected
[   16.528253] 
[   16.528283] Memory state around the buggy address:
[   16.528349]  fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.528651]  fff00000c638a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.528785] >fff00000c638a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.528942]                                                  ^
[   16.529050]  fff00000c638a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.529187]  fff00000c638a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.529256] ==================================================================
[   16.612819] ==================================================================
[   16.612870] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.612926] Write of size 1 at addr fff00000c78960d0 by task kunit_try_catch/162
[   16.612975] 
[   16.613007] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.613085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.613110] Hardware name: linux,dummy-virt (DT)
[   16.614735] Call trace:
[   16.614769]  show_stack+0x20/0x38 (C)
[   16.614823]  dump_stack_lvl+0x8c/0xd0
[   16.614870]  print_report+0x118/0x5d0
[   16.614917]  kasan_report+0xdc/0x128
[   16.614962]  __asan_report_store1_noabort+0x20/0x30
[   16.615013]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.615060]  krealloc_large_less_oob+0x20/0x38
[   16.615107]  kunit_try_run_case+0x170/0x3f0
[   16.615153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.615205]  kthread+0x328/0x630
[   16.615245]  ret_from_fork+0x10/0x20
[   16.615291] 
[   16.615310] The buggy address belongs to the physical page:
[   16.615341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   16.615512] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.615579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.615630] page_type: f8(unknown)
[   16.615667] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.615726] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.615774] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.615824] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.615932] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff
[   16.615993] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.616048] page dumped because: kasan: bad access detected
[   16.616101] 
[   16.616119] Memory state around the buggy address:
[   16.616148]  fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.616310]  fff00000c7896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.616355] >fff00000c7896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.616411]                                                  ^
[   16.616533]  fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.616591]  fff00000c7896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.616628] ==================================================================
[   16.619761] ==================================================================
[   16.619814] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.619862] Write of size 1 at addr fff00000c78960ea by task kunit_try_catch/162
[   16.619911] 
[   16.620078] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.620181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.620206] Hardware name: linux,dummy-virt (DT)
[   16.620235] Call trace:
[   16.620255]  show_stack+0x20/0x38 (C)
[   16.620330]  dump_stack_lvl+0x8c/0xd0
[   16.620501]  print_report+0x118/0x5d0
[   16.620617]  kasan_report+0xdc/0x128
[   16.620832]  __asan_report_store1_noabort+0x20/0x30
[   16.620885]  krealloc_less_oob_helper+0xae4/0xc50
[   16.620937]  krealloc_large_less_oob+0x20/0x38
[   16.621282]  kunit_try_run_case+0x170/0x3f0
[   16.621387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.621528]  kthread+0x328/0x630
[   16.621572]  ret_from_fork+0x10/0x20
[   16.621619] 
[   16.621638] The buggy address belongs to the physical page:
[   16.621807] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   16.621904] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.621991] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.622053] page_type: f8(unknown)
[   16.622138] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.622220] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.622316] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.622386] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.622436] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff
[   16.622617] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.622743] page dumped because: kasan: bad access detected
[   16.622865] 
[   16.622985] Memory state around the buggy address:
[   16.623097]  fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.623158]  fff00000c7896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.623199] >fff00000c7896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.623242]                                                           ^
[   16.623281]  fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.623322]  fff00000c7896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.623554] ==================================================================
[   16.538009] ==================================================================
[   16.538058] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.538107] Write of size 1 at addr fff00000c638a2ea by task kunit_try_catch/158
[   16.538155] 
[   16.538366] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.538473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.538499] Hardware name: linux,dummy-virt (DT)
[   16.538545] Call trace:
[   16.538566]  show_stack+0x20/0x38 (C)
[   16.538617]  dump_stack_lvl+0x8c/0xd0
[   16.538665]  print_report+0x118/0x5d0
[   16.538721]  kasan_report+0xdc/0x128
[   16.538766]  __asan_report_store1_noabort+0x20/0x30
[   16.538817]  krealloc_less_oob_helper+0xae4/0xc50
[   16.538864]  krealloc_less_oob+0x20/0x38
[   16.538915]  kunit_try_run_case+0x170/0x3f0
[   16.538961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.539013]  kthread+0x328/0x630
[   16.539054]  ret_from_fork+0x10/0x20
[   16.539101] 
[   16.539118] Allocated by task 158:
[   16.539152]  kasan_save_stack+0x3c/0x68
[   16.539201]  kasan_save_track+0x20/0x40
[   16.539245]  kasan_save_alloc_info+0x40/0x58
[   16.539283]  __kasan_krealloc+0x118/0x178
[   16.539319]  krealloc_noprof+0x128/0x360
[   16.539355]  krealloc_less_oob_helper+0x168/0xc50
[   16.539393]  krealloc_less_oob+0x20/0x38
[   16.539429]  kunit_try_run_case+0x170/0x3f0
[   16.539794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.539875]  kthread+0x328/0x630
[   16.539909]  ret_from_fork+0x10/0x20
[   16.540055] 
[   16.540122] The buggy address belongs to the object at fff00000c638a200
[   16.540122]  which belongs to the cache kmalloc-256 of size 256
[   16.540435] The buggy address is located 33 bytes to the right of
[   16.540435]  allocated 201-byte region [fff00000c638a200, fff00000c638a2c9)
[   16.540563] 
[   16.540622] The buggy address belongs to the physical page:
[   16.540808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   16.540913] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.541087] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.541181] page_type: f5(slab)
[   16.541390] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.541507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.541604] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.541781] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.541853] head: 0bfffe0000000001 ffffc1ffc318e281 00000000ffffffff 00000000ffffffff
[   16.541945] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.542083] page dumped because: kasan: bad access detected
[   16.542150] 
