Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.789718] ==================================================================
[   16.789944] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.790319] Write of size 1 at addr fff00000c79020eb by task kunit_try_catch/160
[   16.790396] 
[   16.790763] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.791022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.791049] Hardware name: linux,dummy-virt (DT)
[   16.791081] Call trace:
[   16.791473]  show_stack+0x20/0x38 (C)
[   16.791547]  dump_stack_lvl+0x8c/0xd0
[   16.791598]  print_report+0x118/0x5d0
[   16.791901]  kasan_report+0xdc/0x128
[   16.792138]  __asan_report_store1_noabort+0x20/0x30
[   16.792193]  krealloc_more_oob_helper+0x60c/0x678
[   16.792484]  krealloc_large_more_oob+0x20/0x38
[   16.793038]  kunit_try_run_case+0x170/0x3f0
[   16.793114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.793487]  kthread+0x328/0x630
[   16.793540]  ret_from_fork+0x10/0x20
[   16.794140] 
[   16.794574] The buggy address belongs to the physical page:
[   16.794612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   16.794874] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.795124] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.795287] page_type: f8(unknown)
[   16.795819] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.796107] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.796157] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.796230] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.796499] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   16.796946] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.797108] page dumped because: kasan: bad access detected
[   16.797146] 
[   16.797235] Memory state around the buggy address:
[   16.797621]  fff00000c7901f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.797828]  fff00000c7902000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.798197] >fff00000c7902080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.798239]                                                           ^
[   16.798282]  fff00000c7902100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.798501]  fff00000c7902180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.798768] ==================================================================
[   16.678508] ==================================================================
[   16.678594] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.678687] Write of size 1 at addr fff00000c1bc44eb by task kunit_try_catch/156
[   16.678769] 
[   16.678823] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.679044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.679074] Hardware name: linux,dummy-virt (DT)
[   16.679245] Call trace:
[   16.679358]  show_stack+0x20/0x38 (C)
[   16.679452]  dump_stack_lvl+0x8c/0xd0
[   16.679569]  print_report+0x118/0x5d0
[   16.679618]  kasan_report+0xdc/0x128
[   16.679663]  __asan_report_store1_noabort+0x20/0x30
[   16.679714]  krealloc_more_oob_helper+0x60c/0x678
[   16.679761]  krealloc_more_oob+0x20/0x38
[   16.680046]  kunit_try_run_case+0x170/0x3f0
[   16.680198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.680251]  kthread+0x328/0x630
[   16.680304]  ret_from_fork+0x10/0x20
[   16.680364] 
[   16.680382] Allocated by task 156:
[   16.680412]  kasan_save_stack+0x3c/0x68
[   16.680455]  kasan_save_track+0x20/0x40
[   16.680492]  kasan_save_alloc_info+0x40/0x58
[   16.680531]  __kasan_krealloc+0x118/0x178
[   16.680568]  krealloc_noprof+0x128/0x360
[   16.680604]  krealloc_more_oob_helper+0x168/0x678
[   16.680642]  krealloc_more_oob+0x20/0x38
[   16.680676]  kunit_try_run_case+0x170/0x3f0
[   16.680729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.680778]  kthread+0x328/0x630
[   16.680873]  ret_from_fork+0x10/0x20
[   16.680960] 
[   16.681022] The buggy address belongs to the object at fff00000c1bc4400
[   16.681022]  which belongs to the cache kmalloc-256 of size 256
[   16.681095] The buggy address is located 0 bytes to the right of
[   16.681095]  allocated 235-byte region [fff00000c1bc4400, fff00000c1bc44eb)
[   16.681178] 
[   16.681199] The buggy address belongs to the physical page:
[   16.681232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4
[   16.681325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.681539] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.681594] page_type: f5(slab)
[   16.681675] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.681774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.681822] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.681878] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.681925] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff
[   16.682106] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.682151] page dumped because: kasan: bad access detected
[   16.682181] 
[   16.682199] Memory state around the buggy address:
[   16.682466]  fff00000c1bc4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.682655]  fff00000c1bc4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.682697] >fff00000c1bc4480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.682733]                                                           ^
[   16.682771]  fff00000c1bc4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.683181]  fff00000c1bc4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.683443] ==================================================================
[   16.803205] ==================================================================
[   16.803261] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.803834] Write of size 1 at addr fff00000c79020f0 by task kunit_try_catch/160
[   16.803896] 
[   16.803935] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.804590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.804687] Hardware name: linux,dummy-virt (DT)
[   16.804893] Call trace:
[   16.804924]  show_stack+0x20/0x38 (C)
[   16.805228]  dump_stack_lvl+0x8c/0xd0
[   16.805603]  print_report+0x118/0x5d0
[   16.805811]  kasan_report+0xdc/0x128
[   16.805871]  __asan_report_store1_noabort+0x20/0x30
[   16.805923]  krealloc_more_oob_helper+0x5c0/0x678
[   16.805971]  krealloc_large_more_oob+0x20/0x38
[   16.806017]  kunit_try_run_case+0x170/0x3f0
[   16.806818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.806927]  kthread+0x328/0x630
[   16.807411]  ret_from_fork+0x10/0x20
[   16.807638] 
[   16.807832] The buggy address belongs to the physical page:
[   16.807985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   16.808117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.808607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.808665] page_type: f8(unknown)
[   16.809228] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.809560] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.809975] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.810066] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.810114] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   16.810161] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.810199] page dumped because: kasan: bad access detected
[   16.810999] 
[   16.811027] Memory state around the buggy address:
[   16.811097]  fff00000c7901f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.811185]  fff00000c7902000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.811481] >fff00000c7902080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.811523]                                                              ^
[   16.811565]  fff00000c7902100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.811608]  fff00000c7902180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.811796] ==================================================================
[   16.684364] ==================================================================
[   16.684623] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.684683] Write of size 1 at addr fff00000c1bc44f0 by task kunit_try_catch/156
[   16.684731] 
[   16.684829] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.685201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.685328] Hardware name: linux,dummy-virt (DT)
[   16.685364] Call trace:
[   16.685436]  show_stack+0x20/0x38 (C)
[   16.685514]  dump_stack_lvl+0x8c/0xd0
[   16.685609]  print_report+0x118/0x5d0
[   16.685656]  kasan_report+0xdc/0x128
[   16.685707]  __asan_report_store1_noabort+0x20/0x30
[   16.685839]  krealloc_more_oob_helper+0x5c0/0x678
[   16.685897]  krealloc_more_oob+0x20/0x38
[   16.685941]  kunit_try_run_case+0x170/0x3f0
[   16.686294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.686393]  kthread+0x328/0x630
[   16.686437]  ret_from_fork+0x10/0x20
[   16.686653] 
[   16.686711] Allocated by task 156:
[   16.686748]  kasan_save_stack+0x3c/0x68
[   16.686920]  kasan_save_track+0x20/0x40
[   16.686959]  kasan_save_alloc_info+0x40/0x58
[   16.686997]  __kasan_krealloc+0x118/0x178
[   16.687034]  krealloc_noprof+0x128/0x360
[   16.687070]  krealloc_more_oob_helper+0x168/0x678
[   16.687108]  krealloc_more_oob+0x20/0x38
[   16.687143]  kunit_try_run_case+0x170/0x3f0
[   16.687179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.687229]  kthread+0x328/0x630
[   16.687260]  ret_from_fork+0x10/0x20
[   16.687385] 
[   16.687433] The buggy address belongs to the object at fff00000c1bc4400
[   16.687433]  which belongs to the cache kmalloc-256 of size 256
[   16.687515] The buggy address is located 5 bytes to the right of
[   16.687515]  allocated 235-byte region [fff00000c1bc4400, fff00000c1bc44eb)
[   16.687702] 
[   16.687729] The buggy address belongs to the physical page:
[   16.687816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4
[   16.687879] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.687924] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.687976] page_type: f5(slab)
[   16.688049] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.688100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.688148] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.688194] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.688241] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff
