Hay
Date
July 20, 2025, 8:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.033655] ==================================================================
[   15.033703] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.033752] Write of size 1 at addr fff00000c5f4b6d0 by task kunit_try_catch/159
[   15.033801] 
[   15.033829] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.033907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.034108] Hardware name: linux,dummy-virt (DT)
[   15.034356] Call trace:
[   15.034382]  show_stack+0x20/0x38 (C)
[   15.034461]  dump_stack_lvl+0x8c/0xd0
[   15.034676]  print_report+0x118/0x5d0
[   15.034861]  kasan_report+0xdc/0x128
[   15.034945]  __asan_report_store1_noabort+0x20/0x30
[   15.034999]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.035116]  krealloc_less_oob+0x20/0x38
[   15.035181]  kunit_try_run_case+0x170/0x3f0
[   15.035327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.035489]  kthread+0x328/0x630
[   15.035544]  ret_from_fork+0x10/0x20
[   15.035591] 
[   15.035609] Allocated by task 159:
[   15.035637]  kasan_save_stack+0x3c/0x68
[   15.035698]  kasan_save_track+0x20/0x40
[   15.035738]  kasan_save_alloc_info+0x40/0x58
[   15.035790]  __kasan_krealloc+0x118/0x178
[   15.035827]  krealloc_noprof+0x128/0x360
[   15.035863]  krealloc_less_oob_helper+0x168/0xc50
[   15.035900]  krealloc_less_oob+0x20/0x38
[   15.035935]  kunit_try_run_case+0x170/0x3f0
[   15.035971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.036012]  kthread+0x328/0x630
[   15.036043]  ret_from_fork+0x10/0x20
[   15.036077] 
[   15.036096] The buggy address belongs to the object at fff00000c5f4b600
[   15.036096]  which belongs to the cache kmalloc-256 of size 256
[   15.036150] The buggy address is located 7 bytes to the right of
[   15.036150]  allocated 201-byte region [fff00000c5f4b600, fff00000c5f4b6c9)
[   15.036524] 
[   15.036549] The buggy address belongs to the physical page:
[   15.036580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f4a
[   15.036860] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.037239] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.037359] page_type: f5(slab)
[   15.037406] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.037536] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.037588] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.037635] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.037859] head: 0bfffe0000000001 ffffc1ffc317d281 00000000ffffffff 00000000ffffffff
[   15.038047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.038138] page dumped because: kasan: bad access detected
[   15.038242] 
[   15.038304] Memory state around the buggy address:
[   15.038374]  fff00000c5f4b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.038738]  fff00000c5f4b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.038804] >fff00000c5f4b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.038857]                                                  ^
[   15.038910]  fff00000c5f4b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039120]  fff00000c5f4b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039307] ==================================================================
[   15.116132] ==================================================================
[   15.116177] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.116248] Write of size 1 at addr fff00000c769e0eb by task kunit_try_catch/163
[   15.116307] 
[   15.116359] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.116446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.116473] Hardware name: linux,dummy-virt (DT)
[   15.116512] Call trace:
[   15.116543]  show_stack+0x20/0x38 (C)
[   15.116700]  dump_stack_lvl+0x8c/0xd0
[   15.116990]  print_report+0x118/0x5d0
[   15.117123]  kasan_report+0xdc/0x128
[   15.117286]  __asan_report_store1_noabort+0x20/0x30
[   15.117484]  krealloc_less_oob_helper+0xa58/0xc50
[   15.117565]  krealloc_large_less_oob+0x20/0x38
[   15.117652]  kunit_try_run_case+0x170/0x3f0
[   15.117712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.117784]  kthread+0x328/0x630
[   15.118177]  ret_from_fork+0x10/0x20
[   15.118351] 
[   15.118413] The buggy address belongs to the physical page:
[   15.118451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10769c
[   15.118881] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.118974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.119084] page_type: f8(unknown)
[   15.119141] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.119398] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.119687] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.119967] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.120020] head: 0bfffe0000000002 ffffc1ffc31da701 00000000ffffffff 00000000ffffffff
[   15.120512] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.120595] page dumped because: kasan: bad access detected
[   15.120951] 
[   15.121015] Memory state around the buggy address:
