Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.851258] ==================================================================
[   16.851993] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.852094] Write of size 1 at addr fff00000c79020da by task kunit_try_catch/162
[   16.852156] 
[   16.852196] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.852431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.852472] Hardware name: linux,dummy-virt (DT)
[   16.852508] Call trace:
[   16.852530]  show_stack+0x20/0x38 (C)
[   16.852581]  dump_stack_lvl+0x8c/0xd0
[   16.852631]  print_report+0x118/0x5d0
[   16.852677]  kasan_report+0xdc/0x128
[   16.852722]  __asan_report_store1_noabort+0x20/0x30
[   16.852772]  krealloc_less_oob_helper+0xa80/0xc50
[   16.852821]  krealloc_large_less_oob+0x20/0x38
[   16.852877]  kunit_try_run_case+0x170/0x3f0
[   16.852924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.853665]  kthread+0x328/0x630
[   16.853721]  ret_from_fork+0x10/0x20
[   16.854231] 
[   16.854393] The buggy address belongs to the physical page:
[   16.854800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   16.854871] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.855250] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.855318] page_type: f8(unknown)
[   16.855722] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.855788] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.855871] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.855918] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.855966] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   16.856389] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.856702] page dumped because: kasan: bad access detected
[   16.856819] 
[   16.856947] Memory state around the buggy address:
[   16.856987]  fff00000c7901f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.857029]  fff00000c7902000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.857482] >fff00000c7902080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.857651]                                                     ^
[   16.857771]  fff00000c7902100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.858025]  fff00000c7902180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.858292] ==================================================================
[   16.860076] ==================================================================
[   16.860135] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.860201] Write of size 1 at addr fff00000c79020ea by task kunit_try_catch/162
[   16.860249] 
[   16.860282] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.860789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.861021] Hardware name: linux,dummy-virt (DT)
[   16.861250] Call trace:
[   16.861274]  show_stack+0x20/0x38 (C)
[   16.861325]  dump_stack_lvl+0x8c/0xd0
[   16.861373]  print_report+0x118/0x5d0
[   16.861419]  kasan_report+0xdc/0x128
[   16.861954]  __asan_report_store1_noabort+0x20/0x30
[   16.862039]  krealloc_less_oob_helper+0xae4/0xc50
[   16.862088]  krealloc_large_less_oob+0x20/0x38
[   16.862294]  kunit_try_run_case+0x170/0x3f0
[   16.862345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.862396]  kthread+0x328/0x630
[   16.862437]  ret_from_fork+0x10/0x20
[   16.862484] 
[   16.862503] The buggy address belongs to the physical page:
[   16.862534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   16.862584] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.862982] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.863062] page_type: f8(unknown)
[   16.863101] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.863828] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.863903] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.863979] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.864027] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   16.864277] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.864318] page dumped because: kasan: bad access detected
[   16.864623] 
[   16.864645] Memory state around the buggy address:
[   16.864677]  fff00000c7901f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.864720]  fff00000c7902000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.864761] >fff00000c7902080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.864798]                                                           ^
[   16.864835]  fff00000c7902100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.865029]  fff00000c7902180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.865069] ==================================================================
[   16.737961] ==================================================================
[   16.738120] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.738693] Write of size 1 at addr fff00000c1bc46ea by task kunit_try_catch/158
[   16.738752] 
[   16.738928] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.739038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.739065] Hardware name: linux,dummy-virt (DT)
[   16.739095] Call trace:
[   16.739118]  show_stack+0x20/0x38 (C)
[   16.739173]  dump_stack_lvl+0x8c/0xd0
[   16.739222]  print_report+0x118/0x5d0
[   16.740111]  kasan_report+0xdc/0x128
[   16.740203]  __asan_report_store1_noabort+0x20/0x30
[   16.740521]  krealloc_less_oob_helper+0xae4/0xc50
[   16.740721]  krealloc_less_oob+0x20/0x38
[   16.740839]  kunit_try_run_case+0x170/0x3f0
[   16.741268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.741353]  kthread+0x328/0x630
[   16.741401]  ret_from_fork+0x10/0x20
[   16.741922] 
[   16.741950] Allocated by task 158:
[   16.742040]  kasan_save_stack+0x3c/0x68
[   16.742087]  kasan_save_track+0x20/0x40
[   16.742124]  kasan_save_alloc_info+0x40/0x58
[   16.742164]  __kasan_krealloc+0x118/0x178
[   16.742201]  krealloc_noprof+0x128/0x360
[   16.742237]  krealloc_less_oob_helper+0x168/0xc50
[   16.742275]  krealloc_less_oob+0x20/0x38
[   16.742312]  kunit_try_run_case+0x170/0x3f0
[   16.742349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.742392]  kthread+0x328/0x630
[   16.742424]  ret_from_fork+0x10/0x20
[   16.742459] 
[   16.742478] The buggy address belongs to the object at fff00000c1bc4600
[   16.742478]  which belongs to the cache kmalloc-256 of size 256
[   16.744057] The buggy address is located 33 bytes to the right of
[   16.744057]  allocated 201-byte region [fff00000c1bc4600, fff00000c1bc46c9)
[   16.744248] 
[   16.744448] The buggy address belongs to the physical page:
[   16.744483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4
[   16.744707] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.744759] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.744825] page_type: f5(slab)
[   16.744883] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.744933] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.745456] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.745608] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.745868] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff
[   16.746159] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.746201] page dumped because: kasan: bad access detected
[   16.746289] 
[   16.746811] Memory state around the buggy address:
[   16.746934]  fff00000c1bc4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.746978]  fff00000c1bc4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.747021] >fff00000c1bc4680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.747058]                                                           ^
[   16.747612]  fff00000c1bc4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.747768]  fff00000c1bc4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.747853] ==================================================================
[   16.721659] ==================================================================
[   16.721731] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.721798] Write of size 1 at addr fff00000c1bc46da by task kunit_try_catch/158
[   16.721865] 
[   16.723730] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.723839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.723938] Hardware name: linux,dummy-virt (DT)
[   16.723970] Call trace:
[   16.723998]  show_stack+0x20/0x38 (C)
[   16.724158]  dump_stack_lvl+0x8c/0xd0
[   16.724500]  print_report+0x118/0x5d0
[   16.724552]  kasan_report+0xdc/0x128
[   16.724597]  __asan_report_store1_noabort+0x20/0x30
[   16.724860]  krealloc_less_oob_helper+0xa80/0xc50
[   16.724917]  krealloc_less_oob+0x20/0x38
[   16.724962]  kunit_try_run_case+0x170/0x3f0
[   16.725370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.725764]  kthread+0x328/0x630
[   16.725833]  ret_from_fork+0x10/0x20
[   16.726327] 
[   16.726359] Allocated by task 158:
[   16.726633]  kasan_save_stack+0x3c/0x68
[   16.726683]  kasan_save_track+0x20/0x40
[   16.726720]  kasan_save_alloc_info+0x40/0x58
[   16.726910]  __kasan_krealloc+0x118/0x178
[   16.727287]  krealloc_noprof+0x128/0x360
[   16.727628]  krealloc_less_oob_helper+0x168/0xc50
[   16.727744]  krealloc_less_oob+0x20/0x38
[   16.727783]  kunit_try_run_case+0x170/0x3f0
[   16.728017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.728073]  kthread+0x328/0x630
[   16.728106]  ret_from_fork+0x10/0x20
[   16.728141] 
[   16.728161] The buggy address belongs to the object at fff00000c1bc4600
[   16.728161]  which belongs to the cache kmalloc-256 of size 256
[   16.728404] The buggy address is located 17 bytes to the right of
[   16.728404]  allocated 201-byte region [fff00000c1bc4600, fff00000c1bc46c9)
[   16.728486] 
[   16.728886] The buggy address belongs to the physical page:
[   16.728955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4
[   16.729062] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.729286] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.729369] page_type: f5(slab)
[   16.729807] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.729878] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.730455] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.730707] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.730797] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff
[   16.730927] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.731128] page dumped because: kasan: bad access detected
[   16.731239] 
[   16.731257] Memory state around the buggy address:
[   16.731325]  fff00000c1bc4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.731693]  fff00000c1bc4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.731924] >fff00000c1bc4680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.731963]                                                     ^
[   16.732001]  fff00000c1bc4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.732149]  fff00000c1bc4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.732188] ==================================================================
[   16.867260] ==================================================================
[   16.867383] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.867434] Write of size 1 at addr fff00000c79020eb by task kunit_try_catch/162
[   16.867482] 
[   16.867513] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.867589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.867615] Hardware name: linux,dummy-virt (DT)
[   16.867644] Call trace:
[   16.868165]  show_stack+0x20/0x38 (C)
[   16.868247]  dump_stack_lvl+0x8c/0xd0
[   16.868298]  print_report+0x118/0x5d0
[   16.868862]  kasan_report+0xdc/0x128
[   16.868924]  __asan_report_store1_noabort+0x20/0x30
[   16.869122]  krealloc_less_oob_helper+0xa58/0xc50
[   16.869400]  krealloc_large_less_oob+0x20/0x38
[   16.869449]  kunit_try_run_case+0x170/0x3f0
[   16.869504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.869556]  kthread+0x328/0x630
[   16.869598]  ret_from_fork+0x10/0x20
[   16.869862] 
[   16.869886] The buggy address belongs to the physical page:
[   16.869944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   16.870544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.870626] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.871105] page_type: f8(unknown)
[   16.871428] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.871481] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.871725] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.871921] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.872157] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   16.872474] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.872756] page dumped because: kasan: bad access detected
[   16.872880] 
[   16.873003] Memory state around the buggy address:
[   16.873251]  fff00000c7901f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.873533]  fff00000c7902000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.873899] >fff00000c7902080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.874537]                                                           ^
[   16.875473]  fff00000c7902100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.875814]  fff00000c7902180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.875870] ==================================================================
[   16.842985] ==================================================================
[   16.843050] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.843115] Write of size 1 at addr fff00000c79020d0 by task kunit_try_catch/162
[   16.843164] 
[   16.843575] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.843700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.843734] Hardware name: linux,dummy-virt (DT)
[   16.843766] Call trace:
[   16.843788]  show_stack+0x20/0x38 (C)
[   16.843916]  dump_stack_lvl+0x8c/0xd0
[   16.844052]  print_report+0x118/0x5d0
[   16.844217]  kasan_report+0xdc/0x128
[   16.844407]  __asan_report_store1_noabort+0x20/0x30
[   16.844725]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.844774]  krealloc_large_less_oob+0x20/0x38
[   16.845006]  kunit_try_run_case+0x170/0x3f0
[   16.845087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.845237]  kthread+0x328/0x630
[   16.845446]  ret_from_fork+0x10/0x20
[   16.845504] 
[   16.845929] The buggy address belongs to the physical page:
[   16.846110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   16.846410] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.846500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.846714] page_type: f8(unknown)
[   16.847001] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.847351] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.847406] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.847686] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.847908] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   16.847958] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.847997] page dumped because: kasan: bad access detected
[   16.848028] 
[   16.848045] Memory state around the buggy address:
[   16.848078]  fff00000c7901f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.848543]  fff00000c7902000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.848603] >fff00000c7902080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.848641]                                                  ^
[   16.848970]  fff00000c7902100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.849016]  fff00000c7902180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.849055] ==================================================================
[   16.751029] ==================================================================
[   16.751383] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.751447] Write of size 1 at addr fff00000c1bc46eb by task kunit_try_catch/158
[   16.751685] 
[   16.751769] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.752250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.752278] Hardware name: linux,dummy-virt (DT)
[   16.752544] Call trace:
[   16.752795]  show_stack+0x20/0x38 (C)
[   16.752943]  dump_stack_lvl+0x8c/0xd0
[   16.753214]  print_report+0x118/0x5d0
[   16.753294]  kasan_report+0xdc/0x128
[   16.753347]  __asan_report_store1_noabort+0x20/0x30
[   16.753397]  krealloc_less_oob_helper+0xa58/0xc50
[   16.754013]  krealloc_less_oob+0x20/0x38
[   16.754072]  kunit_try_run_case+0x170/0x3f0
[   16.754128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.754180]  kthread+0x328/0x630
[   16.754223]  ret_from_fork+0x10/0x20
[   16.754272] 
[   16.754291] Allocated by task 158:
[   16.755253]  kasan_save_stack+0x3c/0x68
[   16.755394]  kasan_save_track+0x20/0x40
[   16.755432]  kasan_save_alloc_info+0x40/0x58
[   16.755471]  __kasan_krealloc+0x118/0x178
[   16.755508]  krealloc_noprof+0x128/0x360
[   16.755820]  krealloc_less_oob_helper+0x168/0xc50
[   16.755880]  krealloc_less_oob+0x20/0x38
[   16.756106]  kunit_try_run_case+0x170/0x3f0
[   16.756500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.756667]  kthread+0x328/0x630
[   16.756803]  ret_from_fork+0x10/0x20
[   16.756839] 
[   16.756870] The buggy address belongs to the object at fff00000c1bc4600
[   16.756870]  which belongs to the cache kmalloc-256 of size 256
[   16.757470] The buggy address is located 34 bytes to the right of
[   16.757470]  allocated 201-byte region [fff00000c1bc4600, fff00000c1bc46c9)
[   16.757548] 
[   16.757570] The buggy address belongs to the physical page:
[   16.757603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4
[   16.757657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.757705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.757759] page_type: f5(slab)
[   16.758832] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.759395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.759639] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.759690] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.759738] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff
[   16.759785] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.759824] page dumped because: kasan: bad access detected
[   16.759865] 
[   16.759883] Memory state around the buggy address:
[   16.759916]  fff00000c1bc4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.761084]  fff00000c1bc4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.761136] >fff00000c1bc4680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.761595]                                                           ^
[   16.761918]  fff00000c1bc4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.762172]  fff00000c1bc4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.762249] ==================================================================
[   16.708926] ==================================================================
[   16.708991] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.709053] Write of size 1 at addr fff00000c1bc46d0 by task kunit_try_catch/158
[   16.709102] 
[   16.709140] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.709220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.710405] Hardware name: linux,dummy-virt (DT)
[   16.710457] Call trace:
[   16.710481]  show_stack+0x20/0x38 (C)
[   16.710543]  dump_stack_lvl+0x8c/0xd0
[   16.710690]  print_report+0x118/0x5d0
[   16.710915]  kasan_report+0xdc/0x128
[   16.711056]  __asan_report_store1_noabort+0x20/0x30
[   16.711161]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.711210]  krealloc_less_oob+0x20/0x38
[   16.711255]  kunit_try_run_case+0x170/0x3f0
[   16.712020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.712299]  kthread+0x328/0x630
[   16.712355]  ret_from_fork+0x10/0x20
[   16.712409] 
[   16.712465] Allocated by task 158:
[   16.712500]  kasan_save_stack+0x3c/0x68
[   16.712544]  kasan_save_track+0x20/0x40
[   16.712770]  kasan_save_alloc_info+0x40/0x58
[   16.712814]  __kasan_krealloc+0x118/0x178
[   16.712862]  krealloc_noprof+0x128/0x360
[   16.712899]  krealloc_less_oob_helper+0x168/0xc50
[   16.713678]  krealloc_less_oob+0x20/0x38
[   16.713739]  kunit_try_run_case+0x170/0x3f0
[   16.714050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.714274]  kthread+0x328/0x630
[   16.714367]  ret_from_fork+0x10/0x20
[   16.714411] 
[   16.714612] The buggy address belongs to the object at fff00000c1bc4600
[   16.714612]  which belongs to the cache kmalloc-256 of size 256
[   16.714770] The buggy address is located 7 bytes to the right of
[   16.714770]  allocated 201-byte region [fff00000c1bc4600, fff00000c1bc46c9)
[   16.714832] 
[   16.715186] The buggy address belongs to the physical page:
[   16.715224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4
[   16.715633] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.715688] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.715787] page_type: f5(slab)
[   16.715829] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.716240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.716550] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.716876] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.716935] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff
[   16.716984] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.717025] page dumped because: kasan: bad access detected
[   16.717701] 
[   16.717725] Memory state around the buggy address:
[   16.718163]  fff00000c1bc4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.718363]  fff00000c1bc4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.718490] >fff00000c1bc4680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.718528]                                                  ^
[   16.718565]  fff00000c1bc4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.718606]  fff00000c1bc4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.718644] ==================================================================
[   16.831428] ==================================================================
[   16.832019] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.832172] Write of size 1 at addr fff00000c79020c9 by task kunit_try_catch/162
[   16.832227] 
[   16.832272] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.832774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.832982] Hardware name: linux,dummy-virt (DT)
[   16.833542] Call trace:
[   16.833572]  show_stack+0x20/0x38 (C)
[   16.833788]  dump_stack_lvl+0x8c/0xd0
[   16.833851]  print_report+0x118/0x5d0
[   16.833900]  kasan_report+0xdc/0x128
[   16.833945]  __asan_report_store1_noabort+0x20/0x30
[   16.833995]  krealloc_less_oob_helper+0xa48/0xc50
[   16.834043]  krealloc_large_less_oob+0x20/0x38
[   16.835382]  kunit_try_run_case+0x170/0x3f0
[   16.835572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.835625]  kthread+0x328/0x630
[   16.835937]  ret_from_fork+0x10/0x20
[   16.836370] 
[   16.836726] The buggy address belongs to the physical page:
[   16.836962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   16.837451] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.837728] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.837793] page_type: f8(unknown)
[   16.837839] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.838066] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.838377] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.838430] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.838624] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   16.838674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.839112] page dumped because: kasan: bad access detected
[   16.839152] 
[   16.839227] Memory state around the buggy address:
[   16.839483]  fff00000c7901f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.839708]  fff00000c7902000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.839755] >fff00000c7902080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.839791]                                               ^
[   16.839828]  fff00000c7902100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.839878]  fff00000c7902180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.840075] ==================================================================
[   16.696250] ==================================================================
[   16.696315] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.696380] Write of size 1 at addr fff00000c1bc46c9 by task kunit_try_catch/158
[   16.696430] 
[   16.696467] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.696682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.696774] Hardware name: linux,dummy-virt (DT)
[   16.696810] Call trace:
[   16.697118]  show_stack+0x20/0x38 (C)
[   16.697255]  dump_stack_lvl+0x8c/0xd0
[   16.697712]  print_report+0x118/0x5d0
[   16.697773]  kasan_report+0xdc/0x128
[   16.697819]  __asan_report_store1_noabort+0x20/0x30
[   16.697886]  krealloc_less_oob_helper+0xa48/0xc50
[   16.698387]  krealloc_less_oob+0x20/0x38
[   16.698518]  kunit_try_run_case+0x170/0x3f0
[   16.698755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.699116]  kthread+0x328/0x630
[   16.699162]  ret_from_fork+0x10/0x20
[   16.699497] 