[   16.688465] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.688574] page dumped because: kasan: bad access detected
[   16.688618] 
[   16.688638] Memory state around the buggy address:
[   16.688750]  fff00000c1bc4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.688831]  fff00000c1bc4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.688898] >fff00000c1bc4480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.688974]                                                              ^
[   16.689012]  fff00000c1bc4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.689139]  fff00000c1bc4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.689180] ==================================================================

[   16.451531] ==================================================================
[   16.452527] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.452670] Write of size 1 at addr fff00000c45cfceb by task kunit_try_catch/156
[   16.452848] 
[   16.453040] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.453583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.453765] Hardware name: linux,dummy-virt (DT)
[   16.453916] Call trace:
[   16.453942]  show_stack+0x20/0x38 (C)
[   16.454389]  dump_stack_lvl+0x8c/0xd0
[   16.454938]  print_report+0x118/0x5d0
[   16.455207]  kasan_report+0xdc/0x128
[   16.455254]  __asan_report_store1_noabort+0x20/0x30
[   16.455674]  krealloc_more_oob_helper+0x60c/0x678
[   16.456291]  krealloc_more_oob+0x20/0x38
[   16.456476]  kunit_try_run_case+0x170/0x3f0
[   16.456526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.456926]  kthread+0x328/0x630
[   16.457258]  ret_from_fork+0x10/0x20
[   16.457377] 
[   16.457413] Allocated by task 156:
[   16.457445]  kasan_save_stack+0x3c/0x68
[   16.457634]  kasan_save_track+0x20/0x40
[   16.457708]  kasan_save_alloc_info+0x40/0x58
[   16.458183]  __kasan_krealloc+0x118/0x178
[   16.458375]  krealloc_noprof+0x128/0x360
[   16.458752]  krealloc_more_oob_helper+0x168/0x678
[   16.459065]  krealloc_more_oob+0x20/0x38
[   16.459142]  kunit_try_run_case+0x170/0x3f0
[   16.459181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.459224]  kthread+0x328/0x630
[   16.459854]  ret_from_fork+0x10/0x20
[   16.459942] 
[   16.459963] The buggy address belongs to the object at fff00000c45cfc00
[   16.459963]  which belongs to the cache kmalloc-256 of size 256
[   16.460022] The buggy address is located 0 bytes to the right of
[   16.460022]  allocated 235-byte region [fff00000c45cfc00, fff00000c45cfceb)
[   16.460084] 
[   16.460105] The buggy address belongs to the physical page:
[   16.460743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.460805] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.460853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.460907] page_type: f5(slab)
[   16.461689] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.461744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.462152] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.462462] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.462522] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.462830] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.463008] page dumped because: kasan: bad access detected
[   16.463212] 
[   16.463535] Memory state around the buggy address:
[   16.463768]  fff00000c45cfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464013]  fff00000c45cfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.464294] >fff00000c45cfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.464386]                                                           ^
[   16.464434]  fff00000c45cfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464475]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464879] ==================================================================
[   16.466676] ==================================================================
[   16.467244] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.467357] Write of size 1 at addr fff00000c45cfcf0 by task kunit_try_catch/156
[   16.467738] 
[   16.467775] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.468080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.468373] Hardware name: linux,dummy-virt (DT)
[   16.468424] Call trace:
[   16.468536]  show_stack+0x20/0x38 (C)
[   16.468834]  dump_stack_lvl+0x8c/0xd0
[   16.468883]  print_report+0x118/0x5d0
[   16.468930]  kasan_report+0xdc/0x128
[   16.468979]  __asan_report_store1_noabort+0x20/0x30
[   16.469030]  krealloc_more_oob_helper+0x5c0/0x678
[   16.469782]  krealloc_more_oob+0x20/0x38
[   16.469858]  kunit_try_run_case+0x170/0x3f0
[   16.469914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.470041]  kthread+0x328/0x630
[   16.470084]  ret_from_fork+0x10/0x20
[   16.470575] 
[   16.470896] Allocated by task 156:
[   16.471261]  kasan_save_stack+0x3c/0x68
[   16.471308]  kasan_save_track+0x20/0x40
[   16.471733]  kasan_save_alloc_info+0x40/0x58
[   16.472168]  __kasan_krealloc+0x118/0x178
[   16.472361]  krealloc_noprof+0x128/0x360
[   16.472595]  krealloc_more_oob_helper+0x168/0x678
[   16.472648]  krealloc_more_oob+0x20/0x38
[   16.472684]  kunit_try_run_case+0x170/0x3f0
[   16.472721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.472770]  kthread+0x328/0x630
[   16.473180]  ret_from_fork+0x10/0x20
[   16.473440] 
[   16.473699] The buggy address belongs to the object at fff00000c45cfc00
[   16.473699]  which belongs to the cache kmalloc-256 of size 256
[   16.474189] The buggy address is located 5 bytes to the right of
[   16.474189]  allocated 235-byte region [fff00000c45cfc00, fff00000c45cfceb)
[   16.474271] 
[   16.474293] The buggy address belongs to the physical page:
[   16.474335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.474386] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.474432] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.474483] page_type: f5(slab)
[   16.475295] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.475568] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.475888] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.476182] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.476430] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.476506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.476753] page dumped because: kasan: bad access detected
[   16.476791] 
[   16.476862] Memory state around the buggy address:
[   16.476910]  fff00000c45cfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.476953]  fff00000c45cfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.477200] >fff00000c45cfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.477430]                                                              ^
[   16.477768]  fff00000c45cfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.477976]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478576] ==================================================================
[   16.522751] ==================================================================
[   16.522803] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.522855] Write of size 1 at addr fff00000c79ba0f0 by task kunit_try_catch/160
[   16.523149] 
[   16.523435] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.523659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.523694] Hardware name: linux,dummy-virt (DT)
[   16.524013] Call trace:
[   16.524053]  show_stack+0x20/0x38 (C)
[   16.524106]  dump_stack_lvl+0x8c/0xd0
[   16.524420]  print_report+0x118/0x5d0
[   16.524500]  kasan_report+0xdc/0x128
[   16.524761]  __asan_report_store1_noabort+0x20/0x30
[   16.524890]  krealloc_more_oob_helper+0x5c0/0x678
[   16.525270]  krealloc_large_more_oob+0x20/0x38
[   16.525503]  kunit_try_run_case+0x170/0x3f0
[   16.525836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.526019]  kthread+0x328/0x630
[   16.526085]  ret_from_fork+0x10/0x20
[   16.526491] 
[   16.526591] The buggy address belongs to the physical page:
[   16.526650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.526946] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.526998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.527049] page_type: f8(unknown)
[   16.527173] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.527237] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.527305] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.527371] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.527419] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.527476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.527514] page dumped because: kasan: bad access detected
[   16.527553] 
[   16.527570] Memory state around the buggy address:
[   16.527609]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.527652]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.527691] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.527737]                                                              ^
[   16.527782]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.527823]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.527861] ==================================================================
[   16.518604] ==================================================================
[   16.518660] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.518719] Write of size 1 at addr fff00000c79ba0eb by task kunit_try_catch/160
[   16.518846] 
[   16.518940] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.519330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.519357] Hardware name: linux,dummy-virt (DT)
[   16.519386] Call trace:
[   16.519408]  show_stack+0x20/0x38 (C)
[   16.519481]  dump_stack_lvl+0x8c/0xd0
[   16.519554]  print_report+0x118/0x5d0
[   16.519601]  kasan_report+0xdc/0x128
[   16.519657]  __asan_report_store1_noabort+0x20/0x30
[   16.519708]  krealloc_more_oob_helper+0x60c/0x678
[   16.519768]  krealloc_large_more_oob+0x20/0x38
[   16.519915]  kunit_try_run_case+0x170/0x3f0
[   16.519962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.520013]  kthread+0x328/0x630