[   15.121109]  fff00000c769df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.121488]  fff00000c769e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.121566] >fff00000c769e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.121663]                                                           ^
[   15.121742]  fff00000c769e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.121791]  fff00000c769e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.122086] ==================================================================
[   15.050481] ==================================================================
[   15.050526] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.050572] Write of size 1 at addr fff00000c5f4b6ea by task kunit_try_catch/159
[   15.050761] 
[   15.050803] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.050882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.050909] Hardware name: linux,dummy-virt (DT)
[   15.050962] Call trace:
[   15.050985]  show_stack+0x20/0x38 (C)
[   15.051035]  dump_stack_lvl+0x8c/0xd0
[   15.051082]  print_report+0x118/0x5d0
[   15.051127]  kasan_report+0xdc/0x128
[   15.051176]  __asan_report_store1_noabort+0x20/0x30
[   15.051241]  krealloc_less_oob_helper+0xae4/0xc50
[   15.051288]  krealloc_less_oob+0x20/0x38
[   15.051333]  kunit_try_run_case+0x170/0x3f0
[   15.051379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.051430]  kthread+0x328/0x630
[   15.051471]  ret_from_fork+0x10/0x20
[   15.051517] 
[   15.051536] Allocated by task 159:
[   15.051563]  kasan_save_stack+0x3c/0x68
[   15.051602]  kasan_save_track+0x20/0x40
[   15.051639]  kasan_save_alloc_info+0x40/0x58
[   15.051677]  __kasan_krealloc+0x118/0x178
[   15.051713]  krealloc_noprof+0x128/0x360
[   15.051749]  krealloc_less_oob_helper+0x168/0xc50
[   15.051787]  krealloc_less_oob+0x20/0x38
[   15.051822]  kunit_try_run_case+0x170/0x3f0
[   15.051859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.051900]  kthread+0x328/0x630
[   15.051942]  ret_from_fork+0x10/0x20
[   15.051978] 
[   15.051996] The buggy address belongs to the object at fff00000c5f4b600
[   15.051996]  which belongs to the cache kmalloc-256 of size 256
[   15.052059] The buggy address is located 33 bytes to the right of
[   15.052059]  allocated 201-byte region [fff00000c5f4b600, fff00000c5f4b6c9)
[   15.052123] 
[   15.052143] The buggy address belongs to the physical page:
[   15.052171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f4a
[   15.053089] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.053199] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.053271] page_type: f5(slab)
[   15.053493] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.053667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.053739] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.054103] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.054164] head: 0bfffe0000000001 ffffc1ffc317d281 00000000ffffffff 00000000ffffffff
[   15.054297] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.054392] page dumped because: kasan: bad access detected
[   15.054424] 
[   15.054727] Memory state around the buggy address:
[   15.054789]  fff00000c5f4b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.054858]  fff00000c5f4b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.054924] >fff00000c5f4b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.055023]                                                           ^
[   15.055147]  fff00000c5f4b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.055200]  fff00000c5f4b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.055260] ==================================================================
[   15.104653] ==================================================================
[   15.104757] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.104856] Write of size 1 at addr fff00000c769e0da by task kunit_try_catch/163
[   15.105065] 
[   15.105124] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.105320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.105542] Hardware name: linux,dummy-virt (DT)
[   15.105720] Call trace:
[   15.105792]  show_stack+0x20/0x38 (C)
[   15.105899]  dump_stack_lvl+0x8c/0xd0
[   15.106054]  print_report+0x118/0x5d0
[   15.106101]  kasan_report+0xdc/0x128
[   15.106433]  __asan_report_store1_noabort+0x20/0x30
[   15.106627]  krealloc_less_oob_helper+0xa80/0xc50
[   15.106809]  krealloc_large_less_oob+0x20/0x38
[   15.106894]  kunit_try_run_case+0x170/0x3f0
[   15.107002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.107381]  kthread+0x328/0x630
[   15.107480]  ret_from_fork+0x10/0x20
[   15.107598] 
[   15.107688] The buggy address belongs to the physical page:
[   15.107736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10769c
[   15.107924] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.107990] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.108091] page_type: f8(unknown)
[   15.108447] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.108681] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.108762] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.108907] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.109225] head: 0bfffe0000000002 ffffc1ffc31da701 00000000ffffffff 00000000ffffffff