[   16.699516] Allocated by task 158:
[   16.699629]  kasan_save_stack+0x3c/0x68
[   16.699674]  kasan_save_track+0x20/0x40
[   16.699919]  kasan_save_alloc_info+0x40/0x58
[   16.700194]  __kasan_krealloc+0x118/0x178
[   16.700234]  krealloc_noprof+0x128/0x360
[   16.700271]  krealloc_less_oob_helper+0x168/0xc50
[   16.700310]  krealloc_less_oob+0x20/0x38
[   16.700805]  kunit_try_run_case+0x170/0x3f0
[   16.700867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.700909]  kthread+0x328/0x630
[   16.701091]  ret_from_fork+0x10/0x20
[   16.701128] 
[   16.701147] The buggy address belongs to the object at fff00000c1bc4600
[   16.701147]  which belongs to the cache kmalloc-256 of size 256
[   16.701203] The buggy address is located 0 bytes to the right of
[   16.701203]  allocated 201-byte region [fff00000c1bc4600, fff00000c1bc46c9)
[   16.701263] 
[   16.701613] The buggy address belongs to the physical page:
[   16.701894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4
[   16.701954] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.701999] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.702054] page_type: f5(slab)
[   16.703146] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.703556] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.703697] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.703744] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.703792] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff
[   16.703839] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.704333] page dumped because: kasan: bad access detected
[   16.704438] 
[   16.704487] Memory state around the buggy address:
[   16.704523]  fff00000c1bc4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.704615]  fff00000c1bc4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.704865] >fff00000c1bc4680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.705107]                                               ^
[   16.705147]  fff00000c1bc4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.705189]  fff00000c1bc4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.705226] ==================================================================

[   16.491440] ==================================================================
[   16.491499] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.491545] Write of size 1 at addr fff00000c45cfed0 by task kunit_try_catch/158
[   16.491600] 
[   16.491630] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.491715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.491855] Hardware name: linux,dummy-virt (DT)
[   16.492029] Call trace:
[   16.492104]  show_stack+0x20/0x38 (C)
[   16.492194]  dump_stack_lvl+0x8c/0xd0
[   16.492332]  print_report+0x118/0x5d0
[   16.492380]  kasan_report+0xdc/0x128
[   16.492425]  __asan_report_store1_noabort+0x20/0x30
[   16.492498]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.492566]  krealloc_less_oob+0x20/0x38
[   16.492611]  kunit_try_run_case+0x170/0x3f0
[   16.492693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.492756]  kthread+0x328/0x630
[   16.492797]  ret_from_fork+0x10/0x20
[   16.492927] 
[   16.492981] Allocated by task 158:
[   16.493009]  kasan_save_stack+0x3c/0x68
[   16.493103]  kasan_save_track+0x20/0x40
[   16.493189]  kasan_save_alloc_info+0x40/0x58
[   16.493267]  __kasan_krealloc+0x118/0x178
[   16.493378]  krealloc_noprof+0x128/0x360
[   16.493435]  krealloc_less_oob_helper+0x168/0xc50
[   16.493573]  krealloc_less_oob+0x20/0x38
[   16.493668]  kunit_try_run_case+0x170/0x3f0
[   16.493733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.493775]  kthread+0x328/0x630
[   16.493806]  ret_from_fork+0x10/0x20
[   16.493854] 
[   16.493871] The buggy address belongs to the object at fff00000c45cfe00
[   16.493871]  which belongs to the cache kmalloc-256 of size 256
[   16.493925] The buggy address is located 7 bytes to the right of
[   16.493925]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.494021] 
[   16.494040] The buggy address belongs to the physical page:
[   16.494081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.494131] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.494177] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.494242] page_type: f5(slab)
[   16.494285] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.494462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.494511] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.494558] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.494605] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.494652] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.494690] page dumped because: kasan: bad access detected
[   16.494729] 
[   16.494747] Memory state around the buggy address:
[   16.494777]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.494845]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.494887] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.494935]                                                  ^
[   16.495090]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495211]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495283] ==================================================================
[   16.486724] ==================================================================
[   16.486967] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.487089] Write of size 1 at addr fff00000c45cfec9 by task kunit_try_catch/158
[   16.487343] 
[   16.487384] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.487569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.487595] Hardware name: linux,dummy-virt (DT)
[   16.487625] Call trace:
[   16.487647]  show_stack+0x20/0x38 (C)
[   16.487695]  dump_stack_lvl+0x8c/0xd0
[   16.487749]  print_report+0x118/0x5d0
[   16.487907]  kasan_report+0xdc/0x128
[   16.488038]  __asan_report_store1_noabort+0x20/0x30
[   16.488304]  krealloc_less_oob_helper+0xa48/0xc50
[   16.488375]  krealloc_less_oob+0x20/0x38
[   16.488420]  kunit_try_run_case+0x170/0x3f0
[   16.488467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.488518]  kthread+0x328/0x630
[   16.488560]  ret_from_fork+0x10/0x20
[   16.488606] 
[   16.488624] Allocated by task 158:
[   16.488693]  kasan_save_stack+0x3c/0x68
[   16.488735]  kasan_save_track+0x20/0x40
[   16.488784]  kasan_save_alloc_info+0x40/0x58
[   16.488823]  __kasan_krealloc+0x118/0x178
[   16.488859]  krealloc_noprof+0x128/0x360
[   16.488896]  krealloc_less_oob_helper+0x168/0xc50
[   16.488951]  krealloc_less_oob+0x20/0x38
[   16.489001]  kunit_try_run_case+0x170/0x3f0
[   16.489054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.489109]  kthread+0x328/0x630
[   16.489150]  ret_from_fork+0x10/0x20
[   16.489185] 
[   16.489215] The buggy address belongs to the object at fff00000c45cfe00
[   16.489215]  which belongs to the cache kmalloc-256 of size 256
[   16.489270] The buggy address is located 0 bytes to the right of
[   16.489270]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.489339] 
[   16.489359] The buggy address belongs to the physical page:
[   16.489389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.489441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.489488] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.489641] page_type: f5(slab)
[   16.489694] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.489794] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489843] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.489890] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489937] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.490027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.490088] page dumped because: kasan: bad access detected
[   16.490118] 
[   16.490136] Memory state around the buggy address:
[   16.490166]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490336]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.490378] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.490471]                                               ^
[   16.490583]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490625]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490703] ==================================================================
[   16.538302] ==================================================================
[   16.538545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.538626] Write of size 1 at addr fff00000c79ba0c9 by task kunit_try_catch/162
[   16.538678] 
[   16.538871] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.539002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.539110] Hardware name: linux,dummy-virt (DT)
[   16.539147] Call trace:
[   16.539431]  show_stack+0x20/0x38 (C)
[   16.539632]  dump_stack_lvl+0x8c/0xd0
[   16.539755]  print_report+0x118/0x5d0
[   16.539807]  kasan_report+0xdc/0x128
[   16.539853]  __asan_report_store1_noabort+0x20/0x30
[   16.539951]  krealloc_less_oob_helper+0xa48/0xc50
[   16.540014]  krealloc_large_less_oob+0x20/0x38
[   16.540351]  kunit_try_run_case+0x170/0x3f0
[   16.540427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.540480]  kthread+0x328/0x630
[   16.540700]  ret_from_fork+0x10/0x20
[   16.540832] 
[   16.540905] The buggy address belongs to the physical page:
[   16.540974] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.541067] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.541114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.541461] page_type: f8(unknown)
[   16.541582] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.541655] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.541730] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.541812] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.541860] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.541914] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.541964] page dumped because: kasan: bad access detected
[   16.542009] 
[   16.542045] Memory state around the buggy address:
[   16.542078]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.542121]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.542162] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.542208]                                               ^
[   16.542244]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.542292]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.542340] ==================================================================
[   16.501425] ==================================================================
[   16.501472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.501517] Write of size 1 at addr fff00000c45cfeea by task kunit_try_catch/158
[   16.501564] 
[   16.501594] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.501671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.501706] Hardware name: linux,dummy-virt (DT)
[   16.501852] Call trace:
[   16.501964]  show_stack+0x20/0x38 (C)
[   16.502136]  dump_stack_lvl+0x8c/0xd0
[   16.502229]  print_report+0x118/0x5d0
[   16.502481]  kasan_report+0xdc/0x128
[   16.502709]  __asan_report_store1_noabort+0x20/0x30
[   16.502865]  krealloc_less_oob_helper+0xae4/0xc50
[   16.503036]  krealloc_less_oob+0x20/0x38
[   16.503272]  kunit_try_run_case+0x170/0x3f0
[   16.503959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.504020]  kthread+0x328/0x630
[   16.504064]  ret_from_fork+0x10/0x20
[   16.504112] 
[   16.504129] Allocated by task 158:
[   16.504161]  kasan_save_stack+0x3c/0x68
[   16.504200]  kasan_save_track+0x20/0x40
[   16.504236]  kasan_save_alloc_info+0x40/0x58
[   16.504285]  __kasan_krealloc+0x118/0x178
[   16.504333]  krealloc_noprof+0x128/0x360
[   16.504371]  krealloc_less_oob_helper+0x168/0xc50
[   16.504602]  krealloc_less_oob+0x20/0x38
[   16.504773]  kunit_try_run_case+0x170/0x3f0
[   16.504811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.504852]  kthread+0x328/0x630
[   16.504939]  ret_from_fork+0x10/0x20
[   16.504986] 
[   16.505005] The buggy address belongs to the object at fff00000c45cfe00
[   16.505005]  which belongs to the cache kmalloc-256 of size 256
[   16.505060] The buggy address is located 33 bytes to the right of
[   16.505060]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.505237] 
[   16.505265] The buggy address belongs to the physical page:
[   16.505294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.505362] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.505408] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.505458] page_type: f5(slab)
[   16.505530] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.505643] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.505806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.505855] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.505902] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.505949] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.505988] page dumped because: kasan: bad access detected
[   16.506244] 
[   16.506264] Memory state around the buggy address:
[   16.506300]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506409]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.506451] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.506486]                                                           ^
[   16.506524]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506582]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506770] ==================================================================
[   16.543953] ==================================================================
[   16.544018] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.544357] Write of size 1 at addr fff00000c79ba0d0 by task kunit_try_catch/162
[   16.544409] 
[   16.544448] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.544705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.544962] Hardware name: linux,dummy-virt (DT)
[   16.545049] Call trace:
[   16.545129]  show_stack+0x20/0x38 (C)
[   16.545409]  dump_stack_lvl+0x8c/0xd0
[   16.545638]  print_report+0x118/0x5d0
[   16.545705]  kasan_report+0xdc/0x128
[   16.545852]  __asan_report_store1_noabort+0x20/0x30
[   16.545930]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.546084]  krealloc_large_less_oob+0x20/0x38
[   16.546136]  kunit_try_run_case+0x170/0x3f0
[   16.546345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.546563]  kthread+0x328/0x630
[   16.546649]  ret_from_fork+0x10/0x20
[   16.546825] 
[   16.546875] The buggy address belongs to the physical page:
[   16.546906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.547266] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.547474] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.547760] page_type: f8(unknown)
[   16.547975] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.548032] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.548531] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.548818] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.548913] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.549050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.549215] page dumped because: kasan: bad access detected
[   16.549289] 
[   16.549315] Memory state around the buggy address:
[   16.549359]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.549634]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.549698] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.549844]                                                  ^
[   16.549889]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.549951]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.549997] ==================================================================
[   16.554523] ==================================================================
[   16.554660] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.554714] Write of size 1 at addr fff00000c79ba0ea by task kunit_try_catch/162
[   16.554781] 
[   16.554817] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.554895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.554921] Hardware name: linux,dummy-virt (DT)
[   16.554951] Call trace:
[   16.555386]  show_stack+0x20/0x38 (C)
[   16.555492]  dump_stack_lvl+0x8c/0xd0
[   16.555681]  print_report+0x118/0x5d0
[   16.555745]  kasan_report+0xdc/0x128
[   16.555926]  __asan_report_store1_noabort+0x20/0x30
[   16.556001]  krealloc_less_oob_helper+0xae4/0xc50
[   16.556183]  krealloc_large_less_oob+0x20/0x38
[   16.556469]  kunit_try_run_case+0x170/0x3f0
[   16.556696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.556778]  kthread+0x328/0x630
[   16.556862]  ret_from_fork+0x10/0x20
[   16.557219] 
[   16.557265] The buggy address belongs to the physical page:
[   16.557380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.557726] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.557845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.557937] page_type: f8(unknown)
[   16.558025] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558162] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558333] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558418] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558495] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.558674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.558837] page dumped because: kasan: bad access detected
[   16.558935] 
[   16.558994] Memory state around the buggy address:
[   16.559055]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.559195]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.559261] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.559385]                                                           ^
[   16.559446]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559487]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559682] ==================================================================
[   16.561368] ==================================================================
[   16.561510] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.561562] Write of size 1 at addr fff00000c79ba0eb by task kunit_try_catch/162
[   16.561627] 
[   16.561691] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.561773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.561833] Hardware name: linux,dummy-virt (DT)
[   16.561905] Call trace:
[   16.561955]  show_stack+0x20/0x38 (C)
[   16.562005]  dump_stack_lvl+0x8c/0xd0
[   16.562058]  print_report+0x118/0x5d0
[   16.562102]  kasan_report+0xdc/0x128
[   16.562146]  __asan_report_store1_noabort+0x20/0x30
[   16.562474]  krealloc_less_oob_helper+0xa58/0xc50
[   16.562645]  krealloc_large_less_oob+0x20/0x38
[   16.562698]  kunit_try_run_case+0x170/0x3f0
[   16.562764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.562901]  kthread+0x328/0x630
[   16.562955]  ret_from_fork+0x10/0x20
[   16.563002] 
[   16.563030] The buggy address belongs to the physical page:
[   16.563211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.563398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.563464] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.563577] page_type: f8(unknown)
[   16.563635] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.563712] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.563803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.563899] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.563947] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.564168] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.564222] page dumped because: kasan: bad access detected
[   16.564380] 
[   16.564406] Memory state around the buggy address:
[   16.564485]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.564701]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.564813] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.564909]                                                           ^
[   16.564965]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.565274]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.565442] ==================================================================
[   16.507282] ==================================================================
[   16.507337] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.507383] Write of size 1 at addr fff00000c45cfeeb by task kunit_try_catch/158
[   16.507430] 
[   16.507459] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.507535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.507561] Hardware name: linux,dummy-virt (DT)
[   16.507591] Call trace:
[   16.507613]  show_stack+0x20/0x38 (C)
[   16.507659]  dump_stack_lvl+0x8c/0xd0
[   16.507704]  print_report+0x118/0x5d0
[   16.507750]  kasan_report+0xdc/0x128
[   16.507807]  __asan_report_store1_noabort+0x20/0x30
[   16.507859]  krealloc_less_oob_helper+0xa58/0xc50
[   16.507906]  krealloc_less_oob+0x20/0x38
[   16.508013]  kunit_try_run_case+0x170/0x3f0
[   16.508066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.508129]  kthread+0x328/0x630
[   16.508314]  ret_from_fork+0x10/0x20
[   16.508378] 
[   16.508474] Allocated by task 158:
[   16.508510]  kasan_save_stack+0x3c/0x68
[   16.508578]  kasan_save_track+0x20/0x40
[   16.508696]  kasan_save_alloc_info+0x40/0x58
[   16.508735]  __kasan_krealloc+0x118/0x178
[   16.508772]  krealloc_noprof+0x128/0x360
[   16.508808]  krealloc_less_oob_helper+0x168/0xc50
[   16.508847]  krealloc_less_oob+0x20/0x38
[   16.508881]  kunit_try_run_case+0x170/0x3f0
[   16.508917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.508960]  kthread+0x328/0x630
[   16.508990]  ret_from_fork+0x10/0x20
[   16.509035] 
[   16.509053] The buggy address belongs to the object at fff00000c45cfe00
[   16.509053]  which belongs to the cache kmalloc-256 of size 256
[   16.509109] The buggy address is located 34 bytes to the right of
[   16.509109]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.509384] 
[   16.509484] The buggy address belongs to the physical page:
[   16.509514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.509739] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.509912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.509961] page_type: f5(slab)
[   16.510276] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.510398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.510495] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.510563] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.510701] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.510774] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.510856] page dumped because: kasan: bad access detected
[   16.510975] 
[   16.511004] Memory state around the buggy address:
[   16.511034]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511340]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.511399] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.511436]                                                           ^
[   16.511473]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511515]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511578] ==================================================================
[   16.550910] ==================================================================
[   16.550956] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.551004] Write of size 1 at addr fff00000c79ba0da by task kunit_try_catch/162
[   16.551061] 
[   16.551092] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.551170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.551206] Hardware name: linux,dummy-virt (DT)
[   16.551241] Call trace:
[   16.551264]  show_stack+0x20/0x38 (C)
[   16.551310]  dump_stack_lvl+0x8c/0xd0
[   16.551367]  print_report+0x118/0x5d0
[   16.551413]  kasan_report+0xdc/0x128
[   16.551457]  __asan_report_store1_noabort+0x20/0x30
[   16.551521]  krealloc_less_oob_helper+0xa80/0xc50
[   16.551569]  krealloc_large_less_oob+0x20/0x38
[   16.551616]  kunit_try_run_case+0x170/0x3f0
[   16.551664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.551716]  kthread+0x328/0x630
[   16.551766]  ret_from_fork+0x10/0x20
[   16.551813] 
[   16.551832] The buggy address belongs to the physical page:
[   16.551871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.551923] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.551969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.552017] page_type: f8(unknown)
[   16.552060] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.552108] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.552166] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.552214] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.552261] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.552307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.552355] page dumped because: kasan: bad access detected
[   16.552384] 
[   16.552812] Memory state around the buggy address:
[   16.552848]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.552894]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.553297] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.553360]                                                     ^