[   16.520081]  ret_from_fork+0x10/0x20
[   16.520128] 
[   16.520163] The buggy address belongs to the physical page:
[   16.520193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.520246] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.520292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.520368] page_type: f8(unknown)
[   16.520416] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.520475] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.520537] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.520719] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.520936] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.520983] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.521491] page dumped because: kasan: bad access detected
[   16.521527] 
[   16.521546] Memory state around the buggy address:
[   16.521577]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.521618]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.521659] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.521695]                                                           ^
[   16.521733]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.521774]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.521810] ==================================================================

[   16.441647] ==================================================================
[   16.441725] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.442265] Write of size 1 at addr fff00000c17c76eb by task kunit_try_catch/156
[   16.442362] 
[   16.442478] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.442580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.442661] Hardware name: linux,dummy-virt (DT)
[   16.442695] Call trace:
[   16.442756]  show_stack+0x20/0x38 (C)
[   16.442875]  dump_stack_lvl+0x8c/0xd0
[   16.442959]  print_report+0x118/0x5d0
[   16.443181]  kasan_report+0xdc/0x128
[   16.443295]  __asan_report_store1_noabort+0x20/0x30
[   16.443506]  krealloc_more_oob_helper+0x60c/0x678
[   16.443608]  krealloc_more_oob+0x20/0x38
[   16.443950]  kunit_try_run_case+0x170/0x3f0
[   16.444132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.444246]  kthread+0x328/0x630
[   16.444423]  ret_from_fork+0x10/0x20
[   16.444557] 
[   16.444840] Allocated by task 156:
[   16.445067]  kasan_save_stack+0x3c/0x68
[   16.445151]  kasan_save_track+0x20/0x40
[   16.445310]  kasan_save_alloc_info+0x40/0x58
[   16.445394]  __kasan_krealloc+0x118/0x178
[   16.445575]  krealloc_noprof+0x128/0x360
[   16.446001]  krealloc_more_oob_helper+0x168/0x678
[   16.446117]  krealloc_more_oob+0x20/0x38
[   16.446170]  kunit_try_run_case+0x170/0x3f0
[   16.446207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.446249]  kthread+0x328/0x630
[   16.446282]  ret_from_fork+0x10/0x20
[   16.446327] 
[   16.446347] The buggy address belongs to the object at fff00000c17c7600
[   16.446347]  which belongs to the cache kmalloc-256 of size 256
[   16.446405] The buggy address is located 0 bytes to the right of
[   16.446405]  allocated 235-byte region [fff00000c17c7600, fff00000c17c76eb)
[   16.446495] 
[   16.446524] The buggy address belongs to the physical page:
[   16.446563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6
[   16.446641] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.446695] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.446760] page_type: f5(slab)
[   16.446799] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.447106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.447400] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.447460] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.447509] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff
[   16.447591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.447801] page dumped because: kasan: bad access detected
[   16.447886] 
[   16.448095] Memory state around the buggy address:
[   16.448278]  fff00000c17c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.448512]  fff00000c17c7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.448612] >fff00000c17c7680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.448752]                                                           ^
[   16.448828]  fff00000c17c7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.449215]  fff00000c17c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.449751] ==================================================================
[   16.512598] ==================================================================
[   16.512702] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.512778] Write of size 1 at addr fff00000c76de0f0 by task kunit_try_catch/160
[   16.513022] 
[   16.513185] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.513274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.513300] Hardware name: linux,dummy-virt (DT)
[   16.513532] Call trace:
[   16.513710]  show_stack+0x20/0x38 (C)
[   16.513792]  dump_stack_lvl+0x8c/0xd0
[   16.514327]  print_report+0x118/0x5d0
[   16.514703]  kasan_report+0xdc/0x128
[   16.514774]  __asan_report_store1_noabort+0x20/0x30
[   16.514825]  krealloc_more_oob_helper+0x5c0/0x678
[   16.514910]  krealloc_large_more_oob+0x20/0x38
[   16.514998]  kunit_try_run_case+0x170/0x3f0
[   16.515142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.515196]  kthread+0x328/0x630
[   16.515237]  ret_from_fork+0x10/0x20
[   16.515792] 
[   16.515863] The buggy address belongs to the physical page:
[   16.515923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076dc
[   16.516405] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.516756] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.516857] page_type: f8(unknown)
[   16.516913] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.517062] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.517216] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.517337] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.517463] head: 0bfffe0000000002 ffffc1ffc31db701 00000000ffffffff 00000000ffffffff
[   16.517977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.518202] page dumped because: kasan: bad access detected
[   16.518244] 
[   16.518453] Memory state around the buggy address:
[   16.518567]  fff00000c76ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.518785]  fff00000c76de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.518831] >fff00000c76de080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.519066]                                                              ^
[   16.519403]  fff00000c76de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.519885]  fff00000c76de180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.519937] ==================================================================
[   16.451798] ==================================================================
[   16.451992] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.452053] Write of size 1 at addr fff00000c17c76f0 by task kunit_try_catch/156
[   16.452306] 
[   16.452339] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.452416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.452441] Hardware name: linux,dummy-virt (DT)
[   16.452472] Call trace:
[   16.452771]  show_stack+0x20/0x38 (C)
[   16.452867]  dump_stack_lvl+0x8c/0xd0
[   16.453088]  print_report+0x118/0x5d0
[   16.453249]  kasan_report+0xdc/0x128
[   16.453403]  __asan_report_store1_noabort+0x20/0x30
[   16.453488]  krealloc_more_oob_helper+0x5c0/0x678
[   16.453592]  krealloc_more_oob+0x20/0x38
[   16.453642]  kunit_try_run_case+0x170/0x3f0
[   16.453688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.453754]  kthread+0x328/0x630
[   16.454122]  ret_from_fork+0x10/0x20
[   16.454224] 
[   16.454281] Allocated by task 156:
[   16.454313]  kasan_save_stack+0x3c/0x68
[   16.454355]  kasan_save_track+0x20/0x40
[   16.454529]  kasan_save_alloc_info+0x40/0x58
[   16.454750]  __kasan_krealloc+0x118/0x178
[   16.454803]  krealloc_noprof+0x128/0x360
[   16.454840]  krealloc_more_oob_helper+0x168/0x678
[   16.455011]  krealloc_more_oob+0x20/0x38
[   16.455148]  kunit_try_run_case+0x170/0x3f0
[   16.455187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.455229]  kthread+0x328/0x630
[   16.455261]  ret_from_fork+0x10/0x20
[   16.455417] 
[   16.455744] The buggy address belongs to the object at fff00000c17c7600
[   16.455744]  which belongs to the cache kmalloc-256 of size 256
[   16.455865] The buggy address is located 5 bytes to the right of
[   16.455865]  allocated 235-byte region [fff00000c17c7600, fff00000c17c76eb)
[   16.456207] 
[   16.456387] The buggy address belongs to the physical page:
[   16.456461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6
[   16.456515] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.456747] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.457157] page_type: f5(slab)
[   16.457300] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.457439] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.457599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.457706] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.458071] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff
[   16.458207] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.458314] page dumped because: kasan: bad access detected
[   16.458347] 
[   16.458365] Memory state around the buggy address:
[   16.458572]  fff00000c17c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.458629]  fff00000c17c7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.458905] >fff00000c17c7680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.459426]                                                              ^
[   16.459476]  fff00000c17c7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.459521]  fff00000c17c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.459597] ==================================================================
[   16.506138] ==================================================================
[   16.506210] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.506314] Write of size 1 at addr fff00000c76de0eb by task kunit_try_catch/160