[   15.109294] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.109542] page dumped because: kasan: bad access detected
[   15.109609] 
[   15.109685] Memory state around the buggy address:
[   15.109797]  fff00000c769df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.109869]  fff00000c769e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.109918] >fff00000c769e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.109955]                                                     ^
[   15.110291]  fff00000c769e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.110442]  fff00000c769e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.110529] ==================================================================
[   15.091950] ==================================================================
[   15.092004] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.092056] Write of size 1 at addr fff00000c769e0c9 by task kunit_try_catch/163
[   15.092248] 
[   15.092293] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.092635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.092911] Hardware name: linux,dummy-virt (DT)
[   15.093051] Call trace:
[   15.093133]  show_stack+0x20/0x38 (C)
[   15.093200]  dump_stack_lvl+0x8c/0xd0
[   15.093274]  print_report+0x118/0x5d0
[   15.093321]  kasan_report+0xdc/0x128
[   15.093637]  __asan_report_store1_noabort+0x20/0x30
[   15.093862]  krealloc_less_oob_helper+0xa48/0xc50
[   15.093997]  krealloc_large_less_oob+0x20/0x38
[   15.094081]  kunit_try_run_case+0x170/0x3f0
[   15.094290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.094556]  kthread+0x328/0x630
[   15.094627]  ret_from_fork+0x10/0x20
[   15.094777] 
[   15.094800] The buggy address belongs to the physical page:
[   15.094831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10769c
[   15.095207] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.095284] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.095689] page_type: f8(unknown)
[   15.095748] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.095835] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.095953] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.096119] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.096200] head: 0bfffe0000000002 ffffc1ffc31da701 00000000ffffffff 00000000ffffffff
[   15.096841] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.096947] page dumped because: kasan: bad access detected
[   15.097086] 
[   15.097125] Memory state around the buggy address:
[   15.097159]  fff00000c769df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.097527]  fff00000c769e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.097925] >fff00000c769e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.097995]                                               ^
[   15.098086]  fff00000c769e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.098223]  fff00000c769e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.098333] ==================================================================
[   15.100119] ==================================================================
[   15.100165] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.100382] Write of size 1 at addr fff00000c769e0d0 by task kunit_try_catch/163
[   15.100560] 
[   15.100665] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.100748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.100774] Hardware name: linux,dummy-virt (DT)
[   15.100820] Call trace:
[   15.100886]  show_stack+0x20/0x38 (C)
[   15.101082]  dump_stack_lvl+0x8c/0xd0
[   15.101130]  print_report+0x118/0x5d0
[   15.101526]  kasan_report+0xdc/0x128
[   15.101621]  __asan_report_store1_noabort+0x20/0x30
[   15.101720]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.101865]  krealloc_large_less_oob+0x20/0x38
[   15.102060]  kunit_try_run_case+0x170/0x3f0
[   15.102161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.102264]  kthread+0x328/0x630
[   15.102309]  ret_from_fork+0x10/0x20
[   15.102362] 
[   15.102388] The buggy address belongs to the physical page:
[   15.102436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10769c
[   15.102488] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.102534] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.102584] page_type: f8(unknown)
[   15.102627] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.102677] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.102726] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.102782] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.102833] head: 0bfffe0000000002 ffffc1ffc31da701 00000000ffffffff 00000000ffffffff
[   15.102890] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.102937] page dumped because: kasan: bad access detected
[   15.102976] 
[   15.102995] Memory state around the buggy address:
[   15.103034]  fff00000c769df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.103076]  fff00000c769e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.103125] >fff00000c769e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.103160]                                                  ^