[   16.553451]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.553509]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.553757] ==================================================================
[   16.496225] ==================================================================
[   16.496272] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.496333] Write of size 1 at addr fff00000c45cfeda by task kunit_try_catch/158
[   16.496383] 
[   16.496421] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.496948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.497062] Hardware name: linux,dummy-virt (DT)
[   16.497175] Call trace:
[   16.497212]  show_stack+0x20/0x38 (C)
[   16.497263]  dump_stack_lvl+0x8c/0xd0
[   16.497309]  print_report+0x118/0x5d0
[   16.497597]  kasan_report+0xdc/0x128
[   16.497646]  __asan_report_store1_noabort+0x20/0x30
[   16.497696]  krealloc_less_oob_helper+0xa80/0xc50
[   16.497857]  krealloc_less_oob+0x20/0x38
[   16.497972]  kunit_try_run_case+0x170/0x3f0
[   16.498039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.498097]  kthread+0x328/0x630
[   16.498140]  ret_from_fork+0x10/0x20
[   16.498187] 
[   16.498205] Allocated by task 158:
[   16.498269]  kasan_save_stack+0x3c/0x68
[   16.498310]  kasan_save_track+0x20/0x40
[   16.498365]  kasan_save_alloc_info+0x40/0x58
[   16.498429]  __kasan_krealloc+0x118/0x178
[   16.498604]  krealloc_noprof+0x128/0x360
[   16.498662]  krealloc_less_oob_helper+0x168/0xc50
[   16.498765]  krealloc_less_oob+0x20/0x38
[   16.498801]  kunit_try_run_case+0x170/0x3f0
[   16.498837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.498878]  kthread+0x328/0x630
[   16.499207]  ret_from_fork+0x10/0x20
[   16.499297] 
[   16.499410] The buggy address belongs to the object at fff00000c45cfe00
[   16.499410]  which belongs to the cache kmalloc-256 of size 256
[   16.499479] The buggy address is located 17 bytes to the right of
[   16.499479]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.499570] 
[   16.499590] The buggy address belongs to the physical page:
[   16.499621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.499672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.499718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.499768] page_type: f5(slab)
[   16.499804] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.499911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.500173] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.500329] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.500378] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.500425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.500464] page dumped because: kasan: bad access detected
[   16.500494] 
[   16.500512] Memory state around the buggy address:
[   16.500542]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.500604]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.500645] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.500681]                                                     ^
[   16.500717]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.500758]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.500793] ==================================================================

[   16.480133] ==================================================================
[   16.480185] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.480294] Write of size 1 at addr fff00000c17c78da by task kunit_try_catch/158
[   16.480347] 
[   16.480379] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.480472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.480498] Hardware name: linux,dummy-virt (DT)
[   16.480533] Call trace:
[   16.480616]  show_stack+0x20/0x38 (C)
[   16.480671]  dump_stack_lvl+0x8c/0xd0
[   16.480776]  print_report+0x118/0x5d0
[   16.480839]  kasan_report+0xdc/0x128
[   16.480884]  __asan_report_store1_noabort+0x20/0x30
[   16.481134]  krealloc_less_oob_helper+0xa80/0xc50
[   16.481247]  krealloc_less_oob+0x20/0x38
[   16.481330]  kunit_try_run_case+0x170/0x3f0
[   16.481395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.481447]  kthread+0x328/0x630
[   16.481548]  ret_from_fork+0x10/0x20
[   16.481596] 
[   16.481641] Allocated by task 158:
[   16.481695]  kasan_save_stack+0x3c/0x68
[   16.481968]  kasan_save_track+0x20/0x40
[   16.482032]  kasan_save_alloc_info+0x40/0x58
[   16.482109]  __kasan_krealloc+0x118/0x178
[   16.482147]  krealloc_noprof+0x128/0x360
[   16.482183]  krealloc_less_oob_helper+0x168/0xc50
[   16.482249]  krealloc_less_oob+0x20/0x38
[   16.482285]  kunit_try_run_case+0x170/0x3f0
[   16.482321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.482465]  kthread+0x328/0x630
[   16.482684]  ret_from_fork+0x10/0x20
[   16.482776] 
[   16.482796] The buggy address belongs to the object at fff00000c17c7800
[   16.482796]  which belongs to the cache kmalloc-256 of size 256
[   16.482863] The buggy address is located 17 bytes to the right of
[   16.482863]  allocated 201-byte region [fff00000c17c7800, fff00000c17c78c9)
[   16.482927] 
[   16.482946] The buggy address belongs to the physical page:
[   16.483127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6
[   16.483257] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.483336] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.483465] page_type: f5(slab)
[   16.483512] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.483560] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.483609] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.483655] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.483729] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff
[   16.483777] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.483975] page dumped because: kasan: bad access detected
[   16.484071] 
[   16.484153] Memory state around the buggy address:
[   16.484236]  fff00000c17c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.484278]  fff00000c17c7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.484330] >fff00000c17c7880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.484366]                                                     ^
[   16.484412]  fff00000c17c7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.484470]  fff00000c17c7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.484530] ==================================================================
[   16.490195] ==================================================================
[   16.490273] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.490357] Write of size 1 at addr fff00000c17c78eb by task kunit_try_catch/158
[   16.490406] 
[   16.490438] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.490514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.490539] Hardware name: linux,dummy-virt (DT)
[   16.490569] Call trace:
[   16.490590]  show_stack+0x20/0x38 (C)
[   16.490671]  dump_stack_lvl+0x8c/0xd0
[   16.490946]  print_report+0x118/0x5d0
[   16.491037]  kasan_report+0xdc/0x128
[   16.491137]  __asan_report_store1_noabort+0x20/0x30
[   16.491188]  krealloc_less_oob_helper+0xa58/0xc50
[   16.491246]  krealloc_less_oob+0x20/0x38
[   16.491292]  kunit_try_run_case+0x170/0x3f0
[   16.491338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.491547]  kthread+0x328/0x630
[   16.491651]  ret_from_fork+0x10/0x20
[   16.491805] 
[   16.491883] Allocated by task 158:
[   16.491955]  kasan_save_stack+0x3c/0x68
[   16.492050]  kasan_save_track+0x20/0x40
[   16.492087]  kasan_save_alloc_info+0x40/0x58
[   16.492125]  __kasan_krealloc+0x118/0x178
[   16.492161]  krealloc_noprof+0x128/0x360
[   16.492378]  krealloc_less_oob_helper+0x168/0xc50
[   16.492497]  krealloc_less_oob+0x20/0x38
[   16.492595]  kunit_try_run_case+0x170/0x3f0
[   16.492750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.492793]  kthread+0x328/0x630
[   16.492841]  ret_from_fork+0x10/0x20
[   16.493192] 
[   16.493263] The buggy address belongs to the object at fff00000c17c7800
[   16.493263]  which belongs to the cache kmalloc-256 of size 256
[   16.493433] The buggy address is located 34 bytes to the right of
[   16.493433]  allocated 201-byte region [fff00000c17c7800, fff00000c17c78c9)
[   16.493576] 
[   16.493670] The buggy address belongs to the physical page:
[   16.493700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6
[   16.493978] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.494095] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.494203] page_type: f5(slab)
[   16.494332] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.494457] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.494553] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.494601] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.494677] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff
[   16.495099] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.495191] page dumped because: kasan: bad access detected
[   16.495303] 
[   16.495352] Memory state around the buggy address:
[   16.495383]  fff00000c17c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495424]  fff00000c17c7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.495465] >fff00000c17c7880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.495501]                                                           ^
[   16.495808]  fff00000c17c7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495893]  fff00000c17c7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495965] ==================================================================
[   16.472805] ==================================================================
[   16.472860] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.472921] Write of size 1 at addr fff00000c17c78d0 by task kunit_try_catch/158
[   16.472997] 
[   16.473050] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.473153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.473179] Hardware name: linux,dummy-virt (DT)
[   16.473254] Call trace:
[   16.473304]  show_stack+0x20/0x38 (C)
[   16.473383]  dump_stack_lvl+0x8c/0xd0
[   16.473430]  print_report+0x118/0x5d0
[   16.473475]  kasan_report+0xdc/0x128
[   16.473637]  __asan_report_store1_noabort+0x20/0x30
[   16.473854]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.473909]  krealloc_less_oob+0x20/0x38
[   16.473953]  kunit_try_run_case+0x170/0x3f0
[   16.474051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.474103]  kthread+0x328/0x630
[   16.474166]  ret_from_fork+0x10/0x20
[   16.474264] 
[   16.474313] Allocated by task 158:
[   16.474361]  kasan_save_stack+0x3c/0x68
[   16.474414]  kasan_save_track+0x20/0x40
[   16.474522]  kasan_save_alloc_info+0x40/0x58
[   16.474579]  __kasan_krealloc+0x118/0x178
[   16.474616]  krealloc_noprof+0x128/0x360
[   16.474652]  krealloc_less_oob_helper+0x168/0xc50
[   16.474709]  krealloc_less_oob+0x20/0x38
[   16.474836]  kunit_try_run_case+0x170/0x3f0
[   16.474875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.475136]  kthread+0x328/0x630
[   16.475191]  ret_from_fork+0x10/0x20
[   16.475275] 
[   16.475884] The buggy address belongs to the object at fff00000c17c7800
[   16.475884]  which belongs to the cache kmalloc-256 of size 256
[   16.476050] The buggy address is located 7 bytes to the right of
[   16.476050]  allocated 201-byte region [fff00000c17c7800, fff00000c17c78c9)
[   16.476133] 
[   16.476153] The buggy address belongs to the physical page:
[   16.476182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6
[   16.476234] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.476279] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.476697] page_type: f5(slab)
[   16.476849] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.476964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.477432] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.477518] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.477638] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff
[   16.477696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.477901] page dumped because: kasan: bad access detected
[   16.478085] 
[   16.478197] Memory state around the buggy address:
[   16.478285]  fff00000c17c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478408]  fff00000c17c7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.478502] >fff00000c17c7880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.478613]                                                  ^
[   16.478801]  fff00000c17c7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478861]  fff00000c17c7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478897] ==================================================================
[   16.530785] ==================================================================
[   16.530848] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.530923] Write of size 1 at addr fff00000c76e20c9 by task kunit_try_catch/162
[   16.531035] 
[   16.531099] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.531336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.531485] Hardware name: linux,dummy-virt (DT)
[   16.531695] Call trace:
[   16.531820]  show_stack+0x20/0x38 (C)
[   16.531956]  dump_stack_lvl+0x8c/0xd0
[   16.532325]  print_report+0x118/0x5d0
[   16.532521]  kasan_report+0xdc/0x128
[   16.532594]  __asan_report_store1_noabort+0x20/0x30
[   16.532742]  krealloc_less_oob_helper+0xa48/0xc50
[   16.532828]  krealloc_large_less_oob+0x20/0x38
[   16.533019]  kunit_try_run_case+0x170/0x3f0
[   16.533079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.533613]  kthread+0x328/0x630
[   16.533752]  ret_from_fork+0x10/0x20
[   16.534029] 
[   16.534119] The buggy address belongs to the physical page:
[   16.534369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e0
[   16.534453] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.534693] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.535028] page_type: f8(unknown)
[   16.535102] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.535444] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.535552] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.535648] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.535723] head: 0bfffe0000000002 ffffc1ffc31db801 00000000ffffffff 00000000ffffffff
[   16.535922] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.536158] page dumped because: kasan: bad access detected
[   16.536293] 
[   16.536452] Memory state around the buggy address:
[   16.536537]  fff00000c76e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.536652]  fff00000c76e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.536695] >fff00000c76e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.536781]                                               ^
[   16.536981]  fff00000c76e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.537082]  fff00000c76e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.537259] ==================================================================
[   16.542572] ==================================================================
[   16.542614] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.542658] Write of size 1 at addr fff00000c76e20da by task kunit_try_catch/162
[   16.542704] 
[   16.542743] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.543239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.543283] Hardware name: linux,dummy-virt (DT)
[   16.543702] Call trace:
[   16.543775]  show_stack+0x20/0x38 (C)
[   16.543828]  dump_stack_lvl+0x8c/0xd0
[   16.543877]  print_report+0x118/0x5d0
[   16.544360]  kasan_report+0xdc/0x128
[   16.544597]  __asan_report_store1_noabort+0x20/0x30
[   16.544765]  krealloc_less_oob_helper+0xa80/0xc50
[   16.544845]  krealloc_large_less_oob+0x20/0x38
[   16.545213]  kunit_try_run_case+0x170/0x3f0
[   16.545363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.545530]  kthread+0x328/0x630
[   16.545634]  ret_from_fork+0x10/0x20
[   16.545696] 
[   16.545726] The buggy address belongs to the physical page:
[   16.546139] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e0
[   16.546414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.546602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.546728] page_type: f8(unknown)
[   16.546987] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.547080] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.547129] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.547570] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.547791] head: 0bfffe0000000002 ffffc1ffc31db801 00000000ffffffff 00000000ffffffff
[   16.547944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.548232] page dumped because: kasan: bad access detected
[   16.548383] 
[   16.548631] Memory state around the buggy address:
[   16.548774]  fff00000c76e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.548887]  fff00000c76e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.549276] >fff00000c76e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.549473]                                                     ^
[   16.549603]  fff00000c76e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.550251]  fff00000c76e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.550566] ==================================================================
[   16.466312] ==================================================================
[   16.467028] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.467102] Write of size 1 at addr fff00000c17c78c9 by task kunit_try_catch/158
[   16.467151] 
[   16.467186] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.467263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.467289] Hardware name: linux,dummy-virt (DT)
[   16.467320] Call trace:
[   16.467342]  show_stack+0x20/0x38 (C)
[   16.467389]  dump_stack_lvl+0x8c/0xd0
[   16.467434]  print_report+0x118/0x5d0
[   16.467479]  kasan_report+0xdc/0x128
[   16.467523]  __asan_report_store1_noabort+0x20/0x30
[   16.467572]  krealloc_less_oob_helper+0xa48/0xc50
[   16.467619]  krealloc_less_oob+0x20/0x38
[   16.467662]  kunit_try_run_case+0x170/0x3f0
[   16.467708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.467771]  kthread+0x328/0x630
[   16.467917]  ret_from_fork+0x10/0x20
[   16.467965] 
[   16.467983] Allocated by task 158:
[   16.468010]  kasan_save_stack+0x3c/0x68
[   16.468050]  kasan_save_track+0x20/0x40
[   16.468086]  kasan_save_alloc_info+0x40/0x58
[   16.468124]  __kasan_krealloc+0x118/0x178
[   16.468161]  krealloc_noprof+0x128/0x360
[   16.468196]  krealloc_less_oob_helper+0x168/0xc50
[   16.468526]  krealloc_less_oob+0x20/0x38
[   16.468589]  kunit_try_run_case+0x170/0x3f0
[   16.468705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.468846]  kthread+0x328/0x630
[   16.468926]  ret_from_fork+0x10/0x20
[   16.469012] 
[   16.469119] The buggy address belongs to the object at fff00000c17c7800
[   16.469119]  which belongs to the cache kmalloc-256 of size 256
[   16.469203] The buggy address is located 0 bytes to the right of
[   16.469203]  allocated 201-byte region [fff00000c17c7800, fff00000c17c78c9)
[   16.469341] 
[   16.469380] The buggy address belongs to the physical page:
[   16.469422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6
[   16.469474] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.469519] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.469863] page_type: f5(slab)
[   16.469973] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.470152] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.470256] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.470430] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.470561] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff
[   16.470694] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.470745] page dumped because: kasan: bad access detected
[   16.470837] 
[   16.471173] Memory state around the buggy address:
[   16.471254]  fff00000c17c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.471373]  fff00000c17c7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.471421] >fff00000c17c7880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.471484]                                               ^
[   16.471612]  fff00000c17c7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.471671]  fff00000c17c7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.471806] ==================================================================
[   16.538840] ==================================================================
[   16.538891] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.539109] Write of size 1 at addr fff00000c76e20d0 by task kunit_try_catch/162
[   16.539347] 
[   16.539484] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.539686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.539809] Hardware name: linux,dummy-virt (DT)
[   16.539927] Call trace:
[   16.539994]  show_stack+0x20/0x38 (C)
[   16.540085]  dump_stack_lvl+0x8c/0xd0
[   16.540342]  print_report+0x118/0x5d0
[   16.540897]  kasan_report+0xdc/0x128
[   16.541019]  __asan_report_store1_noabort+0x20/0x30
[   16.541083]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.541132]  krealloc_large_less_oob+0x20/0x38
[   16.541178]  kunit_try_run_case+0x170/0x3f0
[   16.541236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.541298]  kthread+0x328/0x630
[   16.541353]  ret_from_fork+0x10/0x20
[   16.541407] 
[   16.541441] The buggy address belongs to the physical page:
[   16.541472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e0
[   16.541536] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.541590] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.541640] page_type: f8(unknown)
[   16.541698] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.541762] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.541819] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.541880] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.541942] head: 0bfffe0000000002 ffffc1ffc31db801 00000000ffffffff 00000000ffffffff
[   16.541991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.542038] page dumped because: kasan: bad access detected
[   16.542076] 
[   16.542094] Memory state around the buggy address:
[   16.542133]  fff00000c76e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.542174]  fff00000c76e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.542229] >fff00000c76e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.542272]                                                  ^
[   16.542311]  fff00000c76e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.542354]  fff00000c76e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.542391] ==================================================================
[   16.561431] ==================================================================
[   16.561625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.561679] Write of size 1 at addr fff00000c76e20eb by task kunit_try_catch/162
[   16.561772] 
[   16.561811] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.561890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.561916] Hardware name: linux,dummy-virt (DT)
[   16.562180] Call trace:
[   16.562307]  show_stack+0x20/0x38 (C)
[   16.562432]  dump_stack_lvl+0x8c/0xd0
[   16.562483]  print_report+0x118/0x5d0
[   16.562529]  kasan_report+0xdc/0x128
[   16.562573]  __asan_report_store1_noabort+0x20/0x30
[   16.562631]  krealloc_less_oob_helper+0xa58/0xc50
[   16.562679]  krealloc_large_less_oob+0x20/0x38
[   16.562737]  kunit_try_run_case+0x170/0x3f0
[   16.562784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.562994]  kthread+0x328/0x630
[   16.563055]  ret_from_fork+0x10/0x20
[   16.563212] 
[   16.563243] The buggy address belongs to the physical page:
[   16.563274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e0
[   16.563697] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.563823] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.563963] page_type: f8(unknown)
[   16.564052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.564491] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.564641] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.564867] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.564962] head: 0bfffe0000000002 ffffc1ffc31db801 00000000ffffffff 00000000ffffffff
[   16.565144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.565341] page dumped because: kasan: bad access detected
[   16.565472] 
[   16.565504] Memory state around the buggy address:
[   16.565564]  fff00000c76e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.565623]  fff00000c76e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.565887] >fff00000c76e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.566140]                                                           ^
[   16.566278]  fff00000c76e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.566432]  fff00000c76e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.566510] ==================================================================
[   16.553154] ==================================================================