[   16.506367] 
[   16.506453] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.506625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.506652] Hardware name: linux,dummy-virt (DT)
[   16.507268] Call trace:
[   16.507370]  show_stack+0x20/0x38 (C)
[   16.507425]  dump_stack_lvl+0x8c/0xd0
[   16.507472]  print_report+0x118/0x5d0
[   16.507907]  kasan_report+0xdc/0x128
[   16.508140]  __asan_report_store1_noabort+0x20/0x30
[   16.508289]  krealloc_more_oob_helper+0x60c/0x678
[   16.508359]  krealloc_large_more_oob+0x20/0x38
[   16.508445]  kunit_try_run_case+0x170/0x3f0
[   16.508496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.508548]  kthread+0x328/0x630
[   16.508589]  ret_from_fork+0x10/0x20
[   16.508994] 
[   16.509058] The buggy address belongs to the physical page:
[   16.509092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076dc
[   16.509160] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.509215] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.509269] page_type: f8(unknown)
[   16.509324] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.509373] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.509421] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.509477] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.509523] head: 0bfffe0000000002 ffffc1ffc31db701 00000000ffffffff 00000000ffffffff
[   16.509570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.509618] page dumped because: kasan: bad access detected
[   16.509663] 
[   16.509681] Memory state around the buggy address:
[   16.510035]  fff00000c76ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.510385]  fff00000c76de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.510461] >fff00000c76de080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.510665]                                                           ^
[   16.510908]  fff00000c76de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.511061]  fff00000c76de180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.511184] ==================================================================

[   12.012243] ==================================================================
[   12.013009] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.013501] Write of size 1 at addr ffff8881039de0f0 by task kunit_try_catch/177
[   12.014683] 
[   12.014965] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.015020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.015138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.015161] Call Trace:
[   12.015173]  <TASK>
[   12.015190]  dump_stack_lvl+0x73/0xb0
[   12.015223]  print_report+0xd1/0x610
[   12.015246]  ? __virt_addr_valid+0x1db/0x2d0
[   12.015269]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.015296]  ? kasan_addr_to_slab+0x11/0xa0
[   12.015316]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.015342]  kasan_report+0x141/0x180
[   12.015363]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.015392]  __asan_report_store1_noabort+0x1b/0x30
[   12.015417]  krealloc_more_oob_helper+0x7eb/0x930
[   12.015440]  ? pick_task_fair+0xc9/0x340
[   12.015465]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.015489]  ? __schedule+0x207f/0x2b60
[   12.015509]  ? schedule+0x7c/0x2e0
[   12.015615]  ? trace_hardirqs_on+0x37/0xe0
[   12.015642]  ? __schedule+0x207f/0x2b60
[   12.015663]  ? __pfx_read_tsc+0x10/0x10
[   12.015688]  krealloc_large_more_oob+0x1c/0x30
[   12.015712]  kunit_try_run_case+0x1a5/0x480
[   12.015738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.015759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.015784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.015807]  ? __kthread_parkme+0x82/0x180
[   12.015828]  ? preempt_count_sub+0x50/0x80
[   12.015852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.015875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.015912]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.015936]  kthread+0x337/0x6f0
[   12.015954]  ? trace_preempt_on+0x20/0xc0
[   12.015975]  ? __pfx_kthread+0x10/0x10
[   12.015995]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.016016]  ? calculate_sigpending+0x7b/0xa0
[   12.016040]  ? __pfx_kthread+0x10/0x10
[   12.016061]  ret_from_fork+0x116/0x1d0
[   12.016079]  ? __pfx_kthread+0x10/0x10
[   12.016100]  ret_from_fork_asm+0x1a/0x30
[   12.016132]  </TASK>
[   12.016142] 
[   12.029410] The buggy address belongs to the physical page:
[   12.030067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039dc
[   12.030563] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.031281] flags: 0x200000000000040(head|node=0|zone=2)
[   12.031734] page_type: f8(unknown)
[   12.031887] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.032450] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.033109] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.033443] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.034105] head: 0200000000000002 ffffea00040e7701 00000000ffffffff 00000000ffffffff
[   12.034559] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.035246] page dumped because: kasan: bad access detected
[   12.035606] 
[   12.035709] Memory state around the buggy address:
[   12.035940]  ffff8881039ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.036516]  ffff8881039de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.037108] >ffff8881039de080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.037472]                                                              ^
[   12.038043]  ffff8881039de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.038361]  ffff8881039de180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.039008] ==================================================================
[   11.814822] ==================================================================
[   11.815256] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.815748] Write of size 1 at addr ffff8881003558f0 by task kunit_try_catch/173
[   11.816085] 
[   11.816190] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.816234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.816244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.816264] Call Trace:
[   11.816276]  <TASK>
[   11.816292]  dump_stack_lvl+0x73/0xb0
[   11.816320]  print_report+0xd1/0x610
[   11.816342]  ? __virt_addr_valid+0x1db/0x2d0
[   11.816365]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.816388]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.816410]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.816434]  kasan_report+0x141/0x180
[   11.816455]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.816485]  __asan_report_store1_noabort+0x1b/0x30
[   11.816509]  krealloc_more_oob_helper+0x7eb/0x930
[   11.816531]  ? trace_hardirqs_on+0x37/0xe0
[   11.816555]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.816578]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.816609]  ? __pfx_krealloc_more_oob+0x10/0x10
[   11.816636]  krealloc_more_oob+0x1c/0x30
[   11.816657]  kunit_try_run_case+0x1a5/0x480
[   11.816680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.816702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.816725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.816748]  ? __kthread_parkme+0x82/0x180
[   11.816768]  ? preempt_count_sub+0x50/0x80
[   11.816792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.816816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.816839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.816862]  kthread+0x337/0x6f0
[   11.816881]  ? trace_preempt_on+0x20/0xc0
[   11.816913]  ? __pfx_kthread+0x10/0x10
[   11.816933]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.816953]  ? calculate_sigpending+0x7b/0xa0
[   11.816977]  ? __pfx_kthread+0x10/0x10
[   11.817045]  ret_from_fork+0x116/0x1d0
[   11.817064]  ? __pfx_kthread+0x10/0x10
[   11.817083]  ret_from_fork_asm+0x1a/0x30
[   11.817116]  </TASK>
[   11.817126] 
[   11.824677] Allocated by task 173:
[   11.824807]  kasan_save_stack+0x45/0x70
[   11.824960]  kasan_save_track+0x18/0x40
[   11.825124]  kasan_save_alloc_info+0x3b/0x50
[   11.825471]  __kasan_krealloc+0x190/0x1f0
[   11.825668]  krealloc_noprof+0xf3/0x340
[   11.825857]  krealloc_more_oob_helper+0x1a9/0x930
[   11.826282]  krealloc_more_oob+0x1c/0x30
[   11.826483]  kunit_try_run_case+0x1a5/0x480
[   11.826940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.827176]  kthread+0x337/0x6f0
[   11.827340]  ret_from_fork+0x116/0x1d0
[   11.827472]  ret_from_fork_asm+0x1a/0x30
[   11.827870] 
[   11.827984] The buggy address belongs to the object at ffff888100355800
[   11.827984]  which belongs to the cache kmalloc-256 of size 256
[   11.828454] The buggy address is located 5 bytes to the right of
[   11.828454]  allocated 235-byte region [ffff888100355800, ffff8881003558eb)
[   11.828969] 
[   11.829078] The buggy address belongs to the physical page:
[   11.829328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   11.829743] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.829983] flags: 0x200000000000040(head|node=0|zone=2)
[   11.830158] page_type: f5(slab)
[   11.830277] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.830523] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.830864] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.831360] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.831772] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   11.832347] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.832766] page dumped because: kasan: bad access detected
[   11.832953] 
[   11.833114] Memory state around the buggy address:
[   11.833344]  ffff888100355780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.833746]  ffff888100355800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.834064] >ffff888100355880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.834317]                                                              ^
[   11.834525]  ffff888100355900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.835046]  ffff888100355980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.835293] ==================================================================