[   15.103392]  fff00000c769e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.103464]  fff00000c769e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.103895] ==================================================================
[   15.041704] ==================================================================
[   15.041842] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.042001] Write of size 1 at addr fff00000c5f4b6da by task kunit_try_catch/159
[   15.042076] 
[   15.042113] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.042275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.042331] Hardware name: linux,dummy-virt (DT)
[   15.042363] Call trace:
[   15.042395]  show_stack+0x20/0x38 (C)
[   15.042602]  dump_stack_lvl+0x8c/0xd0
[   15.042801]  print_report+0x118/0x5d0
[   15.043017]  kasan_report+0xdc/0x128
[   15.043244]  __asan_report_store1_noabort+0x20/0x30
[   15.043377]  krealloc_less_oob_helper+0xa80/0xc50
[   15.043445]  krealloc_less_oob+0x20/0x38
[   15.043498]  kunit_try_run_case+0x170/0x3f0
[   15.043621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.043677]  kthread+0x328/0x630
[   15.043732]  ret_from_fork+0x10/0x20
[   15.043786] 
[   15.043804] Allocated by task 159:
[   15.043832]  kasan_save_stack+0x3c/0x68
[   15.044155]  kasan_save_track+0x20/0x40
[   15.044450]  kasan_save_alloc_info+0x40/0x58
[   15.044637]  __kasan_krealloc+0x118/0x178
[   15.044686]  krealloc_noprof+0x128/0x360
[   15.044733]  krealloc_less_oob_helper+0x168/0xc50
[   15.044824]  krealloc_less_oob+0x20/0x38
[   15.044941]  kunit_try_run_case+0x170/0x3f0
[   15.045039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.045197]  kthread+0x328/0x630
[   15.045243]  ret_from_fork+0x10/0x20
[   15.045281] 
[   15.045328] The buggy address belongs to the object at fff00000c5f4b600
[   15.045328]  which belongs to the cache kmalloc-256 of size 256
[   15.045735] The buggy address is located 17 bytes to the right of
[   15.045735]  allocated 201-byte region [fff00000c5f4b600, fff00000c5f4b6c9)
[   15.046225] 
[   15.046261] The buggy address belongs to the physical page:
[   15.046319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f4a
[   15.046676] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.046759] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.046839] page_type: f5(slab)
[   15.046900] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.046953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.047126] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.047415] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.047842] head: 0bfffe0000000001 ffffc1ffc317d281 00000000ffffffff 00000000ffffffff
[   15.048253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.048338] page dumped because: kasan: bad access detected
[   15.048440] 
[   15.048513] Memory state around the buggy address:
[   15.048591]  fff00000c5f4b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.048919]  fff00000c5f4b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.049335] >fff00000c5f4b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.049449]                                                     ^
[   15.049542]  fff00000c5f4b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.049670]  fff00000c5f4b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.049746] ==================================================================
[   15.111584] ==================================================================
[   15.111630] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.111675] Write of size 1 at addr fff00000c769e0ea by task kunit_try_catch/163
[   15.111771] 
[   15.111849] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.112225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.112268] Hardware name: linux,dummy-virt (DT)
[   15.112352] Call trace:
[   15.112412]  show_stack+0x20/0x38 (C)
[   15.112464]  dump_stack_lvl+0x8c/0xd0
[   15.112586]  print_report+0x118/0x5d0
[   15.112651]  kasan_report+0xdc/0x128
[   15.112899]  __asan_report_store1_noabort+0x20/0x30
[   15.112974]  krealloc_less_oob_helper+0xae4/0xc50
[   15.113153]  krealloc_large_less_oob+0x20/0x38
[   15.113321]  kunit_try_run_case+0x170/0x3f0
[   15.113381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.113448]  kthread+0x328/0x630
[   15.113535]  ret_from_fork+0x10/0x20
[   15.113584] 
[   15.113626] The buggy address belongs to the physical page:
[   15.113656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10769c
[   15.113717] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.113762] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.113816] page_type: f8(unknown)
[   15.113863] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.113923] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.113972] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.114021] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.114069] head: 0bfffe0000000002 ffffc1ffc31da701 00000000ffffffff 00000000ffffffff