[   16.542216] Memory state around the buggy address:
[   16.542248]  fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.542557]  fff00000c638a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.542703] >fff00000c638a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.542804]                                                           ^
[   16.542933]  fff00000c638a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.543007]  fff00000c638a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.543093] ==================================================================
[   16.624178] ==================================================================
[   16.624226] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.624275] Write of size 1 at addr fff00000c78960eb by task kunit_try_catch/162
[   16.624324] 
[   16.624355] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.624677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.624782] Hardware name: linux,dummy-virt (DT)
[   16.624848] Call trace:
[   16.624913]  show_stack+0x20/0x38 (C)
[   16.625039]  dump_stack_lvl+0x8c/0xd0
[   16.625110]  print_report+0x118/0x5d0
[   16.625477]  kasan_report+0xdc/0x128
[   16.625556]  __asan_report_store1_noabort+0x20/0x30
[   16.625687]  krealloc_less_oob_helper+0xa58/0xc50
[   16.625766]  krealloc_large_less_oob+0x20/0x38
[   16.625868]  kunit_try_run_case+0x170/0x3f0
[   16.626183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.626304]  kthread+0x328/0x630
[   16.626383]  ret_from_fork+0x10/0x20
[   16.626502] 
[   16.626749] The buggy address belongs to the physical page:
[   16.626784] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   16.627020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.627203] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.627349] page_type: f8(unknown)
[   16.627388] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.627690] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.627828] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.627944] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.628103] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff
[   16.628209] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.628249] page dumped because: kasan: bad access detected
[   16.628520] 
[   16.628615] Memory state around the buggy address:
[   16.628724]  fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.628841]  fff00000c7896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.628893] >fff00000c7896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.628939]                                                           ^
[   16.629217]  fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.629328]  fff00000c7896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.629458] ==================================================================
[   16.517396] ==================================================================
[   16.517454] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.517947] Write of size 1 at addr fff00000c638a2c9 by task kunit_try_catch/158
[   16.518112] 
[   16.518281] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.518362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.518388] Hardware name: linux,dummy-virt (DT)
[   16.518418] Call trace:
[   16.518439]  show_stack+0x20/0x38 (C)
[   16.518489]  dump_stack_lvl+0x8c/0xd0
[   16.518537]  print_report+0x118/0x5d0
[   16.518590]  kasan_report+0xdc/0x128
[   16.518669]  __asan_report_store1_noabort+0x20/0x30
[   16.518907]  krealloc_less_oob_helper+0xa48/0xc50
[   16.519032]  krealloc_less_oob+0x20/0x38
[   16.519194]  kunit_try_run_case+0x170/0x3f0
[   16.519304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.519355]  kthread+0x328/0x630
[   16.519396]  ret_from_fork+0x10/0x20
[   16.519443] 
[   16.519461] Allocated by task 158:
[   16.519488]  kasan_save_stack+0x3c/0x68
[   16.519989]  kasan_save_track+0x20/0x40
[   16.520050]  kasan_save_alloc_info+0x40/0x58
[   16.520307]  __kasan_krealloc+0x118/0x178
[   16.520345]  krealloc_noprof+0x128/0x360
[   16.520381]  krealloc_less_oob_helper+0x168/0xc50
[   16.520419]  krealloc_less_oob+0x20/0x38
[   16.520454]  kunit_try_run_case+0x170/0x3f0
[   16.520494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.520548]  kthread+0x328/0x630
[   16.520580]  ret_from_fork+0x10/0x20
[   16.520614] 
[   16.520886] The buggy address belongs to the object at fff00000c638a200
[   16.520886]  which belongs to the cache kmalloc-256 of size 256
[   16.520954] The buggy address is located 0 bytes to the right of
[   16.520954]  allocated 201-byte region [fff00000c638a200, fff00000c638a2c9)
[   16.521019] 
[   16.521039] The buggy address belongs to the physical page:
[   16.521071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   16.521126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.521184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.521236] page_type: f5(slab)
[   16.521523] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.521615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.521902] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.521955] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.522004] head: 0bfffe0000000001 ffffc1ffc318e281 00000000ffffffff 00000000ffffffff
[   16.522052] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.522093] page dumped because: kasan: bad access detected
[   16.522123] 
[   16.522140] Memory state around the buggy address:
[   16.522170]  fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.522216]  fff00000c638a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.522258] >fff00000c638a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.522295]                                               ^
[   16.522329]  fff00000c638a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.522371]  fff00000c638a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.522408] ==================================================================
[   16.617248] ==================================================================
[   16.617313] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.617380] Write of size 1 at addr fff00000c78960da by task kunit_try_catch/162
[   16.617474] 
[   16.617572] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.617651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.617701] Hardware name: linux,dummy-virt (DT)
[   16.617755] Call trace:
[   16.617793]  show_stack+0x20/0x38 (C)
[   16.617859]  dump_stack_lvl+0x8c/0xd0
[   16.617911]  print_report+0x118/0x5d0
[   16.617963]  kasan_report+0xdc/0x128
[   16.618017]  __asan_report_store1_noabort+0x20/0x30
[   16.618068]  krealloc_less_oob_helper+0xa80/0xc50
[   16.618115]  krealloc_large_less_oob+0x20/0x38
[   16.618162]  kunit_try_run_case+0x170/0x3f0
[   16.618208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.618259]  kthread+0x328/0x630
[   16.618299]  ret_from_fork+0x10/0x20
[   16.618344] 
[   16.618363] The buggy address belongs to the physical page:
[   16.618402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   16.618454] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.618500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.618550] page_type: f8(unknown)
[   16.618585] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.618634] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.618683] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.618751] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.618801] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff
[   16.618849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.618887] page dumped because: kasan: bad access detected
[   16.618917] 
[   16.618934] Memory state around the buggy address:
[   16.618963]  fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.619004]  fff00000c7896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.619045] >fff00000c7896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.619081]                                                     ^
[   16.619117]  fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.619158]  fff00000c7896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.619195] ==================================================================
[   16.544255] ==================================================================
[   16.544454] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.544524] Write of size 1 at addr fff00000c638a2eb by task kunit_try_catch/158
[   16.544579] 
[   16.544619] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.544699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.544735] Hardware name: linux,dummy-virt (DT)
[   16.545027] Call trace:
[   16.545094]  show_stack+0x20/0x38 (C)
[   16.545223]  dump_stack_lvl+0x8c/0xd0
[   16.545279]  print_report+0x118/0x5d0
[   16.545345]  kasan_report+0xdc/0x128
[   16.545398]  __asan_report_store1_noabort+0x20/0x30
[   16.545507]  krealloc_less_oob_helper+0xa58/0xc50
[   16.545574]  krealloc_less_oob+0x20/0x38
[   16.545619]  kunit_try_run_case+0x170/0x3f0
[   16.545671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.545955]  kthread+0x328/0x630
[   16.546027]  ret_from_fork+0x10/0x20
[   16.546081] 
[   16.546098] Allocated by task 158:
[   16.546126]  kasan_save_stack+0x3c/0x68
[   16.546259]  kasan_save_track+0x20/0x40
[   16.546326]  kasan_save_alloc_info+0x40/0x58
[   16.546383]  __kasan_krealloc+0x118/0x178
[   16.546497]  krealloc_noprof+0x128/0x360
[   16.546551]  krealloc_less_oob_helper+0x168/0xc50
[   16.546609]  krealloc_less_oob+0x20/0x38
[   16.546645]  kunit_try_run_case+0x170/0x3f0
[   16.546681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.547039]  kthread+0x328/0x630
[   16.547082]  ret_from_fork+0x10/0x20
[   16.547118] 
[   16.547137] The buggy address belongs to the object at fff00000c638a200
[   16.547137]  which belongs to the cache kmalloc-256 of size 256
[   16.547291] The buggy address is located 34 bytes to the right of
[   16.547291]  allocated 201-byte region [fff00000c638a200, fff00000c638a2c9)
[   16.547391] 
[   16.547411] The buggy address belongs to the physical page:
[   16.547658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   16.547823] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.547932] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.548149] page_type: f5(slab)
[   16.548228] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.548303] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.548491] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.548554] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.548799] head: 0bfffe0000000001 ffffc1ffc318e281 00000000ffffffff 00000000ffffffff
[   16.548905] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.548964] page dumped because: kasan: bad access detected
[   16.549076] 
[   16.549176] Memory state around the buggy address:
[   16.549253]  fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.549597]  fff00000c638a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.549646] >fff00000c638a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.549683]                                                           ^
[   16.549757]  fff00000c638a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.550037]  fff00000c638a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.550103] ==================================================================
[   16.599064] ==================================================================
[   16.599125] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.599181] Write of size 1 at addr fff00000c78960c9 by task kunit_try_catch/162
[   16.599243] 
[   16.599276] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.599355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.599381] Hardware name: linux,dummy-virt (DT)
[   16.599411] Call trace:
[   16.599432]  show_stack+0x20/0x38 (C)
[   16.601224]  dump_stack_lvl+0x8c/0xd0
[   16.601650]  print_report+0x118/0x5d0
[   16.602279]  kasan_report+0xdc/0x128
[   16.602886]  __asan_report_store1_noabort+0x20/0x30
[   16.603016]  krealloc_less_oob_helper+0xa48/0xc50
[   16.603190]  krealloc_large_less_oob+0x20/0x38
[   16.603672]  kunit_try_run_case+0x170/0x3f0
[   16.604304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.604656]  kthread+0x328/0x630
[   16.604990]  ret_from_fork+0x10/0x20
[   16.605437] 
[   16.605543] The buggy address belongs to the physical page:
[   16.605622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   16.606112] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.606378] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.606831] page_type: f8(unknown)
[   16.607426] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.607668] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.608064] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.608399] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.608629] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff
[   16.608680] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.609316] page dumped because: kasan: bad access detected
[   16.609555] 
[   16.609574] Memory state around the buggy address:
[   16.609607]  fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.610053]  fff00000c7896000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.610273] >fff00000c7896080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.610457]                                               ^
[   16.610494]  fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.610817]  fff00000c7896180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.611063] ==================================================================

[   12.420778] ==================================================================
[   12.421434] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.422117] Write of size 1 at addr ffff88810278a0da by task kunit_try_catch/179
[   12.422361] 
[   12.422481] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.422521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.422532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.422550] Call Trace:
[   12.422563]  <TASK>
[   12.422577]  dump_stack_lvl+0x73/0xb0
[   12.422604]  print_report+0xd1/0x610
[   12.422626]  ? __virt_addr_valid+0x1db/0x2d0
[   12.422648]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.422672]  ? kasan_addr_to_slab+0x11/0xa0
[   12.422693]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.422719]  kasan_report+0x141/0x180
[   12.422741]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.422783]  __asan_report_store1_noabort+0x1b/0x30
[   12.422809]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.422835]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.422861]  ? __schedule+0x207f/0x2b60
[   12.422880]  ? schedule+0x7c/0x2e0
[   12.422900]  ? trace_hardirqs_on+0x37/0xe0
[   12.422923]  ? __schedule+0x207f/0x2b60
[   12.422944]  ? __pfx_read_tsc+0x10/0x10
[   12.422968]  krealloc_large_less_oob+0x1c/0x30
[   12.423003]  kunit_try_run_case+0x1a5/0x480
[   12.423027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.423050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.423074]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.423098]  ? __kthread_parkme+0x82/0x180
[   12.423118]  ? preempt_count_sub+0x50/0x80
[   12.423142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.423166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.423197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.423223]  kthread+0x337/0x6f0