[   16.553205] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.553259] Write of size 1 at addr fff00000c76e20ea by task kunit_try_catch/162
[   16.553316] 
[   16.553351] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.553597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.553723] Hardware name: linux,dummy-virt (DT)
[   16.553840] Call trace:
[   16.554215]  show_stack+0x20/0x38 (C)
[   16.554278]  dump_stack_lvl+0x8c/0xd0
[   16.554388]  print_report+0x118/0x5d0
[   16.554463]  kasan_report+0xdc/0x128
[   16.554639]  __asan_report_store1_noabort+0x20/0x30
[   16.554692]  krealloc_less_oob_helper+0xae4/0xc50
[   16.554937]  krealloc_large_less_oob+0x20/0x38
[   16.555225]  kunit_try_run_case+0x170/0x3f0
[   16.555425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.555790]  kthread+0x328/0x630
[   16.555857]  ret_from_fork+0x10/0x20
[   16.556307] 
[   16.556395] The buggy address belongs to the physical page:
[   16.556429] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e0
[   16.556610] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.556861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.557074] page_type: f8(unknown)
[   16.557332] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.557678] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.557900] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558010] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558223] head: 0bfffe0000000002 ffffc1ffc31db801 00000000ffffffff 00000000ffffffff
[   16.558495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.558601] page dumped because: kasan: bad access detected
[   16.558633] 
[   16.558827] Memory state around the buggy address:
[   16.559131]  fff00000c76e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.559211]  fff00000c76e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.559253] >fff00000c76e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.559296]                                                           ^
[   16.559527]  fff00000c76e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559758]  fff00000c76e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559929] ==================================================================
[   16.485522] ==================================================================
[   16.485615] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.485669] Write of size 1 at addr fff00000c17c78ea by task kunit_try_catch/158
[   16.485729] 
[   16.485789] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.485906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.485932] Hardware name: linux,dummy-virt (DT)
[   16.486000] Call trace:
[   16.486047]  show_stack+0x20/0x38 (C)
[   16.486096]  dump_stack_lvl+0x8c/0xd0
[   16.486418]  print_report+0x118/0x5d0
[   16.486522]  kasan_report+0xdc/0x128
[   16.486587]  __asan_report_store1_noabort+0x20/0x30
[   16.486640]  krealloc_less_oob_helper+0xae4/0xc50
[   16.486740]  krealloc_less_oob+0x20/0x38
[   16.486815]  kunit_try_run_case+0x170/0x3f0
[   16.486878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.486963]  kthread+0x328/0x630
[   16.487007]  ret_from_fork+0x10/0x20
[   16.487072] 
[   16.487091] Allocated by task 158:
[   16.487120]  kasan_save_stack+0x3c/0x68
[   16.487399]  kasan_save_track+0x20/0x40
[   16.487507]  kasan_save_alloc_info+0x40/0x58
[   16.487642]  __kasan_krealloc+0x118/0x178
[   16.487702]  krealloc_noprof+0x128/0x360
[   16.487748]  krealloc_less_oob_helper+0x168/0xc50
[   16.487785]  krealloc_less_oob+0x20/0x38
[   16.487820]  kunit_try_run_case+0x170/0x3f0
[   16.487856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.487897]  kthread+0x328/0x630
[   16.487938]  ret_from_fork+0x10/0x20
[   16.487982] 
[   16.488000] The buggy address belongs to the object at fff00000c17c7800
[   16.488000]  which belongs to the cache kmalloc-256 of size 256
[   16.488056] The buggy address is located 33 bytes to the right of
[   16.488056]  allocated 201-byte region [fff00000c17c7800, fff00000c17c78c9)
[   16.488117] 
[   16.488136] The buggy address belongs to the physical page:
[   16.488166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6
[   16.488218] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.488263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.488313] page_type: f5(slab)
[   16.488350] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.488398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.488455] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.488514] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.488561] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff
[   16.488607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.488646] page dumped because: kasan: bad access detected
[   16.488683] 
[   16.488700] Memory state around the buggy address:
[   16.488741]  fff00000c17c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.488781]  fff00000c17c7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.488821] >fff00000c17c7880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.488880]                                                           ^
[   16.488917]  fff00000c17c7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.488957]  fff00000c17c7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.489314] ==================================================================

[   12.116177] ==================================================================
[   12.116553] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.117072] Write of size 1 at addr ffff888103a0e0ea by task kunit_try_catch/179
[   12.117377] 
[   12.117489] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.117549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.117560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.117579] Call Trace:
[   12.117594]  <TASK>
[   12.117609]  dump_stack_lvl+0x73/0xb0
[   12.117651]  print_report+0xd1/0x610
[   12.117673]  ? __virt_addr_valid+0x1db/0x2d0
[   12.117696]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.117720]  ? kasan_addr_to_slab+0x11/0xa0
[   12.117740]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.117763]  kasan_report+0x141/0x180
[   12.117784]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.117833]  __asan_report_store1_noabort+0x1b/0x30
[   12.117857]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.117883]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.117917]  ? finish_task_switch.isra.0+0x153/0x700
[   12.117939]  ? __switch_to+0x47/0xf50
[   12.117965]  ? __schedule+0x10cc/0x2b60
[   12.117997]  ? __pfx_read_tsc+0x10/0x10
[   12.118021]  krealloc_large_less_oob+0x1c/0x30
[   12.118043]  kunit_try_run_case+0x1a5/0x480
[   12.118067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.118088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.118112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.118134]  ? __kthread_parkme+0x82/0x180
[   12.118155]  ? preempt_count_sub+0x50/0x80
[   12.118177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.118200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.118223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.118246]  kthread+0x337/0x6f0
[   12.118265]  ? trace_preempt_on+0x20/0xc0
[   12.118287]  ? __pfx_kthread+0x10/0x10
[   12.118307]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.118351]  ? calculate_sigpending+0x7b/0xa0
[   12.118379]  ? __pfx_kthread+0x10/0x10
[   12.118400]  ret_from_fork+0x116/0x1d0
[   12.118418]  ? __pfx_kthread+0x10/0x10
[   12.118438]  ret_from_fork_asm+0x1a/0x30
[   12.118470]  </TASK>
[   12.118479] 
[   12.126021] The buggy address belongs to the physical page:
[   12.126285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.127565] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.127827] flags: 0x200000000000040(head|node=0|zone=2)
[   12.128084] page_type: f8(unknown)
[   12.128968] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.129390] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.130089] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.130674] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.131170] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.131973] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.132412] page dumped because: kasan: bad access detected
[   12.132832] 
[   12.132990] Memory state around the buggy address:
[   12.133200]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.133490]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.134148] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.134478]                                                           ^
[   12.135141]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.135809]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.136266] ==================================================================
[   12.096194] ==================================================================
[   12.096927] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.097321] Write of size 1 at addr ffff888103a0e0da by task kunit_try_catch/179
[   12.098121] 
[   12.098326] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.098370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.098381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.098400] Call Trace:
[   12.098418]  <TASK>
[   12.098435]  dump_stack_lvl+0x73/0xb0
[   12.098465]  print_report+0xd1/0x610
[   12.098488]  ? __virt_addr_valid+0x1db/0x2d0
[   12.098511]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.098534]  ? kasan_addr_to_slab+0x11/0xa0
[   12.098554]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.098578]  kasan_report+0x141/0x180
[   12.098599]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.098628]  __asan_report_store1_noabort+0x1b/0x30
[   12.098652]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.098698]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.098722]  ? finish_task_switch.isra.0+0x153/0x700
[   12.098745]  ? __switch_to+0x47/0xf50
[   12.098802]  ? __schedule+0x10cc/0x2b60
[   12.098824]  ? __pfx_read_tsc+0x10/0x10
[   12.098848]  krealloc_large_less_oob+0x1c/0x30
[   12.098871]  kunit_try_run_case+0x1a5/0x480
[   12.098906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.098927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.098951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.098975]  ? __kthread_parkme+0x82/0x180
[   12.099005]  ? preempt_count_sub+0x50/0x80
[   12.099029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.099052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.099075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.099098]  kthread+0x337/0x6f0
[   12.099116]  ? trace_preempt_on+0x20/0xc0
[   12.099140]  ? __pfx_kthread+0x10/0x10
[   12.099161]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.099184]  ? calculate_sigpending+0x7b/0xa0
[   12.099209]  ? __pfx_kthread+0x10/0x10
[   12.099230]  ret_from_fork+0x116/0x1d0
[   12.099248]  ? __pfx_kthread+0x10/0x10
[   12.099268]  ret_from_fork_asm+0x1a/0x30
[   12.099301]  </TASK>
[   12.099311] 
[   12.107551] The buggy address belongs to the physical page:
[   12.107728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.108124] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.108900] flags: 0x200000000000040(head|node=0|zone=2)
[   12.109347] page_type: f8(unknown)
[   12.109650] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.110459] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.110701] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.111380] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.112089] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.112866] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.113614] page dumped because: kasan: bad access detected
[   12.113803] 
[   12.113872] Memory state around the buggy address:
[   12.114050]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.114268]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.114478] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.114729]                                                     ^
[   12.114976]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.115275]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.115723] ==================================================================
[   11.919753] ==================================================================
[   11.920408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.921289] Write of size 1 at addr ffff888100355aea by task kunit_try_catch/175
[   11.921808] 
[   11.922219] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.922271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.922282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.922303] Call Trace:
[   11.922321]  <TASK>
[   11.922339]  dump_stack_lvl+0x73/0xb0
[   11.922368]  print_report+0xd1/0x610
[   11.922391]  ? __virt_addr_valid+0x1db/0x2d0
[   11.922414]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.922436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.922459]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.922482]  kasan_report+0x141/0x180
[   11.922504]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.922590]  __asan_report_store1_noabort+0x1b/0x30
[   11.922617]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.922643]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.922669]  ? __kasan_check_write+0x18/0x20
[   11.922688]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.922712]  ? irqentry_exit+0x2a/0x60
[   11.922734]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.922757]  ? trace_hardirqs_on+0x37/0xe0
[   11.922785]  ? __pfx_read_tsc+0x10/0x10
[   11.922809]  krealloc_less_oob+0x1c/0x30
[   11.922829]  kunit_try_run_case+0x1a5/0x480
[   11.922853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.922877]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.922911]  ? __kthread_parkme+0x82/0x180
[   11.922931]  ? preempt_count_sub+0x50/0x80
[   11.922956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.922979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.923003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.923026]  kthread+0x337/0x6f0
[   11.923044]  ? trace_preempt_on+0x20/0xc0
[   11.923065]  ? __pfx_kthread+0x10/0x10
[   11.923085]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.923106]  ? calculate_sigpending+0x7b/0xa0
[   11.923130]  ? __pfx_kthread+0x10/0x10
[   11.923151]  ret_from_fork+0x116/0x1d0
[   11.923169]  ? __pfx_kthread+0x10/0x10
[   11.923188]  ret_from_fork_asm+0x1a/0x30
[   11.923220]  </TASK>
[   11.923230] 
[   11.937192] Allocated by task 175:
[   11.937630]  kasan_save_stack+0x45/0x70
[   11.938036]  kasan_save_track+0x18/0x40
[   11.938326]  kasan_save_alloc_info+0x3b/0x50
[   11.938686]  __kasan_krealloc+0x190/0x1f0
[   11.938944]  krealloc_noprof+0xf3/0x340
[   11.939310]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.939480]  krealloc_less_oob+0x1c/0x30
[   11.939865]  kunit_try_run_case+0x1a5/0x480
[   11.940391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.941018]  kthread+0x337/0x6f0
[   11.941716]  ret_from_fork+0x116/0x1d0
[   11.941864]  ret_from_fork_asm+0x1a/0x30
[   11.942023] 
[   11.942096] The buggy address belongs to the object at ffff888100355a00
[   11.942096]  which belongs to the cache kmalloc-256 of size 256
[   11.942451] The buggy address is located 33 bytes to the right of
[   11.942451]  allocated 201-byte region [ffff888100355a00, ffff888100355ac9)
[   11.942823] 
[   11.942919] The buggy address belongs to the physical page:
[   11.943399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   11.944247] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.945095] flags: 0x200000000000040(head|node=0|zone=2)
[   11.945691] page_type: f5(slab)
[   11.946015] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.946750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.947808] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.948690] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.949437] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   11.950269] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.950860] page dumped because: kasan: bad access detected
[   11.951079] 
[   11.951254] Memory state around the buggy address:
[   11.951740]  ffff888100355980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.952462]  ffff888100355a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.952872] >ffff888100355a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.953357]                                                           ^
[   11.954207]  ffff888100355b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.954785]  ffff888100355b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.955077] ==================================================================
[   12.044395] ==================================================================
[   12.045279] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.045914] Write of size 1 at addr ffff888103a0e0c9 by task kunit_try_catch/179
[   12.046710] 
[   12.046824] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.046875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.046886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.046919] Call Trace:
[   12.046932]  <TASK>
[   12.046950]  dump_stack_lvl+0x73/0xb0
[   12.046983]  print_report+0xd1/0x610
[   12.047007]  ? __virt_addr_valid+0x1db/0x2d0
[   12.047031]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.047055]  ? kasan_addr_to_slab+0x11/0xa0
[   12.047075]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.047099]  kasan_report+0x141/0x180
[   12.047120]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.047149]  __asan_report_store1_noabort+0x1b/0x30
[   12.047174]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.047200]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.047223]  ? finish_task_switch.isra.0+0x153/0x700
[   12.047247]  ? __switch_to+0x47/0xf50
[   12.047274]  ? __schedule+0x10cc/0x2b60
[   12.047297]  ? __pfx_read_tsc+0x10/0x10
[   12.047322]  krealloc_large_less_oob+0x1c/0x30
[   12.047344]  kunit_try_run_case+0x1a5/0x480
[   12.047371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.047392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.047417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.047440]  ? __kthread_parkme+0x82/0x180
[   12.047461]  ? preempt_count_sub+0x50/0x80
[   12.047484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.047507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.047700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.047726]  kthread+0x337/0x6f0
[   12.047760]  ? trace_preempt_on+0x20/0xc0
[   12.047784]  ? __pfx_kthread+0x10/0x10
[   12.047804]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.047826]  ? calculate_sigpending+0x7b/0xa0
[   12.047851]  ? __pfx_kthread+0x10/0x10
[   12.047872]  ret_from_fork+0x116/0x1d0
[   12.047900]  ? __pfx_kthread+0x10/0x10
[   12.047921]  ret_from_fork_asm+0x1a/0x30
[   12.047956]  </TASK>
[   12.047970] 
[   12.059095] The buggy address belongs to the physical page:
[   12.059368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.059691] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.060849] flags: 0x200000000000040(head|node=0|zone=2)
[   12.061221] page_type: f8(unknown)
[   12.061364] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.062014] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.062429] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.062937] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.063403] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.063876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.064337] page dumped because: kasan: bad access detected
[   12.064967] 
[   12.065086] Memory state around the buggy address:
[   12.065407]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.065963]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.066305] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.066683]                                               ^
[   12.067130]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.067521]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.068074] ==================================================================
[   12.136846] ==================================================================
[   12.137522] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.137985] Write of size 1 at addr ffff888103a0e0eb by task kunit_try_catch/179
[   12.138592] 
[   12.138951] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.139002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.139014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.139041] Call Trace:
[   12.139058]  <TASK>
[   12.139075]  dump_stack_lvl+0x73/0xb0
[   12.139106]  print_report+0xd1/0x610
[   12.139129]  ? __virt_addr_valid+0x1db/0x2d0
[   12.139152]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.139176]  ? kasan_addr_to_slab+0x11/0xa0
[   12.139197]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.139221]  kasan_report+0x141/0x180
[   12.139242]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.139272]  __asan_report_store1_noabort+0x1b/0x30
[   12.139296]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.139322]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.139346]  ? finish_task_switch.isra.0+0x153/0x700
[   12.139369]  ? __switch_to+0x47/0xf50
[   12.139394]  ? __schedule+0x10cc/0x2b60
[   12.139416]  ? __pfx_read_tsc+0x10/0x10
[   12.139441]  krealloc_large_less_oob+0x1c/0x30
[   12.139463]  kunit_try_run_case+0x1a5/0x480
[   12.139488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.139509]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.139575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.139600]  ? __kthread_parkme+0x82/0x180
[   12.139621]  ? preempt_count_sub+0x50/0x80
[   12.139644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.139668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.139691]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.139715]  kthread+0x337/0x6f0
[   12.139734]  ? trace_preempt_on+0x20/0xc0
[   12.139757]  ? __pfx_kthread+0x10/0x10
[   12.139777]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.139798]  ? calculate_sigpending+0x7b/0xa0
[   12.139823]  ? __pfx_kthread+0x10/0x10
[   12.139843]  ret_from_fork+0x116/0x1d0
[   12.139862]  ? __pfx_kthread+0x10/0x10
[   12.139882]  ret_from_fork_asm+0x1a/0x30
[   12.139925]  </TASK>
[   12.139936] 
[   12.152951] The buggy address belongs to the physical page:
[   12.153369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.153873] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.154438] flags: 0x200000000000040(head|node=0|zone=2)
[   12.154819] page_type: f8(unknown)
[   12.155171] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.155498] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.156110] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.156447] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.157022] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.157616] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.158242] page dumped because: kasan: bad access detected
[   12.158466] 
[   12.158734] Memory state around the buggy address:
[   12.159068]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.159493]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.159911] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.160706]                                                           ^
[   12.161121]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.161654]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.162119] ==================================================================
[   11.841219] ==================================================================
[   11.841664] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.842140] Write of size 1 at addr ffff888100355ac9 by task kunit_try_catch/175
[   11.842439] 
[   11.842532] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.842577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.842588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.842609] Call Trace:
[   11.842621]  <TASK>
[   11.842636]  dump_stack_lvl+0x73/0xb0
[   11.842664]  print_report+0xd1/0x610
[   11.842686]  ? __virt_addr_valid+0x1db/0x2d0
[   11.842709]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.842733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.842755]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.842785]  kasan_report+0x141/0x180
[   11.842807]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.842836]  __asan_report_store1_noabort+0x1b/0x30
[   11.842860]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.842886]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.842924]  ? __kasan_check_write+0x18/0x20
[   11.842944]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.842968]  ? irqentry_exit+0x2a/0x60
[   11.842989]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.843013]  ? trace_hardirqs_on+0x37/0xe0
[   11.843036]  ? __pfx_read_tsc+0x10/0x10
[   11.843060]  krealloc_less_oob+0x1c/0x30