[   15.114125] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.114176] page dumped because: kasan: bad access detected
[   15.114222] 
[   15.114240] Memory state around the buggy address:
[   15.114270]  fff00000c769df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.114328]  fff00000c769e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.114383] >fff00000c769e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.114420]                                                           ^
[   15.114464]  fff00000c769e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.114511]  fff00000c769e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.114560] ==================================================================
[   15.055989] ==================================================================
[   15.056100] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.056152] Write of size 1 at addr fff00000c5f4b6eb by task kunit_try_catch/159
[   15.056366] 
[   15.056486] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.056850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.057088] Hardware name: linux,dummy-virt (DT)
[   15.057391] Call trace:
[   15.057456]  show_stack+0x20/0x38 (C)
[   15.057573]  dump_stack_lvl+0x8c/0xd0
[   15.057638]  print_report+0x118/0x5d0
[   15.057871]  kasan_report+0xdc/0x128
[   15.058063]  __asan_report_store1_noabort+0x20/0x30
[   15.058149]  krealloc_less_oob_helper+0xa58/0xc50
[   15.058224]  krealloc_less_oob+0x20/0x38
[   15.058625]  kunit_try_run_case+0x170/0x3f0
[   15.058730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.058791]  kthread+0x328/0x630
[   15.059151]  ret_from_fork+0x10/0x20
[   15.059322] 
[   15.059363] Allocated by task 159:
[   15.059398]  kasan_save_stack+0x3c/0x68
[   15.059782]  kasan_save_track+0x20/0x40
[   15.059855]  kasan_save_alloc_info+0x40/0x58
[   15.059999]  __kasan_krealloc+0x118/0x178
[   15.060097]  krealloc_noprof+0x128/0x360
[   15.060136]  krealloc_less_oob_helper+0x168/0xc50
[   15.060471]  krealloc_less_oob+0x20/0x38
[   15.060556]  kunit_try_run_case+0x170/0x3f0
[   15.060708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.060804]  kthread+0x328/0x630
[   15.061210]  ret_from_fork+0x10/0x20
[   15.061329] 
[   15.061381] The buggy address belongs to the object at fff00000c5f4b600
[   15.061381]  which belongs to the cache kmalloc-256 of size 256
[   15.061467] The buggy address is located 34 bytes to the right of
[   15.061467]  allocated 201-byte region [fff00000c5f4b600, fff00000c5f4b6c9)
[   15.061856] 
[   15.061900] The buggy address belongs to the physical page:
[   15.061966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f4a
[   15.062085] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.062166] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.062298] page_type: f5(slab)
[   15.062336] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.062694] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.062769] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.063079] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.063178] head: 0bfffe0000000001 ffffc1ffc317d281 00000000ffffffff 00000000ffffffff
[   15.063568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.063635] page dumped because: kasan: bad access detected
[   15.063993] 
[   15.064114] Memory state around the buggy address:
[   15.064162]  fff00000c5f4b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.064245]  fff00000c5f4b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.064334] >fff00000c5f4b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.064416]                                                           ^
[   15.064492]  fff00000c5f4b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.064864]  fff00000c5f4b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.065006] ==================================================================
[   15.024276] ==================================================================
[   15.024413] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.024471] Write of size 1 at addr fff00000c5f4b6c9 by task kunit_try_catch/159
[   15.024675] 
[   15.024767] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.024997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.025078] Hardware name: linux,dummy-virt (DT)
[   15.025138] Call trace:
[   15.025243]  show_stack+0x20/0x38 (C)
[   15.025347]  dump_stack_lvl+0x8c/0xd0
[   15.025640]  print_report+0x118/0x5d0
[   15.025825]  kasan_report+0xdc/0x128
[   15.025948]  __asan_report_store1_noabort+0x20/0x30
[   15.026020]  krealloc_less_oob_helper+0xa48/0xc50
[   15.026345]  krealloc_less_oob+0x20/0x38
[   15.026430]  kunit_try_run_case+0x170/0x3f0
[   15.026504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.026649]  kthread+0x328/0x630
[   15.026749]  ret_from_fork+0x10/0x20
[   15.026914] 
[   15.026984] Allocated by task 159:
[   15.027300]  kasan_save_stack+0x3c/0x68
[   15.027486]  kasan_save_track+0x20/0x40
[   15.027578]  kasan_save_alloc_info+0x40/0x58
[   15.027666]  __kasan_krealloc+0x118/0x178