[   12.423242]  ? trace_preempt_on+0x20/0xc0
[   12.423264]  ? __pfx_kthread+0x10/0x10
[   12.423285]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.423307]  ? calculate_sigpending+0x7b/0xa0
[   12.423330]  ? __pfx_kthread+0x10/0x10
[   12.423352]  ret_from_fork+0x116/0x1d0
[   12.423371]  ? __pfx_kthread+0x10/0x10
[   12.423391]  ret_from_fork_asm+0x1a/0x30
[   12.423422]  </TASK>
[   12.423443] 
[   12.431554] The buggy address belongs to the physical page:
[   12.431929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102788
[   12.432253] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.432480] flags: 0x200000000000040(head|node=0|zone=2)
[   12.432799] page_type: f8(unknown)
[   12.432983] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.433459] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.433837] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.434356] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.434699] head: 0200000000000002 ffffea000409e201 00000000ffffffff 00000000ffffffff
[   12.435076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.435324] page dumped because: kasan: bad access detected
[   12.435579] 
[   12.435750] Memory state around the buggy address:
[   12.436068]  ffff888102789f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.436355]  ffff88810278a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.436665] >ffff88810278a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.436932]                                                     ^
[   12.437405]  ffff88810278a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.437706]  ffff88810278a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.438093] ==================================================================
[   12.306225] ==================================================================
[   12.306864] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.307749] Write of size 1 at addr ffff8881003422eb by task kunit_try_catch/175
[   12.307998] 
[   12.308085] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.308128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.308140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.308160] Call Trace:
[   12.308176]  <TASK>
[   12.308190]  dump_stack_lvl+0x73/0xb0
[   12.308219]  print_report+0xd1/0x610
[   12.308241]  ? __virt_addr_valid+0x1db/0x2d0
[   12.308263]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.308287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.308311]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.308336]  kasan_report+0x141/0x180
[   12.308358]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.308387]  __asan_report_store1_noabort+0x1b/0x30
[   12.308412]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.308470]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.308494]  ? finish_task_switch.isra.0+0x153/0x700
[   12.308517]  ? __switch_to+0x47/0xf50
[   12.308543]  ? __schedule+0x10cc/0x2b60
[   12.308565]  ? __pfx_read_tsc+0x10/0x10
[   12.308588]  krealloc_less_oob+0x1c/0x30
[   12.308610]  kunit_try_run_case+0x1a5/0x480
[   12.308734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.308766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.308790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.308814]  ? __kthread_parkme+0x82/0x180
[   12.308835]  ? preempt_count_sub+0x50/0x80
[   12.308857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.308881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.308907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.308932]  kthread+0x337/0x6f0
[   12.308951]  ? trace_preempt_on+0x20/0xc0
[   12.308974]  ? __pfx_kthread+0x10/0x10
[   12.308994]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.309015]  ? calculate_sigpending+0x7b/0xa0
[   12.309039]  ? __pfx_kthread+0x10/0x10
[   12.309060]  ret_from_fork+0x116/0x1d0
[   12.309078]  ? __pfx_kthread+0x10/0x10
[   12.309099]  ret_from_fork_asm+0x1a/0x30
[   12.309129]  </TASK>
[   12.309138] 
[   12.323332] Allocated by task 175:
[   12.323706]  kasan_save_stack+0x45/0x70
[   12.323955]  kasan_save_track+0x18/0x40
[   12.324265]  kasan_save_alloc_info+0x3b/0x50
[   12.324642]  __kasan_krealloc+0x190/0x1f0
[   12.324794]  krealloc_noprof+0xf3/0x340
[   12.324932]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.325095]  krealloc_less_oob+0x1c/0x30
[   12.325235]  kunit_try_run_case+0x1a5/0x480
[   12.325382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.325899]  kthread+0x337/0x6f0
[   12.326212]  ret_from_fork+0x116/0x1d0
[   12.326584]  ret_from_fork_asm+0x1a/0x30
[   12.326956] 
[   12.327119] The buggy address belongs to the object at ffff888100342200
[   12.327119]  which belongs to the cache kmalloc-256 of size 256
[   12.328208] The buggy address is located 34 bytes to the right of
[   12.328208]  allocated 201-byte region [ffff888100342200, ffff8881003422c9)
[   12.329330] 
[   12.329532] The buggy address belongs to the physical page:
[   12.330018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.330552] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.330992] flags: 0x200000000000040(head|node=0|zone=2)
[   12.331176] page_type: f5(slab)
[   12.331298] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.331802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.332481] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.333148] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.333844] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.334524] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.334939] page dumped because: kasan: bad access detected
[   12.335388] 
[   12.335556] Memory state around the buggy address:
[   12.335868]  ffff888100342180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.336084]  ffff888100342200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.336299] >ffff888100342280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.336731]                                                           ^
[   12.337312]  ffff888100342300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.337941]  ffff888100342380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.338569] ==================================================================
[   12.438421] ==================================================================
[   12.438701] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.439123] Write of size 1 at addr ffff88810278a0ea by task kunit_try_catch/179
[   12.439360] 
[   12.439446] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.439487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.439498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.439517] Call Trace:
[   12.439530]  <TASK>
[   12.439543]  dump_stack_lvl+0x73/0xb0
[   12.439581]  print_report+0xd1/0x610
[   12.439604]  ? __virt_addr_valid+0x1db/0x2d0
[   12.439627]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.439651]  ? kasan_addr_to_slab+0x11/0xa0
[   12.439672]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.439698]  kasan_report+0x141/0x180
[   12.439719]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.439749]  __asan_report_store1_noabort+0x1b/0x30
[   12.439786]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.439813]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.439838]  ? __schedule+0x207f/0x2b60
[   12.439858]  ? schedule+0x7c/0x2e0
[   12.439878]  ? trace_hardirqs_on+0x37/0xe0
[   12.439902]  ? __schedule+0x207f/0x2b60
[   12.439923]  ? __pfx_read_tsc+0x10/0x10
[   12.439947]  krealloc_large_less_oob+0x1c/0x30
[   12.439970]  kunit_try_run_case+0x1a5/0x480