[   11.843081]  kunit_try_run_case+0x1a5/0x480
[   11.843105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.843129]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.843152]  ? __kthread_parkme+0x82/0x180
[   11.843173]  ? preempt_count_sub+0x50/0x80
[   11.843197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.843238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.843286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.843310]  kthread+0x337/0x6f0
[   11.843329]  ? trace_preempt_on+0x20/0xc0
[   11.843350]  ? __pfx_kthread+0x10/0x10
[   11.843370]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.843391]  ? calculate_sigpending+0x7b/0xa0
[   11.843414]  ? __pfx_kthread+0x10/0x10
[   11.843435]  ret_from_fork+0x116/0x1d0
[   11.843453]  ? __pfx_kthread+0x10/0x10
[   11.843473]  ret_from_fork_asm+0x1a/0x30
[   11.843505]  </TASK>
[   11.843515] 
[   11.851788] Allocated by task 175:
[   11.851980]  kasan_save_stack+0x45/0x70
[   11.852184]  kasan_save_track+0x18/0x40
[   11.852347]  kasan_save_alloc_info+0x3b/0x50
[   11.852719]  __kasan_krealloc+0x190/0x1f0
[   11.852928]  krealloc_noprof+0xf3/0x340
[   11.853096]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.853330]  krealloc_less_oob+0x1c/0x30
[   11.853495]  kunit_try_run_case+0x1a5/0x480
[   11.853762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.853957]  kthread+0x337/0x6f0
[   11.854140]  ret_from_fork+0x116/0x1d0
[   11.854326]  ret_from_fork_asm+0x1a/0x30
[   11.854496] 
[   11.854689] The buggy address belongs to the object at ffff888100355a00
[   11.854689]  which belongs to the cache kmalloc-256 of size 256
[   11.855306] The buggy address is located 0 bytes to the right of
[   11.855306]  allocated 201-byte region [ffff888100355a00, ffff888100355ac9)
[   11.855859] 
[   11.855970] The buggy address belongs to the physical page:
[   11.856198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   11.856502] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.856880] flags: 0x200000000000040(head|node=0|zone=2)
[   11.857127] page_type: f5(slab)
[   11.857252] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.857676] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.857996] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.858502] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.858819] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   11.859314] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.859674] page dumped because: kasan: bad access detected
[   11.859880] 
[   11.859960] Memory state around the buggy address:
[   11.860193]  ffff888100355980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.860536]  ffff888100355a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.860790] >ffff888100355a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.861145]                                               ^
[   11.861363]  ffff888100355b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.861577]  ffff888100355b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.861790] ==================================================================
[   11.955992] ==================================================================
[   11.956632] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.957213] Write of size 1 at addr ffff888100355aeb by task kunit_try_catch/175
[   11.957914] 
[   11.958171] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.958217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.958228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.958248] Call Trace:
[   11.958267]  <TASK>
[   11.958296]  dump_stack_lvl+0x73/0xb0
[   11.958325]  print_report+0xd1/0x610
[   11.958360]  ? __virt_addr_valid+0x1db/0x2d0
[   11.958382]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.958405]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.958427]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.958451]  kasan_report+0x141/0x180
[   11.958473]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.958502]  __asan_report_store1_noabort+0x1b/0x30
[   11.958526]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.958562]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.958587]  ? __kasan_check_write+0x18/0x20
[   11.958606]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.958629]  ? irqentry_exit+0x2a/0x60
[   11.958650]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.958674]  ? trace_hardirqs_on+0x37/0xe0
[   11.958697]  ? __pfx_read_tsc+0x10/0x10
[   11.958721]  krealloc_less_oob+0x1c/0x30
[   11.958741]  kunit_try_run_case+0x1a5/0x480
[   11.958771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.958794]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.958817]  ? __kthread_parkme+0x82/0x180
[   11.958837]  ? preempt_count_sub+0x50/0x80
[   11.958862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.958885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.958919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.958952]  kthread+0x337/0x6f0
[   11.958972]  ? trace_preempt_on+0x20/0xc0
[   11.958999]  ? __pfx_kthread+0x10/0x10
[   11.959019]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.959040]  ? calculate_sigpending+0x7b/0xa0
[   11.959064]  ? __pfx_kthread+0x10/0x10
[   11.959084]  ret_from_fork+0x116/0x1d0
[   11.959102]  ? __pfx_kthread+0x10/0x10
[   11.959122]  ret_from_fork_asm+0x1a/0x30
[   11.959154]  </TASK>
[   11.959163] 
[   11.970758] Allocated by task 175:
[   11.970999]  kasan_save_stack+0x45/0x70
[   11.971289]  kasan_save_track+0x18/0x40
[   11.971508]  kasan_save_alloc_info+0x3b/0x50
[   11.971740]  __kasan_krealloc+0x190/0x1f0
[   11.972013]  krealloc_noprof+0xf3/0x340
[   11.972150]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.972311]  krealloc_less_oob+0x1c/0x30
[   11.972449]  kunit_try_run_case+0x1a5/0x480
[   11.972595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.972878]  kthread+0x337/0x6f0
[   11.973189]  ret_from_fork+0x116/0x1d0
[   11.973380]  ret_from_fork_asm+0x1a/0x30
[   11.973644] 
[   11.973804] The buggy address belongs to the object at ffff888100355a00
[   11.973804]  which belongs to the cache kmalloc-256 of size 256
[   11.974236] The buggy address is located 34 bytes to the right of
[   11.974236]  allocated 201-byte region [ffff888100355a00, ffff888100355ac9)
[   11.974806] 
[   11.974970] The buggy address belongs to the physical page:
[   11.975225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   11.975612] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.976032] flags: 0x200000000000040(head|node=0|zone=2)
[   11.976244] page_type: f5(slab)
[   11.976510] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.976797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.977081] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.977452] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.977973] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   11.978207] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.978568] page dumped because: kasan: bad access detected
[   11.978836] 
[   11.978911] Memory state around the buggy address:
[   11.979362]  ffff888100355980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.979649]  ffff888100355a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.979956] >ffff888100355a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.980325]                                                           ^
[   11.980674]  ffff888100355b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.980947]  ffff888100355b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.981318] ==================================================================
[   11.885496] ==================================================================
[   11.886288] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.887194] Write of size 1 at addr ffff888100355ada by task kunit_try_catch/175
[   11.888002] 
[   11.888385] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.888434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.888445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.888472] Call Trace:
[   11.888488]  <TASK>
[   11.888504]  dump_stack_lvl+0x73/0xb0
[   11.888532]  print_report+0xd1/0x610
[   11.888554]  ? __virt_addr_valid+0x1db/0x2d0
[   11.888577]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.888600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.888622]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.888646]  kasan_report+0x141/0x180
[   11.888667]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.888696]  __asan_report_store1_noabort+0x1b/0x30
[   11.888728]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.888754]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.888780]  ? __kasan_check_write+0x18/0x20
[   11.888799]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.888822]  ? irqentry_exit+0x2a/0x60
[   11.888843]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.888867]  ? trace_hardirqs_on+0x37/0xe0
[   11.888890]  ? __pfx_read_tsc+0x10/0x10
[   11.888924]  krealloc_less_oob+0x1c/0x30
[   11.888945]  kunit_try_run_case+0x1a5/0x480
[   11.888968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.888992]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.889015]  ? __kthread_parkme+0x82/0x180
[   11.889035]  ? preempt_count_sub+0x50/0x80
[   11.889059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.889082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.889106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.889129]  kthread+0x337/0x6f0
[   11.889147]  ? trace_preempt_on+0x20/0xc0
[   11.889168]  ? __pfx_kthread+0x10/0x10
[   11.889188]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.889211]  ? calculate_sigpending+0x7b/0xa0
[   11.889235]  ? __pfx_kthread+0x10/0x10
[   11.889256]  ret_from_fork+0x116/0x1d0
[   11.889274]  ? __pfx_kthread+0x10/0x10
[   11.889293]  ret_from_fork_asm+0x1a/0x30
[   11.889325]  </TASK>
[   11.889334] 
[   11.902908] Allocated by task 175:
[   11.903350]  kasan_save_stack+0x45/0x70
[   11.903802]  kasan_save_track+0x18/0x40
[   11.903957]  kasan_save_alloc_info+0x3b/0x50
[   11.904389]  __kasan_krealloc+0x190/0x1f0
[   11.904850]  krealloc_noprof+0xf3/0x340
[   11.905316]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.905485]  krealloc_less_oob+0x1c/0x30
[   11.905924]  kunit_try_run_case+0x1a5/0x480
[   11.906411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.907004]  kthread+0x337/0x6f0
[   11.907220]  ret_from_fork+0x116/0x1d0
[   11.907356]  ret_from_fork_asm+0x1a/0x30
[   11.907495] 
[   11.907827] The buggy address belongs to the object at ffff888100355a00
[   11.907827]  which belongs to the cache kmalloc-256 of size 256
[   11.909128] The buggy address is located 17 bytes to the right of
[   11.909128]  allocated 201-byte region [ffff888100355a00, ffff888100355ac9)
[   11.910270] 
[   11.910346] The buggy address belongs to the physical page:
[   11.910526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   11.910774] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.911034] flags: 0x200000000000040(head|node=0|zone=2)
[   11.911623] page_type: f5(slab)
[   11.911930] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.912415] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.913223] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.913701] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.914205] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   11.914692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.914988] page dumped because: kasan: bad access detected
[   11.915522] 
[   11.915623] Memory state around the buggy address:
[   11.915815]  ffff888100355980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.916404]  ffff888100355a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.916886] >ffff888100355a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.917474]                                                     ^
[   11.918064]  ffff888100355b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.918377]  ffff888100355b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.919091] ==================================================================
[   11.862256] ==================================================================
[   11.863010] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.863745] Write of size 1 at addr ffff888100355ad0 by task kunit_try_catch/175
[   11.864004] 
[   11.864117] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.864159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.864169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.864189] Call Trace:
[   11.864203]  <TASK>
[   11.864219]  dump_stack_lvl+0x73/0xb0
[   11.864247]  print_report+0xd1/0x610
[   11.864268]  ? __virt_addr_valid+0x1db/0x2d0
[   11.864291]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.864314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.864337]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.864361]  kasan_report+0x141/0x180
[   11.864382]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.864411]  __asan_report_store1_noabort+0x1b/0x30
[   11.864436]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.864462]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.864488]  ? __kasan_check_write+0x18/0x20
[   11.864506]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.864573]  ? irqentry_exit+0x2a/0x60
[   11.864596]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.864620]  ? trace_hardirqs_on+0x37/0xe0
[   11.864644]  ? __pfx_read_tsc+0x10/0x10
[   11.864668]  krealloc_less_oob+0x1c/0x30
[   11.864690]  kunit_try_run_case+0x1a5/0x480
[   11.864713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.864737]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.864761]  ? __kthread_parkme+0x82/0x180
[   11.864782]  ? preempt_count_sub+0x50/0x80
[   11.864806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.864829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.864853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.864876]  kthread+0x337/0x6f0
[   11.864906]  ? trace_preempt_on+0x20/0xc0
[   11.864928]  ? __pfx_kthread+0x10/0x10
[   11.864948]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.864968]  ? calculate_sigpending+0x7b/0xa0
[   11.865000]  ? __pfx_kthread+0x10/0x10
[   11.865021]  ret_from_fork+0x116/0x1d0
[   11.865039]  ? __pfx_kthread+0x10/0x10
[   11.865059]  ret_from_fork_asm+0x1a/0x30
[   11.865091]  </TASK>
[   11.865101] 
[   11.873205] Allocated by task 175:
[   11.873401]  kasan_save_stack+0x45/0x70
[   11.873728]  kasan_save_track+0x18/0x40
[   11.873914]  kasan_save_alloc_info+0x3b/0x50
[   11.874103]  __kasan_krealloc+0x190/0x1f0
[   11.874287]  krealloc_noprof+0xf3/0x340
[   11.874479]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.874858]  krealloc_less_oob+0x1c/0x30
[   11.875106]  kunit_try_run_case+0x1a5/0x480
[   11.875291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.875527]  kthread+0x337/0x6f0
[   11.875695]  ret_from_fork+0x116/0x1d0
[   11.875860]  ret_from_fork_asm+0x1a/0x30
[   11.876083] 
[   11.876158] The buggy address belongs to the object at ffff888100355a00
[   11.876158]  which belongs to the cache kmalloc-256 of size 256
[   11.876664] The buggy address is located 7 bytes to the right of
[   11.876664]  allocated 201-byte region [ffff888100355a00, ffff888100355ac9)
[   11.877046] 
[   11.877117] The buggy address belongs to the physical page:
[   11.877290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   11.877530] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.877759] flags: 0x200000000000040(head|node=0|zone=2)
[   11.878055] page_type: f5(slab)
[   11.878225] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.878623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.878987] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.879329] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.879804] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   11.880205] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.880515] page dumped because: kasan: bad access detected
[   11.880741] 
[   11.880809] Memory state around the buggy address:
[   11.881142]  ffff888100355980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.881374]  ffff888100355a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.881878] >ffff888100355a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.882551]                                                  ^
[   11.882786]  ffff888100355b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.883872]  ffff888100355b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.884173] ==================================================================
[   12.069086] ==================================================================
[   12.069716] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.070419] Write of size 1 at addr ffff888103a0e0d0 by task kunit_try_catch/179
[   12.070668] 
[   12.070769] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.070812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.070823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.070843] Call Trace:
[   12.070858]  <TASK>
[   12.070875]  dump_stack_lvl+0x73/0xb0
[   12.070918]  print_report+0xd1/0x610
[   12.070940]  ? __virt_addr_valid+0x1db/0x2d0
[   12.070963]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.070986]  ? kasan_addr_to_slab+0x11/0xa0
[   12.071006]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.071030]  kasan_report+0x141/0x180
[   12.071051]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.071080]  __asan_report_store1_noabort+0x1b/0x30
[   12.071104]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.071130]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.071154]  ? finish_task_switch.isra.0+0x153/0x700
[   12.071176]  ? __switch_to+0x47/0xf50
[   12.071201]  ? __schedule+0x10cc/0x2b60
[   12.071223]  ? __pfx_read_tsc+0x10/0x10
[   12.071246]  krealloc_large_less_oob+0x1c/0x30
[   12.071268]  kunit_try_run_case+0x1a5/0x480
[   12.071292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.071314]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.071337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.071360]  ? __kthread_parkme+0x82/0x180
[   12.071380]  ? preempt_count_sub+0x50/0x80
[   12.071402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.071425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.071448]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.071471]  kthread+0x337/0x6f0
[   12.071490]  ? trace_preempt_on+0x20/0xc0
[   12.071513]  ? __pfx_kthread+0x10/0x10
[   12.071533]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.071553]  ? calculate_sigpending+0x7b/0xa0
[   12.071576]  ? __pfx_kthread+0x10/0x10
[   12.071597]  ret_from_fork+0x116/0x1d0
[   12.071615]  ? __pfx_kthread+0x10/0x10
[   12.071634]  ret_from_fork_asm+0x1a/0x30
[   12.071666]  </TASK>
[   12.071675] 
[   12.085255] The buggy address belongs to the physical page:
[   12.085501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.086398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.086961] flags: 0x200000000000040(head|node=0|zone=2)
[   12.087505] page_type: f8(unknown)
[   12.087868] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.088449] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.088758] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.089368] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.090039] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.090628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.091210] page dumped because: kasan: bad access detected
[   12.091763] 
[   12.091833] Memory state around the buggy address:
[   12.092021]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.092233]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.092441] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.093017]                                                  ^
[   12.093718]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.094519]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.095279] ==================================================================

[   11.880369] ==================================================================
[   11.881311] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.881767] Write of size 1 at addr ffff88810282a0ea by task kunit_try_catch/180
[   11.882073] 
[   11.882180] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.882219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.882229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.882248] Call Trace:
[   11.882261]  <TASK>
[   11.882275]  dump_stack_lvl+0x73/0xb0
[   11.882301]  print_report+0xd1/0x610
[   11.882322]  ? __virt_addr_valid+0x1db/0x2d0
[   11.882345]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.882368]  ? kasan_addr_to_slab+0x11/0xa0
[   11.882397]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.882421]  kasan_report+0x141/0x180
[   11.882452]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.882481]  __asan_report_store1_noabort+0x1b/0x30
[   11.882507]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.882533]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.882558]  ? finish_task_switch.isra.0+0x153/0x700
[   11.882581]  ? __switch_to+0x47/0xf50
[   11.882607]  ? __schedule+0x10cc/0x2b60
[   11.882629]  ? __pfx_read_tsc+0x10/0x10
[   11.882653]  krealloc_large_less_oob+0x1c/0x30
[   11.882676]  kunit_try_run_case+0x1a5/0x480
[   11.882700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.882722]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.882745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.882768]  ? __kthread_parkme+0x82/0x180
[   11.882788]  ? preempt_count_sub+0x50/0x80
[   11.882812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.882835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.882860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.882883]  kthread+0x337/0x6f0
[   11.882902]  ? trace_preempt_on+0x20/0xc0
[   11.882926]  ? __pfx_kthread+0x10/0x10
[   11.882946]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.882967]  ? calculate_sigpending+0x7b/0xa0
[   11.882990]  ? __pfx_kthread+0x10/0x10
[   11.883011]  ret_from_fork+0x116/0x1d0
[   11.883029]  ? __pfx_kthread+0x10/0x10
[   11.883049]  ret_from_fork_asm+0x1a/0x30
[   11.883081]  </TASK>
[   11.883091] 
[   11.895003] The buggy address belongs to the physical page:
[   11.895263] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102828
[   11.896228] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.896752] flags: 0x200000000000040(head|node=0|zone=2)
[   11.897030] page_type: f8(unknown)
[   11.897200] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.897963] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.898286] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.898924] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.899425] head: 0200000000000002 ffffea00040a0a01 00000000ffffffff 00000000ffffffff
[   11.899995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.900475] page dumped because: kasan: bad access detected
[   11.900909] 
[   11.901014] Memory state around the buggy address:
[   11.901244]  ffff888102829f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.901967]  ffff88810282a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.902505] >ffff88810282a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.902806]                                                           ^
[   11.903366]  ffff88810282a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.903941]  ffff88810282a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.904506] ==================================================================
[   11.741256] ==================================================================
[   11.741529] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.741998] Write of size 1 at addr ffff88810034e2eb by task kunit_try_catch/176
[   11.742315] 
[   11.742484] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.742528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.742538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.742580] Call Trace:
[   11.742595]  <TASK>
[   11.742609]  dump_stack_lvl+0x73/0xb0
[   11.742637]  print_report+0xd1/0x610
[   11.742673]  ? __virt_addr_valid+0x1db/0x2d0
[   11.742708]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.742731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.742753]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.742776]  kasan_report+0x141/0x180
[   11.742798]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.742826]  __asan_report_store1_noabort+0x1b/0x30
[   11.742850]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.742876]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.742900]  ? irqentry_exit+0x2a/0x60
[   11.742920]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.742950]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.742975]  krealloc_less_oob+0x1c/0x30
[   11.742996]  kunit_try_run_case+0x1a5/0x480