[   11.788921] ==================================================================
[   11.789454] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.789734] Write of size 1 at addr ffff8881003558eb by task kunit_try_catch/173
[   11.789969] 
[   11.790065] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.790110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.790121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.790143] Call Trace:
[   11.790155]  <TASK>
[   11.790173]  dump_stack_lvl+0x73/0xb0
[   11.790204]  print_report+0xd1/0x610
[   11.790226]  ? __virt_addr_valid+0x1db/0x2d0
[   11.790250]  ? krealloc_more_oob_helper+0x821/0x930
[   11.790272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.790293]  ? krealloc_more_oob_helper+0x821/0x930
[   11.790315]  kasan_report+0x141/0x180
[   11.790336]  ? krealloc_more_oob_helper+0x821/0x930
[   11.790363]  __asan_report_store1_noabort+0x1b/0x30
[   11.790386]  krealloc_more_oob_helper+0x821/0x930
[   11.790407]  ? trace_hardirqs_on+0x37/0xe0
[   11.790431]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.790453]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.790482]  ? __pfx_krealloc_more_oob+0x10/0x10
[   11.790508]  krealloc_more_oob+0x1c/0x30
[   11.790528]  kunit_try_run_case+0x1a5/0x480
[   11.790553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.790573]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.790597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.790620]  ? __kthread_parkme+0x82/0x180
[   11.790640]  ? preempt_count_sub+0x50/0x80
[   11.790664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.790686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.790708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.790730]  kthread+0x337/0x6f0
[   11.790748]  ? trace_preempt_on+0x20/0xc0
[   11.790775]  ? __pfx_kthread+0x10/0x10
[   11.790794]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.790813]  ? calculate_sigpending+0x7b/0xa0
[   11.790837]  ? __pfx_kthread+0x10/0x10
[   11.790857]  ret_from_fork+0x116/0x1d0
[   11.790876]  ? __pfx_kthread+0x10/0x10
[   11.791448]  ret_from_fork_asm+0x1a/0x30
[   11.791495]  </TASK>
[   11.791508] 
[   11.803393] Allocated by task 173:
[   11.803556]  kasan_save_stack+0x45/0x70
[   11.803837]  kasan_save_track+0x18/0x40
[   11.804057]  kasan_save_alloc_info+0x3b/0x50
[   11.804213]  __kasan_krealloc+0x190/0x1f0
[   11.804353]  krealloc_noprof+0xf3/0x340
[   11.804545]  krealloc_more_oob_helper+0x1a9/0x930
[   11.804773]  krealloc_more_oob+0x1c/0x30
[   11.804977]  kunit_try_run_case+0x1a5/0x480
[   11.805231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.805442]  kthread+0x337/0x6f0
[   11.805651]  ret_from_fork+0x116/0x1d0
[   11.805847]  ret_from_fork_asm+0x1a/0x30
[   11.806115] 
[   11.806189] The buggy address belongs to the object at ffff888100355800
[   11.806189]  which belongs to the cache kmalloc-256 of size 256
[   11.806698] The buggy address is located 0 bytes to the right of
[   11.806698]  allocated 235-byte region [ffff888100355800, ffff8881003558eb)
[   11.807151] 
[   11.807226] The buggy address belongs to the physical page:
[   11.807472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100354
[   11.808444] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.808852] flags: 0x200000000000040(head|node=0|zone=2)
[   11.809167] page_type: f5(slab)
[   11.809337] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.809663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.810022] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.810416] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.810771] head: 0200000000000001 ffffea000400d501 00000000ffffffff 00000000ffffffff
[   11.811145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.811398] page dumped because: kasan: bad access detected
[   11.811778] 
[   11.811860] Memory state around the buggy address:
[   11.812027]  ffff888100355780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.812395]  ffff888100355800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.812776] >ffff888100355880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.813204]                                                           ^
[   11.813653]  ffff888100355900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.813944]  ffff888100355980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.814280] ==================================================================
[   11.988242] ==================================================================
[   11.988722] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.989426] Write of size 1 at addr ffff8881039de0eb by task kunit_try_catch/177
[   11.989887] 
[   11.990026] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.990084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.990095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.990130] Call Trace:
[   11.990143]  <TASK>
[   11.990161]  dump_stack_lvl+0x73/0xb0
[   11.990205]  print_report+0xd1/0x610
[   11.990228]  ? __virt_addr_valid+0x1db/0x2d0
[   11.990261]  ? krealloc_more_oob_helper+0x821/0x930
[   11.990285]  ? kasan_addr_to_slab+0x11/0xa0
[   11.990305]  ? krealloc_more_oob_helper+0x821/0x930
[   11.990341]  kasan_report+0x141/0x180
[   11.990364]  ? krealloc_more_oob_helper+0x821/0x930
[   11.990393]  __asan_report_store1_noabort+0x1b/0x30
[   11.990417]  krealloc_more_oob_helper+0x821/0x930
[   11.990441]  ? pick_task_fair+0xc9/0x340
[   11.990467]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.990491]  ? __schedule+0x207f/0x2b60
[   11.990521]  ? schedule+0x7c/0x2e0
[   11.990540]  ? trace_hardirqs_on+0x37/0xe0
[   11.990565]  ? __schedule+0x207f/0x2b60
[   11.990596]  ? __pfx_read_tsc+0x10/0x10
[   11.990620]  krealloc_large_more_oob+0x1c/0x30
[   11.990643]  kunit_try_run_case+0x1a5/0x480
[   11.990668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.990690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.990715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.990788]  ? __kthread_parkme+0x82/0x180
[   11.990810]  ? preempt_count_sub+0x50/0x80
[   11.990862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.990886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.990922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.990945]  kthread+0x337/0x6f0
[   11.990964]  ? trace_preempt_on+0x20/0xc0
[   11.990996]  ? __pfx_kthread+0x10/0x10
[   11.991016]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.991037]  ? calculate_sigpending+0x7b/0xa0
[   11.991062]  ? __pfx_kthread+0x10/0x10
[   11.991083]  ret_from_fork+0x116/0x1d0
[   11.991102]  ? __pfx_kthread+0x10/0x10
[   11.991122]  ret_from_fork_asm+0x1a/0x30
[   11.991155]  </TASK>
[   11.991166] 
[   12.002119] The buggy address belongs to the physical page:
[   12.002387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039dc
[   12.002997] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.003471] flags: 0x200000000000040(head|node=0|zone=2)
[   12.003885] page_type: f8(unknown)
[   12.004129] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.004836] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.005281] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.005924] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.006412] head: 0200000000000002 ffffea00040e7701 00000000ffffffff 00000000ffffffff
[   12.006977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.007359] page dumped because: kasan: bad access detected
[   12.007564] 
[   12.007711] Memory state around the buggy address:
[   12.007939]  ffff8881039ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.008759]  ffff8881039de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.009206] >ffff8881039de080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.009532]                                                           ^
[   12.010347]  ffff8881039de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.010964]  ffff8881039de180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.011384] ==================================================================

[   11.622039] ==================================================================
[   11.622859] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.623536] Write of size 1 at addr ffff888100a282f0 by task kunit_try_catch/174
[   11.624662] 
[   11.624842] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.624885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.624896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.624917] Call Trace:
[   11.624928]  <TASK>
[   11.624942]  dump_stack_lvl+0x73/0xb0
[   11.624973]  print_report+0xd1/0x610
[   11.624996]  ? __virt_addr_valid+0x1db/0x2d0
[   11.625019]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.625044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.625068]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.625094]  kasan_report+0x141/0x180
[   11.625117]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.625154]  __asan_report_store1_noabort+0x1b/0x30
[   11.625180]  krealloc_more_oob_helper+0x7eb/0x930
[   11.625203]  ? __schedule+0x10cc/0x2b60
[   11.625227]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.625253]  ? finish_task_switch.isra.0+0x153/0x700
[   11.625277]  ? __switch_to+0x47/0xf50
[   11.625303]  ? __schedule+0x10cc/0x2b60
[   11.625325]  ? __pfx_read_tsc+0x10/0x10
[   11.625349]  krealloc_more_oob+0x1c/0x30
[   11.625372]  kunit_try_run_case+0x1a5/0x480
[   11.625397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.625443]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.625469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.625494]  ? __kthread_parkme+0x82/0x180
[   11.625515]  ? preempt_count_sub+0x50/0x80
[   11.625540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.625565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.625590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.625616]  kthread+0x337/0x6f0
[   11.625635]  ? trace_preempt_on+0x20/0xc0
[   11.625659]  ? __pfx_kthread+0x10/0x10