[   12.440011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.440035]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.440059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.440083]  ? __kthread_parkme+0x82/0x180
[   12.440105]  ? preempt_count_sub+0x50/0x80
[   12.440130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.440155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.440180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.440205]  kthread+0x337/0x6f0
[   12.440224]  ? trace_preempt_on+0x20/0xc0
[   12.440247]  ? __pfx_kthread+0x10/0x10
[   12.440268]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.440289]  ? calculate_sigpending+0x7b/0xa0
[   12.440313]  ? __pfx_kthread+0x10/0x10
[   12.440335]  ret_from_fork+0x116/0x1d0
[   12.440354]  ? __pfx_kthread+0x10/0x10
[   12.440374]  ret_from_fork_asm+0x1a/0x30
[   12.440405]  </TASK>
[   12.440414] 
[   12.449089] The buggy address belongs to the physical page:
[   12.449438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102788
[   12.450124] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.450438] flags: 0x200000000000040(head|node=0|zone=2)
[   12.450732] page_type: f8(unknown)
[   12.450871] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.451103] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.451340] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.451675] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.452027] head: 0200000000000002 ffffea000409e201 00000000ffffffff 00000000ffffffff
[   12.452420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.452872] page dumped because: kasan: bad access detected
[   12.453333] 
[   12.453446] Memory state around the buggy address:
[   12.453664]  ffff888102789f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.453895]  ffff88810278a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.454399] >ffff88810278a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.454898]                                                           ^
[   12.455250]  ffff88810278a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.455565]  ffff88810278a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.455849] ==================================================================
[   12.403773] ==================================================================
[   12.404382] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.404668] Write of size 1 at addr ffff88810278a0d0 by task kunit_try_catch/179
[   12.404933] 
[   12.405397] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.405443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.405455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.405475] Call Trace:
[   12.405486]  <TASK>
[   12.405500]  dump_stack_lvl+0x73/0xb0
[   12.405529]  print_report+0xd1/0x610
[   12.405554]  ? __virt_addr_valid+0x1db/0x2d0
[   12.405578]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.405602]  ? kasan_addr_to_slab+0x11/0xa0
[   12.405623]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.405649]  kasan_report+0x141/0x180
[   12.405671]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.405700]  __asan_report_store1_noabort+0x1b/0x30
[   12.405726]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.405768]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.405793]  ? __schedule+0x207f/0x2b60
[   12.405813]  ? schedule+0x7c/0x2e0
[   12.405833]  ? trace_hardirqs_on+0x37/0xe0
[   12.405856]  ? __schedule+0x207f/0x2b60
[   12.405878]  ? __pfx_read_tsc+0x10/0x10
[   12.405903]  krealloc_large_less_oob+0x1c/0x30
[   12.405926]  kunit_try_run_case+0x1a5/0x480
[   12.405951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.405974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.406017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.406041]  ? __kthread_parkme+0x82/0x180
[   12.406062]  ? preempt_count_sub+0x50/0x80
[   12.406087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.406111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.406136]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.406162]  kthread+0x337/0x6f0
[   12.406181]  ? trace_preempt_on+0x20/0xc0
[   12.406203]  ? __pfx_kthread+0x10/0x10
[   12.406224]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.406246]  ? calculate_sigpending+0x7b/0xa0
[   12.406270]  ? __pfx_kthread+0x10/0x10
[   12.406291]  ret_from_fork+0x116/0x1d0
[   12.406311]  ? __pfx_kthread+0x10/0x10
[   12.406332]  ret_from_fork_asm+0x1a/0x30
[   12.406365]  </TASK>
[   12.406376] 
[   12.414217] The buggy address belongs to the physical page:
[   12.414485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102788
[   12.414976] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.415250] flags: 0x200000000000040(head|node=0|zone=2)
[   12.415500] page_type: f8(unknown)
[   12.415674] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.415994] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.416282] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.416811] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.417114] head: 0200000000000002 ffffea000409e201 00000000ffffffff 00000000ffffffff
[   12.417419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.417939] page dumped because: kasan: bad access detected
[   12.418180] 
[   12.418381] Memory state around the buggy address:
[   12.418612]  ffff888102789f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.418913]  ffff88810278a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.419242] >ffff88810278a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.419580]                                                  ^
[   12.419866]  ffff88810278a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.420181]  ffff88810278a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.420434] ==================================================================
[   12.274554] ==================================================================
[   12.274925] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.275516] Write of size 1 at addr ffff8881003422ea by task kunit_try_catch/175
[   12.275802] 
[   12.275888] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.275928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.275940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.275959] Call Trace:
[   12.275972]  <TASK>
[   12.275985]  dump_stack_lvl+0x73/0xb0
[   12.276012]  print_report+0xd1/0x610
[   12.276033]  ? __virt_addr_valid+0x1db/0x2d0
[   12.276056]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.276080]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.276103]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.276128]  kasan_report+0x141/0x180
[   12.276150]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.276179]  __asan_report_store1_noabort+0x1b/0x30
[   12.276204]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.276231]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.276256]  ? finish_task_switch.isra.0+0x153/0x700
[   12.276279]  ? __switch_to+0x47/0xf50
[   12.276304]  ? __schedule+0x10cc/0x2b60
[   12.276326]  ? __pfx_read_tsc+0x10/0x10
[   12.276349]  krealloc_less_oob+0x1c/0x30
[   12.276371]  kunit_try_run_case+0x1a5/0x480
[   12.276394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.276417]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.276454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.276478]  ? __kthread_parkme+0x82/0x180
[   12.276498]  ? preempt_count_sub+0x50/0x80
[   12.276521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.276545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.276570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.276595]  kthread+0x337/0x6f0
[   12.276614]  ? trace_preempt_on+0x20/0xc0
[   12.276637]  ? __pfx_kthread+0x10/0x10