[   11.743018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.743039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.743062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.743101]  ? __kthread_parkme+0x82/0x180
[   11.743121]  ? preempt_count_sub+0x50/0x80
[   11.743158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.743181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.743218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.743254]  kthread+0x337/0x6f0
[   11.743272]  ? trace_preempt_on+0x20/0xc0
[   11.743294]  ? __pfx_kthread+0x10/0x10
[   11.743326]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.743347]  ? calculate_sigpending+0x7b/0xa0
[   11.743384]  ? __pfx_kthread+0x10/0x10
[   11.743405]  ret_from_fork+0x116/0x1d0
[   11.743601]  ? __pfx_kthread+0x10/0x10
[   11.743627]  ret_from_fork_asm+0x1a/0x30
[   11.743658]  </TASK>
[   11.743667] 
[   11.751330] Allocated by task 176:
[   11.751522]  kasan_save_stack+0x45/0x70
[   11.751717]  kasan_save_track+0x18/0x40
[   11.752222]  kasan_save_alloc_info+0x3b/0x50
[   11.752506]  __kasan_krealloc+0x190/0x1f0
[   11.752719]  krealloc_noprof+0xf3/0x340
[   11.752962]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.753214]  krealloc_less_oob+0x1c/0x30
[   11.753497]  kunit_try_run_case+0x1a5/0x480
[   11.753731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.753945]  kthread+0x337/0x6f0
[   11.754061]  ret_from_fork+0x116/0x1d0
[   11.754190]  ret_from_fork_asm+0x1a/0x30
[   11.754357] 
[   11.754459] The buggy address belongs to the object at ffff88810034e200
[   11.754459]  which belongs to the cache kmalloc-256 of size 256
[   11.755031] The buggy address is located 34 bytes to the right of
[   11.755031]  allocated 201-byte region [ffff88810034e200, ffff88810034e2c9)
[   11.755803] 
[   11.755883] The buggy address belongs to the physical page:
[   11.756052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034e
[   11.756286] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.756605] flags: 0x200000000000040(head|node=0|zone=2)
[   11.756843] page_type: f5(slab)
[   11.757107] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.757557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.757898] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.758253] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.758664] head: 0200000000000001 ffffea000400d381 00000000ffffffff 00000000ffffffff
[   11.759003] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.759333] page dumped because: kasan: bad access detected
[   11.759764] 
[   11.759921] Memory state around the buggy address:
[   11.760074]  ffff88810034e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.760283]  ffff88810034e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.760799] >ffff88810034e280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.761150]                                                           ^
[   11.761482]  ffff88810034e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.761877]  ffff88810034e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.762181] ==================================================================
[   11.717339] ==================================================================
[   11.717796] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.718129] Write of size 1 at addr ffff88810034e2ea by task kunit_try_catch/176
[   11.718359] 
[   11.718623] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.718680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.718692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.718711] Call Trace:
[   11.718725]  <TASK>
[   11.718740]  dump_stack_lvl+0x73/0xb0
[   11.718767]  print_report+0xd1/0x610
[   11.718919]  ? __virt_addr_valid+0x1db/0x2d0
[   11.718942]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.718976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.718998]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.719022]  kasan_report+0x141/0x180
[   11.719055]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.719085]  __asan_report_store1_noabort+0x1b/0x30
[   11.719111]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.719138]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.719160]  ? irqentry_exit+0x2a/0x60
[   11.719190]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.719220]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.719256]  krealloc_less_oob+0x1c/0x30
[   11.719277]  kunit_try_run_case+0x1a5/0x480
[   11.719301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.719322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.719345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.719368]  ? __kthread_parkme+0x82/0x180
[   11.719387]  ? preempt_count_sub+0x50/0x80
[   11.719428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.719461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.719484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.719508]  kthread+0x337/0x6f0
[   11.719526]  ? trace_preempt_on+0x20/0xc0
[   11.719618]  ? __pfx_kthread+0x10/0x10
[   11.719656]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.719677]  ? calculate_sigpending+0x7b/0xa0
[   11.719700]  ? __pfx_kthread+0x10/0x10
[   11.719721]  ret_from_fork+0x116/0x1d0
[   11.719748]  ? __pfx_kthread+0x10/0x10
[   11.719768]  ret_from_fork_asm+0x1a/0x30
[   11.719811]  </TASK>
[   11.719821] 
[   11.728191] Allocated by task 176:
[   11.728333]  kasan_save_stack+0x45/0x70
[   11.728489]  kasan_save_track+0x18/0x40
[   11.728673]  kasan_save_alloc_info+0x3b/0x50
[   11.728880]  __kasan_krealloc+0x190/0x1f0
[   11.729249]  krealloc_noprof+0xf3/0x340
[   11.729450]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.729616]  krealloc_less_oob+0x1c/0x30
[   11.729754]  kunit_try_run_case+0x1a5/0x480
[   11.730092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.730368]  kthread+0x337/0x6f0
[   11.730668]  ret_from_fork+0x116/0x1d0
[   11.730897]  ret_from_fork_asm+0x1a/0x30
[   11.731097] 
[   11.731167] The buggy address belongs to the object at ffff88810034e200
[   11.731167]  which belongs to the cache kmalloc-256 of size 256
[   11.731925] The buggy address is located 33 bytes to the right of
[   11.731925]  allocated 201-byte region [ffff88810034e200, ffff88810034e2c9)
[   11.732652] 
[   11.732767] The buggy address belongs to the physical page:
[   11.732987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034e
[   11.733314] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.733555] flags: 0x200000000000040(head|node=0|zone=2)
[   11.733732] page_type: f5(slab)
[   11.733851] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.734424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.734919] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.735222] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.735614] head: 0200000000000001 ffffea000400d381 00000000ffffffff 00000000ffffffff
[   11.736024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.736366] page dumped because: kasan: bad access detected
[   11.736747] 
[   11.736864] Memory state around the buggy address:
[   11.737051]  ffff88810034e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.737343]  ffff88810034e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.738765] >ffff88810034e280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.739113]                                                           ^
[   11.739385]  ffff88810034e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.740520]  ffff88810034e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.740826] ==================================================================
[   11.841047] ==================================================================
[   11.841518] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.841949] Write of size 1 at addr ffff88810282a0d0 by task kunit_try_catch/180
[   11.842286] 
[   11.842482] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.842569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.842580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.842599] Call Trace:
[   11.842610]  <TASK>
[   11.842635]  dump_stack_lvl+0x73/0xb0
[   11.842665]  print_report+0xd1/0x610
[   11.842688]  ? __virt_addr_valid+0x1db/0x2d0
[   11.842712]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.842735]  ? kasan_addr_to_slab+0x11/0xa0
[   11.842782]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.842807]  kasan_report+0x141/0x180
[   11.842829]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.842869]  __asan_report_store1_noabort+0x1b/0x30
[   11.842894]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.842920]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.842944]  ? finish_task_switch.isra.0+0x153/0x700
[   11.842966]  ? __switch_to+0x47/0xf50
[   11.842992]  ? __schedule+0x10cc/0x2b60
[   11.843040]  ? __pfx_read_tsc+0x10/0x10
[   11.843065]  krealloc_large_less_oob+0x1c/0x30
[   11.843088]  kunit_try_run_case+0x1a5/0x480
[   11.843123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.843144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.843168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.843217]  ? __kthread_parkme+0x82/0x180
[   11.843238]  ? preempt_count_sub+0x50/0x80
[   11.843261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.843294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.843318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.843341]  kthread+0x337/0x6f0
[   11.843360]  ? trace_preempt_on+0x20/0xc0
[   11.843382]  ? __pfx_kthread+0x10/0x10
[   11.843401]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.843445]  ? calculate_sigpending+0x7b/0xa0
[   11.843469]  ? __pfx_kthread+0x10/0x10
[   11.843490]  ret_from_fork+0x116/0x1d0
[   11.843508]  ? __pfx_kthread+0x10/0x10
[   11.843528]  ret_from_fork_asm+0x1a/0x30
[   11.843603]  </TASK>
[   11.843613] 
[   11.852316] The buggy address belongs to the physical page:
[   11.852818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102828
[   11.853231] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.853742] flags: 0x200000000000040(head|node=0|zone=2)
[   11.854041] page_type: f8(unknown)
[   11.854206] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.854680] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.855024] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.855475] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.855909] head: 0200000000000002 ffffea00040a0a01 00000000ffffffff 00000000ffffffff
[   11.856256] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.856799] page dumped because: kasan: bad access detected
[   11.857078] 
[   11.857214] Memory state around the buggy address:
[   11.857574]  ffff888102829f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.857915]  ffff88810282a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.858257] >ffff88810282a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.858698]                                                  ^
[   11.859014]  ffff88810282a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.859334]  ffff88810282a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.859746] ==================================================================
[   11.819341] ==================================================================
[   11.820735] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.821349] Write of size 1 at addr ffff88810282a0c9 by task kunit_try_catch/180
[   11.822103] 
[   11.822313] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.822372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.822383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.822404] Call Trace:
[   11.822415]  <TASK>
[   11.822429]  dump_stack_lvl+0x73/0xb0
[   11.822468]  print_report+0xd1/0x610
[   11.822490]  ? __virt_addr_valid+0x1db/0x2d0
[   11.822512]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.822537]  ? kasan_addr_to_slab+0x11/0xa0
[   11.822645]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.822671]  kasan_report+0x141/0x180
[   11.822706]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.822735]  __asan_report_store1_noabort+0x1b/0x30
[   11.822760]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.822786]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.822809]  ? finish_task_switch.isra.0+0x153/0x700
[   11.822832]  ? __switch_to+0x47/0xf50
[   11.822857]  ? __schedule+0x10cc/0x2b60
[   11.822879]  ? __pfx_read_tsc+0x10/0x10
[   11.822902]  krealloc_large_less_oob+0x1c/0x30
[   11.822924]  kunit_try_run_case+0x1a5/0x480
[   11.822949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.822970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.822993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.823016]  ? __kthread_parkme+0x82/0x180
[   11.823036]  ? preempt_count_sub+0x50/0x80
[   11.823058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.823081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.823104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.823128]  kthread+0x337/0x6f0
[   11.823146]  ? trace_preempt_on+0x20/0xc0
[   11.823168]  ? __pfx_kthread+0x10/0x10
[   11.823187]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.823208]  ? calculate_sigpending+0x7b/0xa0
[   11.823231]  ? __pfx_kthread+0x10/0x10
[   11.823251]  ret_from_fork+0x116/0x1d0
[   11.823269]  ? __pfx_kthread+0x10/0x10
[   11.823288]  ret_from_fork_asm+0x1a/0x30
[   11.823319]  </TASK>
[   11.823329] 
[   11.832545] The buggy address belongs to the physical page:
[   11.832990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102828
[   11.833489] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.833887] flags: 0x200000000000040(head|node=0|zone=2)
[   11.834322] page_type: f8(unknown)
[   11.834564] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.834845] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.835297] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.835824] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.836211] head: 0200000000000002 ffffea00040a0a01 00000000ffffffff 00000000ffffffff
[   11.836555] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.837146] page dumped because: kasan: bad access detected
[   11.837388] 
[   11.837479] Memory state around the buggy address:
[   11.837887]  ffff888102829f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.838167]  ffff88810282a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.838671] >ffff88810282a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.839009]                                               ^
[   11.839300]  ffff88810282a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.839706]  ffff88810282a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.840047] ==================================================================
[   11.860103] ==================================================================
[   11.860356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.861013] Write of size 1 at addr ffff88810282a0da by task kunit_try_catch/180
[   11.861268] 
[   11.861353] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.861481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.861496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.861562] Call Trace:
[   11.861577]  <TASK>
[   11.861606]  dump_stack_lvl+0x73/0xb0
[   11.861670]  print_report+0xd1/0x610
[   11.861692]  ? __virt_addr_valid+0x1db/0x2d0
[   11.861713]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.861747]  ? kasan_addr_to_slab+0x11/0xa0
[   11.861767]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.861792]  kasan_report+0x141/0x180
[   11.861815]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.861844]  __asan_report_store1_noabort+0x1b/0x30
[   11.861868]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.861894]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.861918]  ? finish_task_switch.isra.0+0x153/0x700
[   11.861940]  ? __switch_to+0x47/0xf50
[   11.861965]  ? __schedule+0x10cc/0x2b60
[   11.861986]  ? __pfx_read_tsc+0x10/0x10
[   11.862009]  krealloc_large_less_oob+0x1c/0x30
[   11.862032]  kunit_try_run_case+0x1a5/0x480
[   11.862055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.862076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.862099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.862122]  ? __kthread_parkme+0x82/0x180
[   11.862141]  ? preempt_count_sub+0x50/0x80
[   11.862164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.862187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.862210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.862233]  kthread+0x337/0x6f0
[   11.862252]  ? trace_preempt_on+0x20/0xc0
[   11.862274]  ? __pfx_kthread+0x10/0x10
[   11.862294]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.862314]  ? calculate_sigpending+0x7b/0xa0
[   11.862338]  ? __pfx_kthread+0x10/0x10
[   11.862359]  ret_from_fork+0x116/0x1d0
[   11.862377]  ? __pfx_kthread+0x10/0x10
[   11.862484]  ret_from_fork_asm+0x1a/0x30
[   11.862547]  </TASK>
[   11.862558] 
[   11.871820] The buggy address belongs to the physical page:
[   11.872125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102828
[   11.872825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.873154] flags: 0x200000000000040(head|node=0|zone=2)
[   11.873808] page_type: f8(unknown)
[   11.874049] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.874338] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.874952] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.875336] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.875824] head: 0200000000000002 ffffea00040a0a01 00000000ffffffff 00000000ffffffff
[   11.876197] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.876738] page dumped because: kasan: bad access detected
[   11.877048] 
[   11.877148] Memory state around the buggy address:
[   11.877657]  ffff888102829f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.877966]  ffff88810282a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.878323] >ffff88810282a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.878811]                                                     ^
[   11.879111]  ffff88810282a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.879585]  ffff88810282a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.879892] ==================================================================
[   11.671371] ==================================================================
[   11.671806] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.672086] Write of size 1 at addr ffff88810034e2d0 by task kunit_try_catch/176
[   11.672406] 
[   11.672805] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.672848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.672858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.672877] Call Trace:
[   11.672888]  <TASK>
[   11.672901]  dump_stack_lvl+0x73/0xb0
[   11.672927]  print_report+0xd1/0x610
[   11.672947]  ? __virt_addr_valid+0x1db/0x2d0
[   11.672968]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.672991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.673012]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.673036]  kasan_report+0x141/0x180
[   11.673057]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.673087]  __asan_report_store1_noabort+0x1b/0x30
[   11.673111]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.673141]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.673163]  ? irqentry_exit+0x2a/0x60
[   11.673184]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.673213]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.673239]  krealloc_less_oob+0x1c/0x30
[   11.673260]  kunit_try_run_case+0x1a5/0x480
[   11.673283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.673304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.673327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.673350]  ? __kthread_parkme+0x82/0x180
[   11.673369]  ? preempt_count_sub+0x50/0x80
[   11.673393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.673455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.673479]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.673503]  kthread+0x337/0x6f0
[   11.673521]  ? trace_preempt_on+0x20/0xc0
[   11.673543]  ? __pfx_kthread+0x10/0x10
[   11.673562]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.673583]  ? calculate_sigpending+0x7b/0xa0
[   11.673606]  ? __pfx_kthread+0x10/0x10
[   11.673627]  ret_from_fork+0x116/0x1d0
[   11.673645]  ? __pfx_kthread+0x10/0x10
[   11.673686]  ret_from_fork_asm+0x1a/0x30
[   11.673718]  </TASK>
[   11.673727] 
[   11.682699] Allocated by task 176:
[   11.682901]  kasan_save_stack+0x45/0x70
[   11.683141]  kasan_save_track+0x18/0x40
[   11.683279]  kasan_save_alloc_info+0x3b/0x50
[   11.683449]  __kasan_krealloc+0x190/0x1f0
[   11.683716]  krealloc_noprof+0xf3/0x340
[   11.683914]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.684161]  krealloc_less_oob+0x1c/0x30
[   11.684567]  kunit_try_run_case+0x1a5/0x480
[   11.684800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.685021]  kthread+0x337/0x6f0
[   11.685179]  ret_from_fork+0x116/0x1d0
[   11.685311]  ret_from_fork_asm+0x1a/0x30
[   11.685656] 
[   11.685767] The buggy address belongs to the object at ffff88810034e200
[   11.685767]  which belongs to the cache kmalloc-256 of size 256
[   11.686469] The buggy address is located 7 bytes to the right of
[   11.686469]  allocated 201-byte region [ffff88810034e200, ffff88810034e2c9)
[   11.686885] 
[   11.686958] The buggy address belongs to the physical page:
[   11.687207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034e
[   11.687699] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.688063] flags: 0x200000000000040(head|node=0|zone=2)
[   11.688302] page_type: f5(slab)
[   11.688639] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.688969] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.689308] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.689918] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.690237] head: 0200000000000001 ffffea000400d381 00000000ffffffff 00000000ffffffff
[   11.690675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.690987] page dumped because: kasan: bad access detected
[   11.691263] 
[   11.691385] Memory state around the buggy address:
[   11.691744]  ffff88810034e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.691972]  ffff88810034e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.692369] >ffff88810034e280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.692721]                                                  ^
[   11.693065]  ffff88810034e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.693587]  ffff88810034e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.693967] ==================================================================
[   11.694759] ==================================================================
[   11.695173] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.695566] Write of size 1 at addr ffff88810034e2da by task kunit_try_catch/176
[   11.696113] 
[   11.696226] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.696269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.696280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.696310] Call Trace:
[   11.696320]  <TASK>
[   11.696334]  dump_stack_lvl+0x73/0xb0
[   11.696360]  print_report+0xd1/0x610
[   11.696393]  ? __virt_addr_valid+0x1db/0x2d0
[   11.696489]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.696513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.696553]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.696577]  kasan_report+0x141/0x180
[   11.696610]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.696640]  __asan_report_store1_noabort+0x1b/0x30
[   11.696664]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.696689]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.696712]  ? irqentry_exit+0x2a/0x60
[   11.696732]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.696762]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.696787]  krealloc_less_oob+0x1c/0x30
[   11.696808]  kunit_try_run_case+0x1a5/0x480
[   11.696831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.696861]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.696884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.696907]  ? __kthread_parkme+0x82/0x180
[   11.696938]  ? preempt_count_sub+0x50/0x80
[   11.696962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.696985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.697008]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.697031]  kthread+0x337/0x6f0
[   11.697049]  ? trace_preempt_on+0x20/0xc0
[   11.697071]  ? __pfx_kthread+0x10/0x10
[   11.697091]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.697111]  ? calculate_sigpending+0x7b/0xa0
[   11.697139]  ? __pfx_kthread+0x10/0x10
[   11.697160]  ret_from_fork+0x116/0x1d0
[   11.697178]  ? __pfx_kthread+0x10/0x10
[   11.697197]  ret_from_fork_asm+0x1a/0x30
[   11.697228]  </TASK>
[   11.697238] 
[   11.705301] Allocated by task 176:
[   11.705496]  kasan_save_stack+0x45/0x70