[   11.625679]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.625702]  ? calculate_sigpending+0x7b/0xa0
[   11.625727]  ? __pfx_kthread+0x10/0x10
[   11.625749]  ret_from_fork+0x116/0x1d0
[   11.625768]  ? __pfx_kthread+0x10/0x10
[   11.625789]  ret_from_fork_asm+0x1a/0x30
[   11.625823]  </TASK>
[   11.625833] 
[   11.636097] Allocated by task 174:
[   11.636245]  kasan_save_stack+0x45/0x70
[   11.636394]  kasan_save_track+0x18/0x40
[   11.636541]  kasan_save_alloc_info+0x3b/0x50
[   11.636723]  __kasan_krealloc+0x190/0x1f0
[   11.636916]  krealloc_noprof+0xf3/0x340
[   11.637106]  krealloc_more_oob_helper+0x1a9/0x930
[   11.637557]  krealloc_more_oob+0x1c/0x30
[   11.637716]  kunit_try_run_case+0x1a5/0x480
[   11.637864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.638089]  kthread+0x337/0x6f0
[   11.638259]  ret_from_fork+0x116/0x1d0
[   11.638515]  ret_from_fork_asm+0x1a/0x30
[   11.638727] 
[   11.638823] The buggy address belongs to the object at ffff888100a28200
[   11.638823]  which belongs to the cache kmalloc-256 of size 256
[   11.639289] The buggy address is located 5 bytes to the right of
[   11.639289]  allocated 235-byte region [ffff888100a28200, ffff888100a282eb)
[   11.639879] 
[   11.639973] The buggy address belongs to the physical page:
[   11.640197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   11.640601] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.640900] flags: 0x200000000000040(head|node=0|zone=2)
[   11.641157] page_type: f5(slab)
[   11.641334] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.641865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.642201] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.642754] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.643074] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   11.643481] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.643804] page dumped because: kasan: bad access detected
[   11.643979] 
[   11.644048] Memory state around the buggy address:
[   11.644226]  ffff888100a28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.644560]  ffff888100a28200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.644880] >ffff888100a28280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.645185]                                                              ^
[   11.645395]  ffff888100a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.645731]  ffff888100a28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.646063] ==================================================================
[   11.785857] ==================================================================
[   11.786153] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.786553] Write of size 1 at addr ffff88810282a0f0 by task kunit_try_catch/178
[   11.786866] 
[   11.786974] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.787015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.787025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.787044] Call Trace:
[   11.787054]  <TASK>
[   11.787068]  dump_stack_lvl+0x73/0xb0
[   11.787094]  print_report+0xd1/0x610
[   11.787115]  ? __virt_addr_valid+0x1db/0x2d0
[   11.787136]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.787159]  ? kasan_addr_to_slab+0x11/0xa0
[   11.787178]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.787201]  kasan_report+0x141/0x180
[   11.787222]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.787251]  __asan_report_store1_noabort+0x1b/0x30
[   11.787275]  krealloc_more_oob_helper+0x7eb/0x930
[   11.787296]  ? __schedule+0x10cc/0x2b60
[   11.787318]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.787341]  ? finish_task_switch.isra.0+0x153/0x700
[   11.787362]  ? __switch_to+0x47/0xf50
[   11.787491]  ? __schedule+0x10cc/0x2b60
[   11.787550]  ? __pfx_read_tsc+0x10/0x10
[   11.787574]  krealloc_large_more_oob+0x1c/0x30
[   11.787597]  kunit_try_run_case+0x1a5/0x480
[   11.787620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.787642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.787665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.787688]  ? __kthread_parkme+0x82/0x180
[   11.787708]  ? preempt_count_sub+0x50/0x80
[   11.787731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.787754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.787777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.787800]  kthread+0x337/0x6f0
[   11.787818]  ? trace_preempt_on+0x20/0xc0
[   11.787839]  ? __pfx_kthread+0x10/0x10
[   11.787859]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.787879]  ? calculate_sigpending+0x7b/0xa0
[   11.787902]  ? __pfx_kthread+0x10/0x10
[   11.787922]  ret_from_fork+0x116/0x1d0
[   11.787940]  ? __pfx_kthread+0x10/0x10
[   11.787959]  ret_from_fork_asm+0x1a/0x30
[   11.787990]  </TASK>
[   11.787999] 
[   11.802954] The buggy address belongs to the physical page:
[   11.803302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102828
[   11.803634] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.804580] flags: 0x200000000000040(head|node=0|zone=2)
[   11.805091] page_type: f8(unknown)
[   11.805430] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.806192] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.806857] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.807271] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.807782] head: 0200000000000002 ffffea00040a0a01 00000000ffffffff 00000000ffffffff
[   11.808554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.809684] page dumped because: kasan: bad access detected
[   11.809943] 
[   11.810017] Memory state around the buggy address:
[   11.810169]  ffff888102829f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.810381]  ffff88810282a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.811538] >ffff88810282a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.812220]                                                              ^
[   11.812949]  ffff88810282a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.813774]  ffff88810282a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.814257] ==================================================================
[   11.766126] ==================================================================
[   11.766761] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.767123] Write of size 1 at addr ffff88810282a0eb by task kunit_try_catch/178
[   11.767429] 
[   11.767535] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.767580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.767590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.767610] Call Trace:
[   11.767623]  <TASK>
[   11.767637]  dump_stack_lvl+0x73/0xb0
[   11.767664]  print_report+0xd1/0x610
[   11.767683]  ? __virt_addr_valid+0x1db/0x2d0
[   11.767704]  ? krealloc_more_oob_helper+0x821/0x930
[   11.767726]  ? kasan_addr_to_slab+0x11/0xa0
[   11.767744]  ? krealloc_more_oob_helper+0x821/0x930
[   11.767767]  kasan_report+0x141/0x180
[   11.767787]  ? krealloc_more_oob_helper+0x821/0x930
[   11.767815]  __asan_report_store1_noabort+0x1b/0x30
[   11.767838]  krealloc_more_oob_helper+0x821/0x930
[   11.767858]  ? __schedule+0x10cc/0x2b60
[   11.767880]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.767902]  ? finish_task_switch.isra.0+0x153/0x700
[   11.767923]  ? __switch_to+0x47/0xf50
[   11.767948]  ? __schedule+0x10cc/0x2b60
[   11.767968]  ? __pfx_read_tsc+0x10/0x10
[   11.767992]  krealloc_large_more_oob+0x1c/0x30
[   11.768013]  kunit_try_run_case+0x1a5/0x480
[   11.768035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.768056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.768077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.768099]  ? __kthread_parkme+0x82/0x180
[   11.768118]  ? preempt_count_sub+0x50/0x80
[   11.768141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.768163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.768185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.768207]  kthread+0x337/0x6f0
[   11.768225]  ? trace_preempt_on+0x20/0xc0
[   11.768246]  ? __pfx_kthread+0x10/0x10
[   11.768265]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.768284]  ? calculate_sigpending+0x7b/0xa0
[   11.768307]  ? __pfx_kthread+0x10/0x10
[   11.768326]  ret_from_fork+0x116/0x1d0
[   11.768343]  ? __pfx_kthread+0x10/0x10
[   11.768362]  ret_from_fork_asm+0x1a/0x30
[   11.768393]  </TASK>
[   11.768401] 
[   11.777800] The buggy address belongs to the physical page:
[   11.778003] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102828
[   11.778487] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.778843] flags: 0x200000000000040(head|node=0|zone=2)
[   11.779112] page_type: f8(unknown)
[   11.779290] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.779721] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.780045] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.780362] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.780939] head: 0200000000000002 ffffea00040a0a01 00000000ffffffff 00000000ffffffff
[   11.781269] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.781767] page dumped because: kasan: bad access detected
[   11.782041] 
[   11.782110] Memory state around the buggy address:
[   11.782327]  ffff888102829f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.782813]  ffff88810282a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.783099] >ffff88810282a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.783576]                                                           ^
[   11.783846]  ffff88810282a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.784185]  ffff88810282a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.784673] ==================================================================
[   11.585218] ==================================================================
[   11.585832] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.586199] Write of size 1 at addr ffff888100a282eb by task kunit_try_catch/174
[   11.586719] 
[   11.587013] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.587095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.587107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.587128] Call Trace:
[   11.587140]  <TASK>
[   11.587156]  dump_stack_lvl+0x73/0xb0
[   11.587188]  print_report+0xd1/0x610
[   11.587212]  ? __virt_addr_valid+0x1db/0x2d0
[   11.587236]  ? krealloc_more_oob_helper+0x821/0x930
[   11.587261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.587285]  ? krealloc_more_oob_helper+0x821/0x930
[   11.587310]  kasan_report+0x141/0x180
[   11.587333]  ? krealloc_more_oob_helper+0x821/0x930
[   11.587363]  __asan_report_store1_noabort+0x1b/0x30
[   11.587389]  krealloc_more_oob_helper+0x821/0x930
[   11.587424]  ? __schedule+0x10cc/0x2b60
[   11.587459]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.587484]  ? finish_task_switch.isra.0+0x153/0x700
[   11.587509]  ? __switch_to+0x47/0xf50
[   11.587537]  ? __schedule+0x10cc/0x2b60
[   11.587559]  ? __pfx_read_tsc+0x10/0x10
[   11.587585]  krealloc_more_oob+0x1c/0x30
[   11.587608]  kunit_try_run_case+0x1a5/0x480
[   11.587635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.587658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.587684]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.587709]  ? __kthread_parkme+0x82/0x180
[   11.587730]  ? preempt_count_sub+0x50/0x80
[   11.587755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.587779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.587804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.587829]  kthread+0x337/0x6f0
[   11.587849]  ? trace_preempt_on+0x20/0xc0
[   11.587872]  ? __pfx_kthread+0x10/0x10
[   11.587893]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.587916]  ? calculate_sigpending+0x7b/0xa0
[   11.587940]  ? __pfx_kthread+0x10/0x10
[   11.587962]  ret_from_fork+0x116/0x1d0
[   11.587981]  ? __pfx_kthread+0x10/0x10
[   11.588002]  ret_from_fork_asm+0x1a/0x30
[   11.588035]  </TASK>
[   11.588045] 
[   11.604581] Allocated by task 174:
[   11.604920]  kasan_save_stack+0x45/0x70
[   11.605081]  kasan_save_track+0x18/0x40
[   11.605225]  kasan_save_alloc_info+0x3b/0x50
[   11.605376]  __kasan_krealloc+0x190/0x1f0
[   11.605880]  krealloc_noprof+0xf3/0x340
[   11.606240]  krealloc_more_oob_helper+0x1a9/0x930
[   11.606775]  krealloc_more_oob+0x1c/0x30
[   11.607156]  kunit_try_run_case+0x1a5/0x480
[   11.607607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.608095]  kthread+0x337/0x6f0
[   11.608402]  ret_from_fork+0x116/0x1d0
[   11.608669]  ret_from_fork_asm+0x1a/0x30
[   11.609036] 
[   11.609173] The buggy address belongs to the object at ffff888100a28200
[   11.609173]  which belongs to the cache kmalloc-256 of size 256
[   11.609973] The buggy address is located 0 bytes to the right of
[   11.609973]  allocated 235-byte region [ffff888100a28200, ffff888100a282eb)
[   11.610349] 
[   11.610508] The buggy address belongs to the physical page:
[   11.611002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   11.611756] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.612382] flags: 0x200000000000040(head|node=0|zone=2)
[   11.612948] page_type: f5(slab)
[   11.613268] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.613961] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.614231] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.614665] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.615562] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   11.616341] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.617064] page dumped because: kasan: bad access detected
[   11.617248] 
[   11.617319] Memory state around the buggy address:
[   11.617664]  ffff888100a28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.618254]  ffff888100a28200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.618926] >ffff888100a28280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.619575]                                                           ^
[   11.619934]  ffff888100a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.620156]  ffff888100a28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.620373] ==================================================================

[   11.921960] ==================================================================
[   11.922295] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.922619] Write of size 1 at addr ffff888102a060f0 by task kunit_try_catch/177
[   11.922842] 
[   11.922928] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.922971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.922982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.923003] Call Trace:
[   11.923026]  <TASK>
[   11.923043]  dump_stack_lvl+0x73/0xb0
[   11.923071]  print_report+0xd1/0x610
[   11.923104]  ? __virt_addr_valid+0x1db/0x2d0
[   11.923126]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.923149]  ? kasan_addr_to_slab+0x11/0xa0
[   11.923169]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.923192]  kasan_report+0x141/0x180
[   11.923213]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.923241]  __asan_report_store1_noabort+0x1b/0x30
[   11.923266]  krealloc_more_oob_helper+0x7eb/0x930
[   11.923288]  ? __schedule+0x10cc/0x2b60
[   11.923309]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.923333]  ? finish_task_switch.isra.0+0x153/0x700
[   11.923355]  ? __switch_to+0x47/0xf50
[   11.923380]  ? __schedule+0x10cc/0x2b60
[   11.923400]  ? __pfx_read_tsc+0x10/0x10
[   11.923435]  krealloc_large_more_oob+0x1c/0x30
[   11.923464]  kunit_try_run_case+0x1a5/0x480
[   11.923488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.923553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.923576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.923599]  ? __kthread_parkme+0x82/0x180
[   11.923619]  ? preempt_count_sub+0x50/0x80
[   11.923642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.923664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.923689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.923713]  kthread+0x337/0x6f0
[   11.923731]  ? trace_preempt_on+0x20/0xc0
[   11.923754]  ? __pfx_kthread+0x10/0x10
[   11.923783]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.923804]  ? calculate_sigpending+0x7b/0xa0
[   11.923828]  ? __pfx_kthread+0x10/0x10
[   11.923854]  ret_from_fork+0x116/0x1d0
[   11.923873]  ? __pfx_kthread+0x10/0x10
[   11.923892]  ret_from_fork_asm+0x1a/0x30
[   11.923922]  </TASK>
[   11.923931] 
[   11.932971] The buggy address belongs to the physical page:
[   11.933174] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a04
[   11.933421] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.934067] flags: 0x200000000000040(head|node=0|zone=2)
[   11.934627] page_type: f8(unknown)
[   11.934808] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.935215] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.935767] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.937572] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.937819] head: 0200000000000002 ffffea00040a8101 00000000ffffffff 00000000ffffffff
[   11.938065] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.938301] page dumped because: kasan: bad access detected
[   11.938890] 
[   11.939164] Memory state around the buggy address:
[   11.939419]  ffff888102a05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.939710]  ffff888102a06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.940000] >ffff888102a06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.940234]                                                              ^
[   11.940563]  ffff888102a06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.940983]  ffff888102a06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.941267] ==================================================================
[   11.703718] ==================================================================
[   11.704231] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.704606] Write of size 1 at addr ffff8881003488eb by task kunit_try_catch/173
[   11.705138] 
[   11.705242] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.705292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.705303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.705325] Call Trace:
[   11.705336]  <TASK>
[   11.705354]  dump_stack_lvl+0x73/0xb0
[   11.705388]  print_report+0xd1/0x610
[   11.705411]  ? __virt_addr_valid+0x1db/0x2d0
[   11.705435]  ? krealloc_more_oob_helper+0x821/0x930
[   11.705577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.705601]  ? krealloc_more_oob_helper+0x821/0x930
[   11.705624]  kasan_report+0x141/0x180
[   11.705646]  ? krealloc_more_oob_helper+0x821/0x930
[   11.705674]  __asan_report_store1_noabort+0x1b/0x30
[   11.705698]  krealloc_more_oob_helper+0x821/0x930
[   11.705720]  ? __schedule+0x10cc/0x2b60
[   11.705742]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.705766]  ? finish_task_switch.isra.0+0x153/0x700
[   11.705789]  ? __switch_to+0x47/0xf50
[   11.705815]  ? __schedule+0x10cc/0x2b60
[   11.705835]  ? __pfx_read_tsc+0x10/0x10
[   11.705859]  krealloc_more_oob+0x1c/0x30
[   11.705880]  kunit_try_run_case+0x1a5/0x480
[   11.705905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.705926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.705950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.705973]  ? __kthread_parkme+0x82/0x180
[   11.705996]  ? preempt_count_sub+0x50/0x80
[   11.706043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.706066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.706091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.706116]  kthread+0x337/0x6f0
[   11.706135]  ? trace_preempt_on+0x20/0xc0
[   11.706158]  ? __pfx_kthread+0x10/0x10
[   11.706177]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.706198]  ? calculate_sigpending+0x7b/0xa0
[   11.706223]  ? __pfx_kthread+0x10/0x10
[   11.706243]  ret_from_fork+0x116/0x1d0
[   11.706261]  ? __pfx_kthread+0x10/0x10
[   11.706281]  ret_from_fork_asm+0x1a/0x30
[   11.706312]  </TASK>
[   11.706322] 
[   11.713904] Allocated by task 173:
[   11.714110]  kasan_save_stack+0x45/0x70
[   11.714269]  kasan_save_track+0x18/0x40
[   11.714403]  kasan_save_alloc_info+0x3b/0x50
[   11.714625]  __kasan_krealloc+0x190/0x1f0