[   15.027826]  krealloc_noprof+0x128/0x360
[   15.027911]  krealloc_less_oob_helper+0x168/0xc50
[   15.028133]  krealloc_less_oob+0x20/0x38
[   15.028183]  kunit_try_run_case+0x170/0x3f0
[   15.028346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.028674]  kthread+0x328/0x630
[   15.028815]  ret_from_fork+0x10/0x20
[   15.028962] 
[   15.028985] The buggy address belongs to the object at fff00000c5f4b600
[   15.028985]  which belongs to the cache kmalloc-256 of size 256
[   15.029062] The buggy address is located 0 bytes to the right of
[   15.029062]  allocated 201-byte region [fff00000c5f4b600, fff00000c5f4b6c9)
[   15.029484] 
[   15.029641] The buggy address belongs to the physical page:
[   15.029722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f4a
[   15.029849] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.029909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.029996] page_type: f5(slab)
[   15.030122] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.030200] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.030577] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.030652] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.030806] head: 0bfffe0000000001 ffffc1ffc317d281 00000000ffffffff 00000000ffffffff
[   15.030914] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.031058] page dumped because: kasan: bad access detected
[   15.031109] 
[   15.031134] Memory state around the buggy address:
[   15.031504]  fff00000c5f4b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.031560]  fff00000c5f4b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.031720] >fff00000c5f4b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.031847]                                               ^
[   15.031904]  fff00000c5f4b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.031951]  fff00000c5f4b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032011] ==================================================================

[   12.624663] ==================================================================
[   12.625302] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.625654] Write of size 1 at addr ffff888100a9a2d0 by task kunit_try_catch/176
[   12.626000] 
[   12.626228] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.626274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.626285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.626306] Call Trace:
[   12.626318]  <TASK>
[   12.626332]  dump_stack_lvl+0x73/0xb0
[   12.626360]  print_report+0xd1/0x610
[   12.626381]  ? __virt_addr_valid+0x1db/0x2d0
[   12.626403]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.626426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.626448]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.626486]  kasan_report+0x141/0x180
[   12.626508]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.626536]  __asan_report_store1_noabort+0x1b/0x30
[   12.626560]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.626586]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.626610]  ? finish_task_switch.isra.0+0x153/0x700
[   12.626632]  ? __switch_to+0x47/0xf50
[   12.626657]  ? __schedule+0x10c6/0x2b60
[   12.626679]  ? __pfx_read_tsc+0x10/0x10
[   12.626702]  krealloc_less_oob+0x1c/0x30
[   12.626724]  kunit_try_run_case+0x1a5/0x480
[   12.626747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.626770]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.626792]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.626815]  ? __kthread_parkme+0x82/0x180
[   12.626835]  ? preempt_count_sub+0x50/0x80
[   12.626857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.626893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.626916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.626939]  kthread+0x337/0x6f0
[   12.626959]  ? trace_preempt_on+0x20/0xc0
[   12.626981]  ? __pfx_kthread+0x10/0x10
[   12.627001]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.627022]  ? calculate_sigpending+0x7b/0xa0
[   12.627045]  ? __pfx_kthread+0x10/0x10
[   12.627067]  ret_from_fork+0x116/0x1d0
[   12.627084]  ? __pfx_kthread+0x10/0x10
[   12.627105]  ret_from_fork_asm+0x1a/0x30
[   12.627135]  </TASK>
[   12.627144] 
[   12.635565] Allocated by task 176:
[   12.635760]  kasan_save_stack+0x45/0x70
[   12.635983]  kasan_save_track+0x18/0x40
[   12.636156]  kasan_save_alloc_info+0x3b/0x50
[   12.636359]  __kasan_krealloc+0x190/0x1f0
[   12.636630]  krealloc_noprof+0xf3/0x340
[   12.636819]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.637107]  krealloc_less_oob+0x1c/0x30
[   12.637288]  kunit_try_run_case+0x1a5/0x480
[   12.637485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.637728]  kthread+0x337/0x6f0
[   12.638529]  ret_from_fork+0x116/0x1d0
[   12.638698]  ret_from_fork_asm+0x1a/0x30
[   12.638843] 
[   12.638916] The buggy address belongs to the object at ffff888100a9a200
[   12.638916]  which belongs to the cache kmalloc-256 of size 256
[   12.639291] The buggy address is located 7 bytes to the right of
[   12.639291]  allocated 201-byte region [ffff888100a9a200, ffff888100a9a2c9)