[   11.705981]  kasan_save_track+0x18/0x40
[   11.706208]  kasan_save_alloc_info+0x3b/0x50
[   11.706574]  __kasan_krealloc+0x190/0x1f0
[   11.706812]  krealloc_noprof+0xf3/0x340
[   11.707013]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.707221]  krealloc_less_oob+0x1c/0x30
[   11.707488]  kunit_try_run_case+0x1a5/0x480
[   11.707710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.707938]  kthread+0x337/0x6f0
[   11.708059]  ret_from_fork+0x116/0x1d0
[   11.708201]  ret_from_fork_asm+0x1a/0x30
[   11.708414] 
[   11.708628] The buggy address belongs to the object at ffff88810034e200
[   11.708628]  which belongs to the cache kmalloc-256 of size 256
[   11.709395] The buggy address is located 17 bytes to the right of
[   11.709395]  allocated 201-byte region [ffff88810034e200, ffff88810034e2c9)
[   11.710107] 
[   11.710208] The buggy address belongs to the physical page:
[   11.710673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034e
[   11.711023] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.711347] flags: 0x200000000000040(head|node=0|zone=2)
[   11.711622] page_type: f5(slab)
[   11.711741] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.711971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.712394] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.713012] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.713251] head: 0200000000000001 ffffea000400d381 00000000ffffffff 00000000ffffffff
[   11.713539] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.713895] page dumped because: kasan: bad access detected
[   11.714224] 
[   11.714527] Memory state around the buggy address:
[   11.714845]  ffff88810034e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.715193]  ffff88810034e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.715491] >ffff88810034e280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.715952]                                                     ^
[   11.716176]  ffff88810034e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.716665]  ffff88810034e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.716885] ==================================================================
[   11.648733] ==================================================================
[   11.649229] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.649799] Write of size 1 at addr ffff88810034e2c9 by task kunit_try_catch/176
[   11.650076] 
[   11.650196] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.650242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.650253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.650274] Call Trace:
[   11.650287]  <TASK>
[   11.650301]  dump_stack_lvl+0x73/0xb0
[   11.650329]  print_report+0xd1/0x610
[   11.650351]  ? __virt_addr_valid+0x1db/0x2d0
[   11.650374]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.650397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.650420]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.650548]  kasan_report+0x141/0x180
[   11.650570]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.650600]  __asan_report_store1_noabort+0x1b/0x30
[   11.650623]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.650649]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.650672]  ? irqentry_exit+0x2a/0x60
[   11.650708]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.650739]  ? __pfx_krealloc_less_oob+0x10/0x10
[   11.650764]  krealloc_less_oob+0x1c/0x30
[   11.650785]  kunit_try_run_case+0x1a5/0x480
[   11.650809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.650832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.650855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.650879]  ? __kthread_parkme+0x82/0x180
[   11.650898]  ? preempt_count_sub+0x50/0x80
[   11.650922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.650945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.650968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.650991]  kthread+0x337/0x6f0
[   11.651009]  ? trace_preempt_on+0x20/0xc0
[   11.651031]  ? __pfx_kthread+0x10/0x10
[   11.651051]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.651072]  ? calculate_sigpending+0x7b/0xa0
[   11.651095]  ? __pfx_kthread+0x10/0x10
[   11.651116]  ret_from_fork+0x116/0x1d0
[   11.651134]  ? __pfx_kthread+0x10/0x10
[   11.651154]  ret_from_fork_asm+0x1a/0x30
[   11.651185]  </TASK>
[   11.651195] 
[   11.658863] Allocated by task 176:
[   11.659011]  kasan_save_stack+0x45/0x70
[   11.659153]  kasan_save_track+0x18/0x40
[   11.659290]  kasan_save_alloc_info+0x3b/0x50
[   11.659448]  __kasan_krealloc+0x190/0x1f0
[   11.659688]  krealloc_noprof+0xf3/0x340
[   11.660253]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.660704]  krealloc_less_oob+0x1c/0x30
[   11.661089]  kunit_try_run_case+0x1a5/0x480
[   11.661245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.661469]  kthread+0x337/0x6f0
[   11.661655]  ret_from_fork+0x116/0x1d0
[   11.661881]  ret_from_fork_asm+0x1a/0x30
[   11.662197] 
[   11.662311] The buggy address belongs to the object at ffff88810034e200
[   11.662311]  which belongs to the cache kmalloc-256 of size 256
[   11.662910] The buggy address is located 0 bytes to the right of
[   11.662910]  allocated 201-byte region [ffff88810034e200, ffff88810034e2c9)
[   11.663500] 
[   11.663576] The buggy address belongs to the physical page:
[   11.663752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034e
[   11.663992] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.664727] flags: 0x200000000000040(head|node=0|zone=2)
[   11.665200] page_type: f5(slab)
[   11.665511] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.665780] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.666004] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.666341] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.666991] head: 0200000000000001 ffffea000400d381 00000000ffffffff 00000000ffffffff
[   11.667224] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.667862] page dumped because: kasan: bad access detected
[   11.668118] 
[   11.668213] Memory state around the buggy address:
[   11.668759]  ffff88810034e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.669058]  ffff88810034e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.669380] >ffff88810034e280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.669801]                                               ^
[   11.670107]  ffff88810034e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.670580]  ffff88810034e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.670830] ==================================================================
[   11.905329] ==================================================================
[   11.906214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.906721] Write of size 1 at addr ffff88810282a0eb by task kunit_try_catch/180
[   11.907037] 
[   11.907151] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.907194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.907205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.907225] Call Trace:
[   11.907240]  <TASK>
[   11.907256]  dump_stack_lvl+0x73/0xb0
[   11.907283]  print_report+0xd1/0x610
[   11.907307]  ? __virt_addr_valid+0x1db/0x2d0
[   11.907329]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.907353]  ? kasan_addr_to_slab+0x11/0xa0
[   11.907373]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.907398]  kasan_report+0x141/0x180
[   11.907419]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.907463]  __asan_report_store1_noabort+0x1b/0x30
[   11.907487]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.907514]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.907538]  ? finish_task_switch.isra.0+0x153/0x700
[   11.907561]  ? __switch_to+0x47/0xf50
[   11.907586]  ? __schedule+0x10cc/0x2b60
[   11.907608]  ? __pfx_read_tsc+0x10/0x10
[   11.907632]  krealloc_large_less_oob+0x1c/0x30
[   11.907655]  kunit_try_run_case+0x1a5/0x480
[   11.907679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.907701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.907725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.907748]  ? __kthread_parkme+0x82/0x180
[   11.907767]  ? preempt_count_sub+0x50/0x80
[   11.907790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.907813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.907891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.907914]  kthread+0x337/0x6f0
[   11.907933]  ? trace_preempt_on+0x20/0xc0
[   11.907954]  ? __pfx_kthread+0x10/0x10
[   11.907974]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.907995]  ? calculate_sigpending+0x7b/0xa0
[   11.908018]  ? __pfx_kthread+0x10/0x10
[   11.908039]  ret_from_fork+0x116/0x1d0
[   11.908056]  ? __pfx_kthread+0x10/0x10
[   11.908076]  ret_from_fork_asm+0x1a/0x30
[   11.908107]  </TASK>
[   11.908117] 
[   11.918886] The buggy address belongs to the physical page:
[   11.919161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102828
[   11.919971] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.920407] flags: 0x200000000000040(head|node=0|zone=2)
[   11.920884] page_type: f8(unknown)
[   11.921169] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.921721] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.922001] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.922649] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.923018] head: 0200000000000002 ffffea00040a0a01 00000000ffffffff 00000000ffffffff
[   11.923760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.924216] page dumped because: kasan: bad access detected
[   11.924662] 
[   11.924742] Memory state around the buggy address:
[   11.925050]  ffff888102829f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.925360]  ffff88810282a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.925692] >ffff88810282a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.925991]                                                           ^
[   11.926269]  ffff88810282a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.927079]  ffff88810282a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.927667] ==================================================================

[   11.750940] ==================================================================
[   11.751909] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.753675] Write of size 1 at addr ffff888100348ac9 by task kunit_try_catch/175
[   11.754343] 
[   11.754449] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.754501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.754512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.754535] Call Trace:
[   11.754550]  <TASK>
[   11.754570]  dump_stack_lvl+0x73/0xb0
[   11.754608]  print_report+0xd1/0x610
[   11.754631]  ? __virt_addr_valid+0x1db/0x2d0
[   11.754655]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.754679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.754701]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.754725]  kasan_report+0x141/0x180
[   11.754746]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.754774]  __asan_report_store1_noabort+0x1b/0x30
[   11.754800]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.754825]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.754849]  ? finish_task_switch.isra.0+0x153/0x700
[   11.754873]  ? __switch_to+0x47/0xf50
[   11.754898]  ? __schedule+0x10cc/0x2b60
[   11.754920]  ? __pfx_read_tsc+0x10/0x10
[   11.754944]  krealloc_less_oob+0x1c/0x30
[   11.754965]  kunit_try_run_case+0x1a5/0x480
[   11.754990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.755475]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.755511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.755535]  ? __kthread_parkme+0x82/0x180
[   11.755557]  ? preempt_count_sub+0x50/0x80
[   11.755580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.755604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.755628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.755651]  kthread+0x337/0x6f0
[   11.755669]  ? trace_preempt_on+0x20/0xc0
[   11.755692]  ? __pfx_kthread+0x10/0x10
[   11.755712]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.755733]  ? calculate_sigpending+0x7b/0xa0
[   11.755758]  ? __pfx_kthread+0x10/0x10
[   11.755779]  ret_from_fork+0x116/0x1d0
[   11.755798]  ? __pfx_kthread+0x10/0x10
[   11.755817]  ret_from_fork_asm+0x1a/0x30
[   11.755848]  </TASK>
[   11.755859] 
[   11.771368] Allocated by task 175:
[   11.771602]  kasan_save_stack+0x45/0x70
[   11.771809]  kasan_save_track+0x18/0x40
[   11.772070]  kasan_save_alloc_info+0x3b/0x50
[   11.772245]  __kasan_krealloc+0x190/0x1f0
[   11.772477]  krealloc_noprof+0xf3/0x340
[   11.772624]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.772817]  krealloc_less_oob+0x1c/0x30
[   11.773101]  kunit_try_run_case+0x1a5/0x480
[   11.773323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.773567]  kthread+0x337/0x6f0
[   11.773715]  ret_from_fork+0x116/0x1d0
[   11.773870]  ret_from_fork_asm+0x1a/0x30
[   11.774221] 
[   11.774320] The buggy address belongs to the object at ffff888100348a00
[   11.774320]  which belongs to the cache kmalloc-256 of size 256
[   11.774832] The buggy address is located 0 bytes to the right of
[   11.774832]  allocated 201-byte region [ffff888100348a00, ffff888100348ac9)
[   11.775341] 
[   11.775419] The buggy address belongs to the physical page:
[   11.775689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   11.776119] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.776470] flags: 0x200000000000040(head|node=0|zone=2)
[   11.776679] page_type: f5(slab)
[   11.776805] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.777214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.777578] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.777914] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.778279] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   11.778622] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.778919] page dumped because: kasan: bad access detected
[   11.779264] 
[   11.779362] Memory state around the buggy address:
[   11.779544]  ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.779764]  ffff888100348a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.780156] >ffff888100348a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.780497]                                               ^
[   11.780723]  ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.780945]  ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.781346] ==================================================================
[   12.040162] ==================================================================
[   12.040399] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.040653] Write of size 1 at addr ffff8881028520ea by task kunit_try_catch/179
[   12.040883] 
[   12.040975] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.041048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.041059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.041080] Call Trace:
[   12.041100]  <TASK>
[   12.041119]  dump_stack_lvl+0x73/0xb0
[   12.041148]  print_report+0xd1/0x610
[   12.041170]  ? __virt_addr_valid+0x1db/0x2d0
[   12.041605]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.041631]  ? kasan_addr_to_slab+0x11/0xa0
[   12.041653]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.041677]  kasan_report+0x141/0x180
[   12.041699]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.041727]  __asan_report_store1_noabort+0x1b/0x30
[   12.041752]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.041777]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.041801]  ? finish_task_switch.isra.0+0x153/0x700
[   12.041824]  ? __switch_to+0x47/0xf50
[   12.041849]  ? __schedule+0x10cc/0x2b60
[   12.041872]  ? __pfx_read_tsc+0x10/0x10
[   12.041895]  krealloc_large_less_oob+0x1c/0x30
[   12.041917]  kunit_try_run_case+0x1a5/0x480
[   12.041942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.041963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.041987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.042305]  ? __kthread_parkme+0x82/0x180
[   12.042329]  ? preempt_count_sub+0x50/0x80
[   12.042351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.042375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.042399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.042422]  kthread+0x337/0x6f0
[   12.042441]  ? trace_preempt_on+0x20/0xc0
[   12.042464]  ? __pfx_kthread+0x10/0x10
[   12.042484]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.042505]  ? calculate_sigpending+0x7b/0xa0
[   12.042529]  ? __pfx_kthread+0x10/0x10
[   12.042549]  ret_from_fork+0x116/0x1d0
[   12.042567]  ? __pfx_kthread+0x10/0x10
[   12.042586]  ret_from_fork_asm+0x1a/0x30
[   12.042617]  </TASK>
[   12.042626] 
[   12.058818] The buggy address belongs to the physical page:
[   12.059349] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850
[   12.059797] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.060329] flags: 0x200000000000040(head|node=0|zone=2)
[   12.060834] page_type: f8(unknown)
[   12.061338] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.061672] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.062005] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.062611] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.063097] head: 0200000000000002 ffffea00040a1401 00000000ffffffff 00000000ffffffff
[   12.063567] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.063977] page dumped because: kasan: bad access detected
[   12.064546] 
[   12.064635] Memory state around the buggy address:
[   12.064953]  ffff888102851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.065252]  ffff888102852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.065577] >ffff888102852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.065877]                                                           ^
[   12.066174]  ffff888102852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.066471]  ffff888102852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.066778] ==================================================================
[   11.784327] ==================================================================
[   11.784795] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.785286] Write of size 1 at addr ffff888100348ad0 by task kunit_try_catch/175
[   11.786424] 
[   11.786615] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.786664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.786675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.786697] Call Trace:
[   11.786711]  <TASK>
[   11.786730]  dump_stack_lvl+0x73/0xb0
[   11.786762]  print_report+0xd1/0x610
[   11.786785]  ? __virt_addr_valid+0x1db/0x2d0
[   11.786808]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.786832]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.786854]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.786878]  kasan_report+0x141/0x180
[   11.786899]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.786927]  __asan_report_store1_noabort+0x1b/0x30
[   11.786951]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.786976]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.787000]  ? finish_task_switch.isra.0+0x153/0x700
[   11.787241]  ? __switch_to+0x47/0xf50
[   11.787269]  ? __schedule+0x10cc/0x2b60
[   11.787293]  ? __pfx_read_tsc+0x10/0x10
[   11.787316]  krealloc_less_oob+0x1c/0x30
[   11.787338]  kunit_try_run_case+0x1a5/0x480
[   11.787362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.787384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.787408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.787444]  ? __kthread_parkme+0x82/0x180
[   11.787465]  ? preempt_count_sub+0x50/0x80
[   11.787487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.787510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.787533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.787557]  kthread+0x337/0x6f0
[   11.787576]  ? trace_preempt_on+0x20/0xc0
[   11.787598]  ? __pfx_kthread+0x10/0x10
[   11.787618]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.787638]  ? calculate_sigpending+0x7b/0xa0
[   11.787662]  ? __pfx_kthread+0x10/0x10
[   11.787682]  ret_from_fork+0x116/0x1d0
[   11.787700]  ? __pfx_kthread+0x10/0x10
[   11.787720]  ret_from_fork_asm+0x1a/0x30
[   11.787749]  </TASK>
[   11.787759] 
[   11.803861] Allocated by task 175:
[   11.804555]  kasan_save_stack+0x45/0x70
[   11.805345]  kasan_save_track+0x18/0x40
[   11.805920]  kasan_save_alloc_info+0x3b/0x50
[   11.806564]  __kasan_krealloc+0x190/0x1f0
[   11.807201]  krealloc_noprof+0xf3/0x340
[   11.807644]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.807832]  krealloc_less_oob+0x1c/0x30
[   11.807975]  kunit_try_run_case+0x1a5/0x480
[   11.808684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.809525]  kthread+0x337/0x6f0
[   11.809980]  ret_from_fork+0x116/0x1d0
[   11.810510]  ret_from_fork_asm+0x1a/0x30
[   11.810663] 
[   11.810740] The buggy address belongs to the object at ffff888100348a00
[   11.810740]  which belongs to the cache kmalloc-256 of size 256
[   11.811749] The buggy address is located 7 bytes to the right of
[   11.811749]  allocated 201-byte region [ffff888100348a00, ffff888100348ac9)
[   11.813385] 
[   11.813728] The buggy address belongs to the physical page:
[   11.814654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   11.815423] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.815929] flags: 0x200000000000040(head|node=0|zone=2)
[   11.816150] page_type: f5(slab)
[   11.816448] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.817142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.817901] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.818638] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.819041] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   11.819664] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.819898] page dumped because: kasan: bad access detected
[   11.820114] 
[   11.820188] Memory state around the buggy address:
[   11.820345]  ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.820607]  ffff888100348a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.820823] >ffff888100348a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.821076]                                                  ^
[   11.821267]  ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.821488]  ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.821746] ==================================================================
[   11.972633] ==================================================================
[   11.973374] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.974336] Write of size 1 at addr ffff8881028520d0 by task kunit_try_catch/179
[   11.975017] 
[   11.975241] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.975300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.975312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.975332] Call Trace:
[   11.975351]  <TASK>
[   11.975370]  dump_stack_lvl+0x73/0xb0
[   11.975400]  print_report+0xd1/0x610
[   11.975422]  ? __virt_addr_valid+0x1db/0x2d0
[   11.975456]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.975480]  ? kasan_addr_to_slab+0x11/0xa0
[   11.975500]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.975551]  kasan_report+0x141/0x180
[   11.975573]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.975601]  __asan_report_store1_noabort+0x1b/0x30
[   11.975637]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.975663]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.975687]  ? finish_task_switch.isra.0+0x153/0x700
[   11.975709]  ? __switch_to+0x47/0xf50
[   11.975734]  ? __schedule+0x10cc/0x2b60
[   11.975756]  ? __pfx_read_tsc+0x10/0x10
[   11.975780]  krealloc_large_less_oob+0x1c/0x30
[   11.975803]  kunit_try_run_case+0x1a5/0x480
[   11.975827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.975848]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.975872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.975895]  ? __kthread_parkme+0x82/0x180
[   11.975915]  ? preempt_count_sub+0x50/0x80
[   11.975938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.975961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.975984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.976017]  kthread+0x337/0x6f0
[   11.976036]  ? trace_preempt_on+0x20/0xc0
[   11.976058]  ? __pfx_kthread+0x10/0x10
[   11.976078]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.976098]  ? calculate_sigpending+0x7b/0xa0
[   11.976122]  ? __pfx_kthread+0x10/0x10
[   11.976143]  ret_from_fork+0x116/0x1d0
[   11.976161]  ? __pfx_kthread+0x10/0x10
[   11.976180]  ret_from_fork_asm+0x1a/0x30
[   11.976211]  </TASK>
[   11.976220] 
[   11.993149] The buggy address belongs to the physical page:
[   11.993638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850
[   11.994024] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.994604] flags: 0x200000000000040(head|node=0|zone=2)