[   11.714827]  krealloc_noprof+0xf3/0x340
[   11.715030]  krealloc_more_oob_helper+0x1a9/0x930
[   11.715260]  krealloc_more_oob+0x1c/0x30
[   11.715463]  kunit_try_run_case+0x1a5/0x480
[   11.715630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.715870]  kthread+0x337/0x6f0
[   11.715998]  ret_from_fork+0x116/0x1d0
[   11.716143]  ret_from_fork_asm+0x1a/0x30
[   11.716287] 
[   11.716387] The buggy address belongs to the object at ffff888100348800
[   11.716387]  which belongs to the cache kmalloc-256 of size 256
[   11.716948] The buggy address is located 0 bytes to the right of
[   11.716948]  allocated 235-byte region [ffff888100348800, ffff8881003488eb)
[   11.717344] 
[   11.717419] The buggy address belongs to the physical page:
[   11.717840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   11.718198] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.718622] flags: 0x200000000000040(head|node=0|zone=2)
[   11.718803] page_type: f5(slab)
[   11.718929] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.719289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.719694] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.719962] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.720313] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   11.720625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.720925] page dumped because: kasan: bad access detected
[   11.721145] 
[   11.721238] Memory state around the buggy address:
[   11.721444]  ffff888100348780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.721701]  ffff888100348800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.721916] >ffff888100348880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.722196]                                                           ^
[   11.722493]  ffff888100348900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.722805]  ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.723173] ==================================================================
[   11.905470] ==================================================================
[   11.905946] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   11.906306] Write of size 1 at addr ffff888102a060eb by task kunit_try_catch/177
[   11.906677] 
[   11.906793] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.906840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.906851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.906883] Call Trace:
[   11.906896]  <TASK>
[   11.906914]  dump_stack_lvl+0x73/0xb0
[   11.906957]  print_report+0xd1/0x610
[   11.906980]  ? __virt_addr_valid+0x1db/0x2d0
[   11.907004]  ? krealloc_more_oob_helper+0x821/0x930
[   11.907040]  ? kasan_addr_to_slab+0x11/0xa0
[   11.907060]  ? krealloc_more_oob_helper+0x821/0x930
[   11.907083]  kasan_report+0x141/0x180
[   11.907114]  ? krealloc_more_oob_helper+0x821/0x930
[   11.907141]  __asan_report_store1_noabort+0x1b/0x30
[   11.907166]  krealloc_more_oob_helper+0x821/0x930
[   11.907199]  ? __schedule+0x10cc/0x2b60
[   11.907221]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.907246]  ? finish_task_switch.isra.0+0x153/0x700
[   11.907268]  ? __switch_to+0x47/0xf50
[   11.907302]  ? __schedule+0x10cc/0x2b60
[   11.907322]  ? __pfx_read_tsc+0x10/0x10
[   11.907356]  krealloc_large_more_oob+0x1c/0x30
[   11.907379]  kunit_try_run_case+0x1a5/0x480
[   11.907403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.907424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.907461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.907485]  ? __kthread_parkme+0x82/0x180
[   11.907505]  ? preempt_count_sub+0x50/0x80
[   11.907527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.907550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.907573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.907596]  kthread+0x337/0x6f0
[   11.907614]  ? trace_preempt_on+0x20/0xc0
[   11.907646]  ? __pfx_kthread+0x10/0x10
[   11.907665]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.907686]  ? calculate_sigpending+0x7b/0xa0
[   11.907720]  ? __pfx_kthread+0x10/0x10
[   11.907740]  ret_from_fork+0x116/0x1d0
[   11.907759]  ? __pfx_kthread+0x10/0x10
[   11.907778]  ret_from_fork_asm+0x1a/0x30
[   11.907807]  </TASK>
[   11.907818] 
[   11.915336] The buggy address belongs to the physical page:
[   11.915606] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a04
[   11.915944] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.916175] flags: 0x200000000000040(head|node=0|zone=2)
[   11.916383] page_type: f8(unknown)
[   11.916709] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.917067] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.917291] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.917745] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.918099] head: 0200000000000002 ffffea00040a8101 00000000ffffffff 00000000ffffffff
[   11.918400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.918733] page dumped because: kasan: bad access detected
[   11.918910] 
[   11.918990] Memory state around the buggy address:
[   11.919225]  ffff888102a05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.919684]  ffff888102a06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.919983] >ffff888102a06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.920247]                                                           ^
[   11.920549]  ffff888102a06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.920834]  ffff888102a06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.921157] ==================================================================
[   11.725343] ==================================================================
[   11.725891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   11.726325] Write of size 1 at addr ffff8881003488f0 by task kunit_try_catch/173
[   11.726598] 
[   11.726715] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.726762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.726773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.726796] Call Trace:
[   11.726812]  <TASK>
[   11.726832]  dump_stack_lvl+0x73/0xb0
[   11.726864]  print_report+0xd1/0x610
[   11.726888]  ? __virt_addr_valid+0x1db/0x2d0
[   11.726913]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.726936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.726958]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.726981]  kasan_report+0x141/0x180
[   11.727002]  ? krealloc_more_oob_helper+0x7eb/0x930
[   11.727044]  __asan_report_store1_noabort+0x1b/0x30
[   11.727069]  krealloc_more_oob_helper+0x7eb/0x930
[   11.727091]  ? __schedule+0x10cc/0x2b60
[   11.727114]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.727138]  ? finish_task_switch.isra.0+0x153/0x700
[   11.727163]  ? __switch_to+0x47/0xf50
[   11.727189]  ? __schedule+0x10cc/0x2b60
[   11.727209]  ? __pfx_read_tsc+0x10/0x10
[   11.727249]  krealloc_more_oob+0x1c/0x30
[   11.727270]  kunit_try_run_case+0x1a5/0x480
[   11.727297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.727318]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.727343]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.727366]  ? __kthread_parkme+0x82/0x180
[   11.727387]  ? preempt_count_sub+0x50/0x80
[   11.727410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.727433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.727456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.727479]  kthread+0x337/0x6f0
[   11.727498]  ? trace_preempt_on+0x20/0xc0
[   11.727522]  ? __pfx_kthread+0x10/0x10
[   11.727541]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.727562]  ? calculate_sigpending+0x7b/0xa0
[   11.727586]  ? __pfx_kthread+0x10/0x10
[   11.727607]  ret_from_fork+0x116/0x1d0
[   11.727625]  ? __pfx_kthread+0x10/0x10
[   11.727644]  ret_from_fork_asm+0x1a/0x30
[   11.727675]  </TASK>
[   11.727685] 
[   11.735022] Allocated by task 173:
[   11.735207]  kasan_save_stack+0x45/0x70
[   11.735422]  kasan_save_track+0x18/0x40
[   11.735572]  kasan_save_alloc_info+0x3b/0x50
[   11.735720]  __kasan_krealloc+0x190/0x1f0
[   11.735859]  krealloc_noprof+0xf3/0x340
[   11.735994]  krealloc_more_oob_helper+0x1a9/0x930
[   11.736162]  krealloc_more_oob+0x1c/0x30
[   11.736362]  kunit_try_run_case+0x1a5/0x480
[   11.736564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.736813]  kthread+0x337/0x6f0
[   11.736988]  ret_from_fork+0x116/0x1d0
[   11.737178]  ret_from_fork_asm+0x1a/0x30
[   11.737454] 
[   11.737644] The buggy address belongs to the object at ffff888100348800
[   11.737644]  which belongs to the cache kmalloc-256 of size 256
[   11.738068] The buggy address is located 5 bytes to the right of
[   11.738068]  allocated 235-byte region [ffff888100348800, ffff8881003488eb)
[   11.738665] 
[   11.738737] The buggy address belongs to the physical page:
[   11.738992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348
[   11.739325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.739674] flags: 0x200000000000040(head|node=0|zone=2)
[   11.739901] page_type: f5(slab)
[   11.740063] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.740338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.740696] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.741027] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.741329] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff
[   11.741653] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.741959] page dumped because: kasan: bad access detected
[   11.742193] 
[   11.742290] Memory state around the buggy address:
[   11.742499]  ffff888100348780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.742795]  ffff888100348800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.743089] >ffff888100348880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   11.743302]                                                              ^
[   11.743716]  ffff888100348900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.744036]  ffff888100348980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.744318] ==================================================================