[   12.276658]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.276679]  ? calculate_sigpending+0x7b/0xa0
[   12.276704]  ? __pfx_kthread+0x10/0x10
[   12.276725]  ret_from_fork+0x116/0x1d0
[   12.276743]  ? __pfx_kthread+0x10/0x10
[   12.276773]  ret_from_fork_asm+0x1a/0x30
[   12.276803]  </TASK>
[   12.276813] 
[   12.285846] Allocated by task 175:
[   12.286027]  kasan_save_stack+0x45/0x70
[   12.286234]  kasan_save_track+0x18/0x40
[   12.286367]  kasan_save_alloc_info+0x3b/0x50
[   12.286669]  __kasan_krealloc+0x190/0x1f0
[   12.286881]  krealloc_noprof+0xf3/0x340
[   12.287018]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.287182]  krealloc_less_oob+0x1c/0x30
[   12.287673]  kunit_try_run_case+0x1a5/0x480
[   12.289731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.289996]  kthread+0x337/0x6f0
[   12.290126]  ret_from_fork+0x116/0x1d0
[   12.290263]  ret_from_fork_asm+0x1a/0x30
[   12.290405] 
[   12.290486] The buggy address belongs to the object at ffff888100342200
[   12.290486]  which belongs to the cache kmalloc-256 of size 256
[   12.291861] The buggy address is located 33 bytes to the right of
[   12.291861]  allocated 201-byte region [ffff888100342200, ffff8881003422c9)
[   12.292974] 
[   12.293063] The buggy address belongs to the physical page:
[   12.293235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.294463] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.295379] flags: 0x200000000000040(head|node=0|zone=2)
[   12.296264] page_type: f5(slab)
[   12.296869] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.297534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.298211] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.298960] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.299713] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.300613] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.301259] page dumped because: kasan: bad access detected
[   12.301820] 
[   12.301983] Memory state around the buggy address:
[   12.302395]  ffff888100342180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.303021]  ffff888100342200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.303454] >ffff888100342280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.303671]                                                           ^
[   12.303883]  ffff888100342300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.304098]  ffff888100342380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.304311] ==================================================================
[   12.235047] ==================================================================
[   12.235403] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.235910] Write of size 1 at addr ffff8881003422d0 by task kunit_try_catch/175
[   12.236427] 
[   12.236546] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.236590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.236601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.236622] Call Trace:
[   12.236633]  <TASK>
[   12.236647]  dump_stack_lvl+0x73/0xb0
[   12.236676]  print_report+0xd1/0x610
[   12.236698]  ? __virt_addr_valid+0x1db/0x2d0
[   12.236721]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.236745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.236782]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.236807]  kasan_report+0x141/0x180
[   12.236829]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.236858]  __asan_report_store1_noabort+0x1b/0x30
[   12.236884]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.236910]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.236935]  ? finish_task_switch.isra.0+0x153/0x700
[   12.236959]  ? __switch_to+0x47/0xf50
[   12.236983]  ? __schedule+0x10cc/0x2b60
[   12.237006]  ? __pfx_read_tsc+0x10/0x10
[   12.237030]  krealloc_less_oob+0x1c/0x30
[   12.237052]  kunit_try_run_case+0x1a5/0x480
[   12.237076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.237099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.237123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.237147]  ? __kthread_parkme+0x82/0x180
[   12.237167]  ? preempt_count_sub+0x50/0x80
[   12.237190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.237215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.237239]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.237264]  kthread+0x337/0x6f0
[   12.237283]  ? trace_preempt_on+0x20/0xc0
[   12.237306]  ? __pfx_kthread+0x10/0x10
[   12.237327]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.237348]  ? calculate_sigpending+0x7b/0xa0
[   12.237373]  ? __pfx_kthread+0x10/0x10
[   12.237394]  ret_from_fork+0x116/0x1d0
[   12.237413]  ? __pfx_kthread+0x10/0x10
[   12.237433]  ret_from_fork_asm+0x1a/0x30
[   12.237464]  </TASK>
[   12.237473] 
[   12.244784] Allocated by task 175:
[   12.244917]  kasan_save_stack+0x45/0x70
[   12.245058]  kasan_save_track+0x18/0x40
[   12.245244]  kasan_save_alloc_info+0x3b/0x50
[   12.245456]  __kasan_krealloc+0x190/0x1f0
[   12.245782]  krealloc_noprof+0xf3/0x340
[   12.246004]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.246218]  krealloc_less_oob+0x1c/0x30
[   12.246373]  kunit_try_run_case+0x1a5/0x480
[   12.246623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.246892]  kthread+0x337/0x6f0
[   12.247060]  ret_from_fork+0x116/0x1d0
[   12.247197]  ret_from_fork_asm+0x1a/0x30
[   12.247395] 
[   12.247530] The buggy address belongs to the object at ffff888100342200
[   12.247530]  which belongs to the cache kmalloc-256 of size 256
[   12.247982] The buggy address is located 7 bytes to the right of
[   12.247982]  allocated 201-byte region [ffff888100342200, ffff8881003422c9)
[   12.248551] 
[   12.248624] The buggy address belongs to the physical page:
[   12.248822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.249183] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.249509] flags: 0x200000000000040(head|node=0|zone=2)
[   12.249729] page_type: f5(slab)
[   12.249870] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.250162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.250496] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.250803] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.251063] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.251298] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.251581] page dumped because: kasan: bad access detected
[   12.251854] 
[   12.251946] Memory state around the buggy address:
[   12.252165]  ffff888100342180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.252395]  ffff888100342200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.252609] >ffff888100342280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.253066]                                                  ^
[   12.253329]  ffff888100342300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.253649]  ffff888100342380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.253909] ==================================================================
[   12.254490] ==================================================================
[   12.255069] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.255458] Write of size 1 at addr ffff8881003422da by task kunit_try_catch/175
[   12.255789] 
[   12.255873] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.255911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.255923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.255941] Call Trace:
[   12.255954]  <TASK>
[   12.255967]  dump_stack_lvl+0x73/0xb0
[   12.255992]  print_report+0xd1/0x610
[   12.256014]  ? __virt_addr_valid+0x1db/0x2d0