[   11.994792] page_type: f8(unknown)
[   11.994922] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.995738] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.996696] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.997758] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.998788] head: 0200000000000002 ffffea00040a1401 00000000ffffffff 00000000ffffffff
[   11.999507] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.000307] page dumped because: kasan: bad access detected
[   12.000662] 
[   12.001056] Memory state around the buggy address:
[   12.001649]  ffff888102851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.001879]  ffff888102852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.002601] >ffff888102852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.003467]                                                  ^
[   12.004431]  ffff888102852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.004822]  ffff888102852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.005408] ==================================================================
[   12.006670] ==================================================================
[   12.007725] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.007991] Write of size 1 at addr ffff8881028520da by task kunit_try_catch/179
[   12.008231] 
[   12.008323] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.008369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.008380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.008401] Call Trace:
[   12.008413]  <TASK>
[   12.008431]  dump_stack_lvl+0x73/0xb0
[   12.008459]  print_report+0xd1/0x610
[   12.008481]  ? __virt_addr_valid+0x1db/0x2d0
[   12.008505]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.008528]  ? kasan_addr_to_slab+0x11/0xa0
[   12.008548]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.008572]  kasan_report+0x141/0x180
[   12.008593]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.008621]  __asan_report_store1_noabort+0x1b/0x30
[   12.008645]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.008983]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.009058]  ? finish_task_switch.isra.0+0x153/0x700
[   12.009084]  ? __switch_to+0x47/0xf50
[   12.009110]  ? __schedule+0x10cc/0x2b60
[   12.009132]  ? __pfx_read_tsc+0x10/0x10
[   12.009156]  krealloc_large_less_oob+0x1c/0x30
[   12.009178]  kunit_try_run_case+0x1a5/0x480
[   12.009203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.009225]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.009248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.009271]  ? __kthread_parkme+0x82/0x180
[   12.009292]  ? preempt_count_sub+0x50/0x80
[   12.009314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.009337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.009361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.009384]  kthread+0x337/0x6f0
[   12.009402]  ? trace_preempt_on+0x20/0xc0
[   12.009424]  ? __pfx_kthread+0x10/0x10
[   12.009444]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.009464]  ? calculate_sigpending+0x7b/0xa0
[   12.009488]  ? __pfx_kthread+0x10/0x10
[   12.009508]  ret_from_fork+0x116/0x1d0
[   12.009526]  ? __pfx_kthread+0x10/0x10
[   12.009545]  ret_from_fork_asm+0x1a/0x30
[   12.009575]  </TASK>
[   12.009584] 
[   12.027458] The buggy address belongs to the physical page:
[   12.027965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850
[   12.028803] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.029308] flags: 0x200000000000040(head|node=0|zone=2)
[   12.029901] page_type: f8(unknown)
[   12.030438] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.030975] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.031833] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.032523] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.033398] head: 0200000000000002 ffffea00040a1401 00000000ffffffff 00000000ffffffff
[   12.033912] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.034572] page dumped because: kasan: bad access detected
[   12.035503] 
[   12.035583] Memory state around the buggy address:
[   12.035744]  ffff888102851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.035965]  ffff888102852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.036959] >ffff888102852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.037811]                                                     ^
[   12.038543]  ffff888102852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.039280]  ffff888102852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.039753] ==================================================================
[   11.822674] ==================================================================
[   11.822983] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.823437] Write of size 1 at addr ffff888100348ada by task kunit_try_catch/175
[   11.823721] 
[   11.823835] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.823880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.823891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.823913] Call Trace:
[   11.823925]  <TASK>
[   11.823943]  dump_stack_lvl+0x73/0xb0
[   11.823973]  print_report+0xd1/0x610
[   11.823995]  ? __virt_addr_valid+0x1db/0x2d0
[   11.824031]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.824054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.824076]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.824100]  kasan_report+0x141/0x180
[   11.824121]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.824173]  __asan_report_store1_noabort+0x1b/0x30
[   11.824198]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.824224]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.824247]  ? finish_task_switch.isra.0+0x153/0x700
[   11.824270]  ? __switch_to+0x47/0xf50
[   11.824295]  ? __schedule+0x10cc/0x2b60
[   11.824316]  ? __pfx_read_tsc+0x10/0x10
[   11.824339]  krealloc_less_oob+0x1c/0x30
[   11.824360]  kunit_try_run_case+0x1a5/0x480
[   11.824384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.824405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.824429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.824461]  ? __kthread_parkme+0x82/0x180
[   11.824482]  ? preempt_count_sub+0x50/0x80
[   11.824504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.824527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.824550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.824573]  kthread+0x337/0x6f0
[   11.824591]  ? trace_preempt_on+0x20/0xc0
[   11.824613]  ? __pfx_kthread+0x10/0x10
[   11.824633]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.824654]  ? calculate_sigpending+0x7b/0xa0
[   11.824678]  ? __pfx_kthread+0x10/0x10
[   11.824698]  ret_from_fork+0x116/0x1d0
[   11.824716]  ? __pfx_kthread+0x10/0x10
[   11.824735]  ret_from_fork_asm+0x1a/0x30
[   11.824765]  </TASK>
[   11.824775] 
[   11.832686] Allocated by task 175:
[   11.833257]  kasan_save_stack+0x45/0x70
[   11.833507]  kasan_save_track+0x18/0x40
[   11.833643]  kasan_save_alloc_info+0x3b/0x50
[   11.833791]  __kasan_krealloc+0x190/0x1f0
[   11.833929]  krealloc_noprof+0xf3/0x340
[   11.834074]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.834331]  krealloc_less_oob+0x1c/0x30
[   11.834521]  kunit_try_run_case+0x1a5/0x480
[   11.834726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.835155]  kthread+0x337/0x6f0
[   11.835338]  ret_from_fork+0x116/0x1d0
[   11.835468]  ret_from_fork_asm+0x1a/0x30
[   11.835606] 
[   11.835676] The buggy address belongs to the object at ffff888100348a00
[   11.835676]  which belongs to the cache kmalloc-256 of size 256
[   11.836399] The buggy address is located 17 bytes to the right of
[   11.836399]  allocated 201-byte region [ffff888100348a00, ffff888100348ac9)
[   11.837331] 
[   11.837476] The buggy address belongs to the physical page:
[   11.837712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   11.838069] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.838456] flags: 0x200000000000040(head|node=0|zone=2)
[   11.838635] page_type: f5(slab)
[   11.838756] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.838987] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.839227] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.839457] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.839793] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   11.840259] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.840590] page dumped because: kasan: bad access detected
[   11.840833] 
[   11.840927] Memory state around the buggy address:
[   11.841302]  ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.842450]  ffff888100348a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.842680] >ffff888100348a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.842896]                                                     ^
[   11.843422]  ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.844557]  ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.845131] ==================================================================
[   11.846755] ==================================================================
[   11.847383] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.848110] Write of size 1 at addr ffff888100348aea by task kunit_try_catch/175
[   11.848550] 
[   11.848788] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.848845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.848861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.848881] Call Trace:
[   11.848895]  <TASK>
[   11.848913]  dump_stack_lvl+0x73/0xb0
[   11.848945]  print_report+0xd1/0x610
[   11.848967]  ? __virt_addr_valid+0x1db/0x2d0
[   11.848989]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.849025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.849047]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.849071]  kasan_report+0x141/0x180
[   11.849092]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.849120]  __asan_report_store1_noabort+0x1b/0x30
[   11.849144]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.849170]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.849194]  ? finish_task_switch.isra.0+0x153/0x700
[   11.849217]  ? __switch_to+0x47/0xf50
[   11.849243]  ? __schedule+0x10cc/0x2b60
[   11.849265]  ? __pfx_read_tsc+0x10/0x10
[   11.849288]  krealloc_less_oob+0x1c/0x30
[   11.849309]  kunit_try_run_case+0x1a5/0x480
[   11.849333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.849355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.849378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.849401]  ? __kthread_parkme+0x82/0x180
[   11.849421]  ? preempt_count_sub+0x50/0x80
[   11.849574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.849599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.849635]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.849659]  kthread+0x337/0x6f0
[   11.849711]  ? trace_preempt_on+0x20/0xc0
[   11.849736]  ? __pfx_kthread+0x10/0x10
[   11.849755]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.849776]  ? calculate_sigpending+0x7b/0xa0
[   11.849800]  ? __pfx_kthread+0x10/0x10
[   11.849820]  ret_from_fork+0x116/0x1d0
[   11.849838]  ? __pfx_kthread+0x10/0x10
[   11.849858]  ret_from_fork_asm+0x1a/0x30
[   11.849889]  </TASK>
[   11.849899] 
[   11.860936] Allocated by task 175:
[   11.861134]  kasan_save_stack+0x45/0x70
[   11.861329]  kasan_save_track+0x18/0x40
[   11.861961]  kasan_save_alloc_info+0x3b/0x50
[   11.862189]  __kasan_krealloc+0x190/0x1f0
[   11.862373]  krealloc_noprof+0xf3/0x340
[   11.862954]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.863255]  krealloc_less_oob+0x1c/0x30
[   11.863618]  kunit_try_run_case+0x1a5/0x480
[   11.863812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.864048]  kthread+0x337/0x6f0
[   11.864204]  ret_from_fork+0x116/0x1d0
[   11.864383]  ret_from_fork_asm+0x1a/0x30
[   11.865000] 
[   11.865255] The buggy address belongs to the object at ffff888100348a00
[   11.865255]  which belongs to the cache kmalloc-256 of size 256
[   11.866177] The buggy address is located 33 bytes to the right of
[   11.866177]  allocated 201-byte region [ffff888100348a00, ffff888100348ac9)
[   11.867228] 
[   11.867511] The buggy address belongs to the physical page:
[   11.867949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   11.868293] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.868963] flags: 0x200000000000040(head|node=0|zone=2)
[   11.869442] page_type: f5(slab)
[   11.869748] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.870234] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.870886] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.871349] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.871851] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   11.872183] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.872808] page dumped because: kasan: bad access detected
[   11.873288] 
[   11.873403] Memory state around the buggy address:
[   11.873771]  ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.874077]  ffff888100348a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.874358] >ffff888100348a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.875233]                                                           ^
[   11.875742]  ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.876324]  ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.876877] ==================================================================
[   11.877627] ==================================================================
[   11.878425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.878765] Write of size 1 at addr ffff888100348aeb by task kunit_try_catch/175
[   11.879082] 
[   11.879195] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.879241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.879252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.879273] Call Trace:
[   11.879292]  <TASK>
[   11.879310]  dump_stack_lvl+0x73/0xb0
[   11.879340]  print_report+0xd1/0x610
[   11.879362]  ? __virt_addr_valid+0x1db/0x2d0
[   11.879384]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.879408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.879878]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.879909]  kasan_report+0x141/0x180
[   11.879946]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.879975]  __asan_report_store1_noabort+0x1b/0x30
[   11.880005]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.880039]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.880063]  ? finish_task_switch.isra.0+0x153/0x700
[   11.880087]  ? __switch_to+0x47/0xf50
[   11.880112]  ? __schedule+0x10cc/0x2b60
[   11.880134]  ? __pfx_read_tsc+0x10/0x10
[   11.880157]  krealloc_less_oob+0x1c/0x30
[   11.880178]  kunit_try_run_case+0x1a5/0x480
[   11.880202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.880224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.880248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.880270]  ? __kthread_parkme+0x82/0x180
[   11.880291]  ? preempt_count_sub+0x50/0x80
[   11.880313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.880336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.880359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.880383]  kthread+0x337/0x6f0
[   11.880401]  ? trace_preempt_on+0x20/0xc0
[   11.880423]  ? __pfx_kthread+0x10/0x10
[   11.880667]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.880690]  ? calculate_sigpending+0x7b/0xa0
[   11.880714]  ? __pfx_kthread+0x10/0x10
[   11.880734]  ret_from_fork+0x116/0x1d0
[   11.880753]  ? __pfx_kthread+0x10/0x10
[   11.880774]  ret_from_fork_asm+0x1a/0x30
[   11.880805]  </TASK>
[   11.880815] 
[   11.891328] Allocated by task 175:
[   11.891802]  kasan_save_stack+0x45/0x70
[   11.892084]  kasan_save_track+0x18/0x40
[   11.892412]  kasan_save_alloc_info+0x3b/0x50
[   11.892631]  __kasan_krealloc+0x190/0x1f0
[   11.892818]  krealloc_noprof+0xf3/0x340
[   11.892995]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.893170]  krealloc_less_oob+0x1c/0x30
[   11.893308]  kunit_try_run_case+0x1a5/0x480
[   11.893574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.893830]  kthread+0x337/0x6f0
[   11.894025]  ret_from_fork+0x116/0x1d0
[   11.894253]  ret_from_fork_asm+0x1a/0x30
[   11.894427] 
[   11.894501] The buggy address belongs to the object at ffff888100348a00
[   11.894501]  which belongs to the cache kmalloc-256 of size 256
[   11.894995] The buggy address is located 34 bytes to the right of
[   11.894995]  allocated 201-byte region [ffff888100348a00, ffff888100348ac9)
[   11.895504] 
[   11.895603] The buggy address belongs to the physical page:
[   11.895870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   11.896229] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.896609] flags: 0x200000000000040(head|node=0|zone=2)
[   11.896850] page_type: f5(slab)
[   11.897020] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.897327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.897743] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.898056] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.898280] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   11.898604] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.898942] page dumped because: kasan: bad access detected
[   11.899118] 
[   11.899185] Memory state around the buggy address:
[   11.899549]  ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.899868]  ffff888100348a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.900172] >ffff888100348a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.900407]                                                           ^
[   11.900709]  ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.900986]  ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.901244] ==================================================================
[   11.944777] ==================================================================
[   11.945970] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.946258] Write of size 1 at addr ffff8881028520c9 by task kunit_try_catch/179
[   11.946971] 
[   11.947389] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.947469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.947481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.947505] Call Trace:
[   11.947518]  <TASK>
[   11.947536]  dump_stack_lvl+0x73/0xb0
[   11.947569]  print_report+0xd1/0x610
[   11.947592]  ? __virt_addr_valid+0x1db/0x2d0
[   11.947617]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.947640]  ? kasan_addr_to_slab+0x11/0xa0
[   11.947660]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.947684]  kasan_report+0x141/0x180
[   11.947704]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.947732]  __asan_report_store1_noabort+0x1b/0x30
[   11.947756]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.947781]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.947804]  ? finish_task_switch.isra.0+0x153/0x700
[   11.947828]  ? __switch_to+0x47/0xf50
[   11.947854]  ? __schedule+0x10cc/0x2b60
[   11.947876]  ? __pfx_read_tsc+0x10/0x10
[   11.947901]  krealloc_large_less_oob+0x1c/0x30
[   11.947923]  kunit_try_run_case+0x1a5/0x480
[   11.947949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.947971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.948004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.948040]  ? __kthread_parkme+0x82/0x180
[   11.948061]  ? preempt_count_sub+0x50/0x80
[   11.948083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.948106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.948129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.948153]  kthread+0x337/0x6f0
[   11.948171]  ? trace_preempt_on+0x20/0xc0
[   11.948195]  ? __pfx_kthread+0x10/0x10
[   11.948215]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.948236]  ? calculate_sigpending+0x7b/0xa0
[   11.948260]  ? __pfx_kthread+0x10/0x10
[   11.948281]  ret_from_fork+0x116/0x1d0
[   11.948299]  ? __pfx_kthread+0x10/0x10
[   11.948318]  ret_from_fork_asm+0x1a/0x30
[   11.948348]  </TASK>
[   11.948360] 
[   11.963576] The buggy address belongs to the physical page:
[   11.964142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850
[   11.964864] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.965656] flags: 0x200000000000040(head|node=0|zone=2)
[   11.966262] page_type: f8(unknown)
[   11.966679] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.966911] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.967160] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.967391] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.967621] head: 0200000000000002 ffffea00040a1401 00000000ffffffff 00000000ffffffff
[   11.967852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.968094] page dumped because: kasan: bad access detected
[   11.968269] 
[   11.968338] Memory state around the buggy address:
[   11.968496]  ffff888102851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.968713]  ffff888102852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.968933] >ffff888102852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.969589]                                               ^
[   11.970141]  ffff888102852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.970961]  ffff888102852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.971720] ==================================================================
[   12.068171] ==================================================================
[   12.068621] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.069475] Write of size 1 at addr ffff8881028520eb by task kunit_try_catch/179
[   12.069908] 
[   12.070297] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.070350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.070361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.070382] Call Trace:
[   12.070402]  <TASK>
[   12.070448]  dump_stack_lvl+0x73/0xb0
[   12.070481]  print_report+0xd1/0x610
[   12.070505]  ? __virt_addr_valid+0x1db/0x2d0
[   12.070529]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.070553]  ? kasan_addr_to_slab+0x11/0xa0
[   12.070573]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.070596]  kasan_report+0x141/0x180
[   12.070617]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.070646]  __asan_report_store1_noabort+0x1b/0x30
[   12.070670]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.070696]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.070720]  ? finish_task_switch.isra.0+0x153/0x700
[   12.070742]  ? __switch_to+0x47/0xf50
[   12.070767]  ? __schedule+0x10cc/0x2b60
[   12.070789]  ? __pfx_read_tsc+0x10/0x10
[   12.070813]  krealloc_large_less_oob+0x1c/0x30
[   12.070836]  kunit_try_run_case+0x1a5/0x480
[   12.070860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.070881]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.070905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.070928]  ? __kthread_parkme+0x82/0x180
[   12.070948]  ? preempt_count_sub+0x50/0x80
[   12.070971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.071024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.071069]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.071093]  kthread+0x337/0x6f0
[   12.071111]  ? trace_preempt_on+0x20/0xc0
[   12.071135]  ? __pfx_kthread+0x10/0x10
[   12.071155]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.071176]  ? calculate_sigpending+0x7b/0xa0
[   12.071200]  ? __pfx_kthread+0x10/0x10
[   12.071220]  ret_from_fork+0x116/0x1d0
[   12.071239]  ? __pfx_kthread+0x10/0x10
[   12.071258]  ret_from_fork_asm+0x1a/0x30
[   12.071290]  </TASK>
[   12.071299] 
[   12.085469] The buggy address belongs to the physical page:
[   12.085966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850
[   12.086741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.087213] flags: 0x200000000000040(head|node=0|zone=2)
[   12.087722] page_type: f8(unknown)
[   12.088076] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.088328] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.088567] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.088802] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.089071] head: 0200000000000002 ffffea00040a1401 00000000ffffffff 00000000ffffffff
[   12.089451] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.089766] page dumped because: kasan: bad access detected
[   12.089967] 
[   12.090142] Memory state around the buggy address:
[   12.090329]  ffff888102851f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.090636]  ffff888102852000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.090917] >ffff888102852080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.091536]                                                           ^
[   12.091852]  ffff888102852100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.092223]  ffff888102852180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.092554] ==================================================================