[   12.256035]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.256060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.256083]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.256107]  kasan_report+0x141/0x180
[   12.256129]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.256158]  __asan_report_store1_noabort+0x1b/0x30
[   12.256184]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.256210]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.256235]  ? finish_task_switch.isra.0+0x153/0x700
[   12.256258]  ? __switch_to+0x47/0xf50
[   12.256283]  ? __schedule+0x10cc/0x2b60
[   12.256304]  ? __pfx_read_tsc+0x10/0x10
[   12.256328]  krealloc_less_oob+0x1c/0x30
[   12.256350]  kunit_try_run_case+0x1a5/0x480
[   12.256374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.256397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.256420]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.256444]  ? __kthread_parkme+0x82/0x180
[   12.256463]  ? preempt_count_sub+0x50/0x80
[   12.256486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.256511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.256535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.256561]  kthread+0x337/0x6f0
[   12.256579]  ? trace_preempt_on+0x20/0xc0
[   12.256602]  ? __pfx_kthread+0x10/0x10
[   12.256623]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.256644]  ? calculate_sigpending+0x7b/0xa0
[   12.256668]  ? __pfx_kthread+0x10/0x10
[   12.256700]  ret_from_fork+0x116/0x1d0
[   12.256718]  ? __pfx_kthread+0x10/0x10
[   12.256738]  ret_from_fork_asm+0x1a/0x30
[   12.256779]  </TASK>
[   12.256788] 
[   12.264128] Allocated by task 175:
[   12.264312]  kasan_save_stack+0x45/0x70
[   12.264494]  kasan_save_track+0x18/0x40
[   12.264630]  kasan_save_alloc_info+0x3b/0x50
[   12.264789]  __kasan_krealloc+0x190/0x1f0
[   12.264931]  krealloc_noprof+0xf3/0x340
[   12.265102]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.265338]  krealloc_less_oob+0x1c/0x30
[   12.265536]  kunit_try_run_case+0x1a5/0x480
[   12.265746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.266010]  kthread+0x337/0x6f0
[   12.266179]  ret_from_fork+0x116/0x1d0
[   12.266349]  ret_from_fork_asm+0x1a/0x30
[   12.266489] 
[   12.266559] The buggy address belongs to the object at ffff888100342200
[   12.266559]  which belongs to the cache kmalloc-256 of size 256
[   12.267446] The buggy address is located 17 bytes to the right of
[   12.267446]  allocated 201-byte region [ffff888100342200, ffff8881003422c9)
[   12.268007] 
[   12.268086] The buggy address belongs to the physical page:
[   12.268260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.268539] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.268891] flags: 0x200000000000040(head|node=0|zone=2)
[   12.269150] page_type: f5(slab)
[   12.269318] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.269646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.269889] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.270154] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.270545] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.270903] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.271239] page dumped because: kasan: bad access detected
[   12.271481] 
[   12.271560] Memory state around the buggy address:
[   12.271717]  ffff888100342180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.272034]  ffff888100342200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.272344] >ffff888100342280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.272661]                                                     ^
[   12.272888]  ffff888100342300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.273103]  ffff888100342380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.273342] ==================================================================
[   12.212894] ==================================================================
[   12.213649] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.213970] Write of size 1 at addr ffff8881003422c9 by task kunit_try_catch/175
[   12.214310] 
[   12.214506] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.214552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.214563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.214583] Call Trace:
[   12.214595]  <TASK>
[   12.214610]  dump_stack_lvl+0x73/0xb0
[   12.214640]  print_report+0xd1/0x610
[   12.214662]  ? __virt_addr_valid+0x1db/0x2d0
[   12.214684]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.214709]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.214732]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.214769]  kasan_report+0x141/0x180
[   12.214792]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.214821]  __asan_report_store1_noabort+0x1b/0x30
[   12.214847]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.214873]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.214900]  ? finish_task_switch.isra.0+0x153/0x700
[   12.214923]  ? __switch_to+0x47/0xf50
[   12.214949]  ? __schedule+0x10cc/0x2b60
[   12.214971]  ? __pfx_read_tsc+0x10/0x10
[   12.215037]  krealloc_less_oob+0x1c/0x30
[   12.215060]  kunit_try_run_case+0x1a5/0x480
[   12.215085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.215108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.215132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.215156]  ? __kthread_parkme+0x82/0x180
[   12.215186]  ? preempt_count_sub+0x50/0x80
[   12.215209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.215233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.215258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.215283]  kthread+0x337/0x6f0
[   12.215302]  ? trace_preempt_on+0x20/0xc0
[   12.215325]  ? __pfx_kthread+0x10/0x10
[   12.215345]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.215367]  ? calculate_sigpending+0x7b/0xa0
[   12.215392]  ? __pfx_kthread+0x10/0x10
[   12.215413]  ret_from_fork+0x116/0x1d0
[   12.215441]  ? __pfx_kthread+0x10/0x10
[   12.215462]  ret_from_fork_asm+0x1a/0x30
[   12.215492]  </TASK>
[   12.215502] 
[   12.223705] Allocated by task 175:
[   12.223904]  kasan_save_stack+0x45/0x70
[   12.224203]  kasan_save_track+0x18/0x40
[   12.224463]  kasan_save_alloc_info+0x3b/0x50
[   12.224642]  __kasan_krealloc+0x190/0x1f0
[   12.224829]  krealloc_noprof+0xf3/0x340
[   12.225014]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.225243]  krealloc_less_oob+0x1c/0x30
[   12.225510]  kunit_try_run_case+0x1a5/0x480
[   12.225695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.225920]  kthread+0x337/0x6f0
[   12.226181]  ret_from_fork+0x116/0x1d0
[   12.226353]  ret_from_fork_asm+0x1a/0x30
[   12.226537] 
[   12.226609] The buggy address belongs to the object at ffff888100342200
[   12.226609]  which belongs to the cache kmalloc-256 of size 256
[   12.226977] The buggy address is located 0 bytes to the right of
[   12.226977]  allocated 201-byte region [ffff888100342200, ffff8881003422c9)
[   12.227570] 
[   12.227659] The buggy address belongs to the physical page:
[   12.227887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.228583] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.228899] flags: 0x200000000000040(head|node=0|zone=2)
[   12.229321] page_type: f5(slab)
[   12.229505] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.229775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.230043] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.230533] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.230912] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.231456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.231727] page dumped because: kasan: bad access detected
[   12.231913] 
[   12.231984] Memory state around the buggy address:
[   12.232142]  ffff888100342180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.232461]  ffff888100342200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.232790] >ffff888100342280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.233349]                                               ^
[   12.233621]  ffff888100342300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.233963]  ffff888100342380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.234389] ==================================================================
[   12.386345] ==================================================================
[   12.386952] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.387384] Write of size 1 at addr ffff88810278a0c9 by task kunit_try_catch/179
[   12.387711] 
[   12.387829] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.387871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.387883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.387902] Call Trace:
[   12.387914]  <TASK>
[   12.387929]  dump_stack_lvl+0x73/0xb0
[   12.387960]  print_report+0xd1/0x610
[   12.387982]  ? __virt_addr_valid+0x1db/0x2d0
[   12.388005]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.388030]  ? kasan_addr_to_slab+0x11/0xa0
[   12.388051]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.388076]  kasan_report+0x141/0x180
[   12.388098]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.388127]  __asan_report_store1_noabort+0x1b/0x30
[   12.388153]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.388192]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.388217]  ? __schedule+0x207f/0x2b60
[   12.388238]  ? schedule+0x7c/0x2e0
[   12.388258]  ? trace_hardirqs_on+0x37/0xe0
[   12.388282]  ? __schedule+0x207f/0x2b60
[   12.388304]  ? __pfx_read_tsc+0x10/0x10
[   12.388329]  krealloc_large_less_oob+0x1c/0x30
[   12.388353]  kunit_try_run_case+0x1a5/0x480
[   12.388377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.388400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.388425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.388505]  ? __kthread_parkme+0x82/0x180
[   12.388528]  ? preempt_count_sub+0x50/0x80
[   12.388552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.388577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.388602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.388628]  kthread+0x337/0x6f0
[   12.388647]  ? trace_preempt_on+0x20/0xc0
[   12.388669]  ? __pfx_kthread+0x10/0x10
[   12.388690]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.388712]  ? calculate_sigpending+0x7b/0xa0
[   12.388737]  ? __pfx_kthread+0x10/0x10
[   12.388768]  ret_from_fork+0x116/0x1d0
[   12.388787]  ? __pfx_kthread+0x10/0x10
[   12.388808]  ret_from_fork_asm+0x1a/0x30
[   12.388838]  </TASK>
[   12.388848] 
[   12.396918] The buggy address belongs to the physical page:
[   12.397107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102788
[   12.397538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.397903] flags: 0x200000000000040(head|node=0|zone=2)
[   12.398499] page_type: f8(unknown)
[   12.398674] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.398961] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.399463] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.399770] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.400186] head: 0200000000000002 ffffea000409e201 00000000ffffffff 00000000ffffffff
[   12.400526] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.400823] page dumped because: kasan: bad access detected
[   12.401137] 
[   12.401232] Memory state around the buggy address:
[   12.401471]  ffff888102789f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.401768]  ffff88810278a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.402142] >ffff88810278a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.402499]                                               ^
[   12.402676]  ffff88810278a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.402979]  ffff88810278a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.403406] ==================================================================
[   12.456404] ==================================================================
[   12.456645] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.456961] Write of size 1 at addr ffff88810278a0eb by task kunit_try_catch/179
[   12.457285] 
[   12.457390] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.457429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.457440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.457458] Call Trace:
[   12.457470]  <TASK>
[   12.457482]  dump_stack_lvl+0x73/0xb0
[   12.457508]  print_report+0xd1/0x610
[   12.457530]  ? __virt_addr_valid+0x1db/0x2d0
[   12.457551]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.457574]  ? kasan_addr_to_slab+0x11/0xa0
[   12.457594]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.457617]  kasan_report+0x141/0x180
[   12.457638]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.457682]  __asan_report_store1_noabort+0x1b/0x30
[   12.457708]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.457735]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.457769]  ? __schedule+0x207f/0x2b60
[   12.457789]  ? schedule+0x7c/0x2e0
[   12.457809]  ? trace_hardirqs_on+0x37/0xe0
[   12.457833]  ? __schedule+0x207f/0x2b60
[   12.457854]  ? __pfx_read_tsc+0x10/0x10
[   12.457878]  krealloc_large_less_oob+0x1c/0x30
[   12.457901]  kunit_try_run_case+0x1a5/0x480
[   12.457925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.457949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.457972]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.457996]  ? __kthread_parkme+0x82/0x180
[   12.458017]  ? preempt_count_sub+0x50/0x80
[   12.458041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.458066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.458091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.458116]  kthread+0x337/0x6f0
[   12.458136]  ? trace_preempt_on+0x20/0xc0
[   12.458158]  ? __pfx_kthread+0x10/0x10
[   12.458178]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.458200]  ? calculate_sigpending+0x7b/0xa0
[   12.458224]  ? __pfx_kthread+0x10/0x10
[   12.458245]  ret_from_fork+0x116/0x1d0
[   12.458264]  ? __pfx_kthread+0x10/0x10
[   12.458285]  ret_from_fork_asm+0x1a/0x30
[   12.458315]  </TASK>
[   12.458324] 
[   12.466509] The buggy address belongs to the physical page:
[   12.466791] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102788
[   12.467320] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.467657] flags: 0x200000000000040(head|node=0|zone=2)
[   12.467875] page_type: f8(unknown)
[   12.468066] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.468364] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.468645] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.468984] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.469297] head: 0200000000000002 ffffea000409e201 00000000ffffffff 00000000ffffffff
[   12.469605] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.470035] page dumped because: kasan: bad access detected
[   12.470273] 
[   12.470343] Memory state around the buggy address:
[   12.470524]  ffff888102789f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.470743]  ffff88810278a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.471264] >ffff88810278a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.471613]                                                           ^
[   12.471920]  ffff88810278a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.472277]  ffff88810278a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.472550] ==================================================================