[   12.640263] 
[   12.640380] The buggy address belongs to the physical page:
[   12.640667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   12.641316] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.641644] flags: 0x200000000000040(head|node=0|zone=2)
[   12.642508] page_type: f5(slab)
[   12.642673] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.643527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.644011] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.644846] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.645298] head: 0200000000000001 ffffea000402a681 00000000ffffffff 00000000ffffffff
[   12.645642] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.646283] page dumped because: kasan: bad access detected
[   12.646632] 
[   12.646719] Memory state around the buggy address:
[   12.647251]  ffff888100a9a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.647694]  ffff888100a9a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.648184] >ffff888100a9a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.648622]                                                  ^
[   12.649030]  ffff888100a9a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.649354]  ffff888100a9a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.649674] ==================================================================
[   12.673952] ==================================================================
[   12.674422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.674730] Write of size 1 at addr ffff888100a9a2ea by task kunit_try_catch/176
[   12.675242] 
[   12.675335] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.675378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.675389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.675410] Call Trace:
[   12.675425]  <TASK>
[   12.675439]  dump_stack_lvl+0x73/0xb0
[   12.675467]  print_report+0xd1/0x610
[   12.675505]  ? __virt_addr_valid+0x1db/0x2d0
[   12.675528]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.675551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.675574]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.675598]  kasan_report+0x141/0x180
[   12.675620]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.675648]  __asan_report_store1_noabort+0x1b/0x30
[   12.675672]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.675698]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.675721]  ? finish_task_switch.isra.0+0x153/0x700
[   12.675744]  ? __switch_to+0x47/0xf50
[   12.675769]  ? __schedule+0x10c6/0x2b60
[   12.675791]  ? __pfx_read_tsc+0x10/0x10
[   12.675815]  krealloc_less_oob+0x1c/0x30
[   12.675836]  kunit_try_run_case+0x1a5/0x480
[   12.675859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.675882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.675919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.675942]  ? __kthread_parkme+0x82/0x180
[   12.675961]  ? preempt_count_sub+0x50/0x80
[   12.675984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.676008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.676031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.676054]  kthread+0x337/0x6f0
[   12.676073]  ? trace_preempt_on+0x20/0xc0
[   12.676096]  ? __pfx_kthread+0x10/0x10
[   12.676117]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.676138]  ? calculate_sigpending+0x7b/0xa0
[   12.676161]  ? __pfx_kthread+0x10/0x10
[   12.676183]  ret_from_fork+0x116/0x1d0
[   12.676201]  ? __pfx_kthread+0x10/0x10
[   12.676221]  ret_from_fork_asm+0x1a/0x30
[   12.676252]  </TASK>
[   12.676262] 
[   12.684241] Allocated by task 176:
[   12.684431]  kasan_save_stack+0x45/0x70
[   12.684653]  kasan_save_track+0x18/0x40
[   12.684933]  kasan_save_alloc_info+0x3b/0x50
[   12.685396]  __kasan_krealloc+0x190/0x1f0
[   12.685630]  krealloc_noprof+0xf3/0x340
[   12.685908]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.686304]  krealloc_less_oob+0x1c/0x30
[   12.686456]  kunit_try_run_case+0x1a5/0x480
[   12.686683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.687086]  kthread+0x337/0x6f0
[   12.687269]  ret_from_fork+0x116/0x1d0
[   12.687408]  ret_from_fork_asm+0x1a/0x30
[   12.687561] 
[   12.687635] The buggy address belongs to the object at ffff888100a9a200
[   12.687635]  which belongs to the cache kmalloc-256 of size 256
[   12.687995] The buggy address is located 33 bytes to the right of
[   12.687995]  allocated 201-byte region [ffff888100a9a200, ffff888100a9a2c9)
[   12.688560] 
[   12.688656] The buggy address belongs to the physical page:
[   12.688902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   12.689295] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.689637] flags: 0x200000000000040(head|node=0|zone=2)
[   12.689939] page_type: f5(slab)
[   12.690183] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.690431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.690674] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.691364] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.691713] head: 0200000000000001 ffffea000402a681 00000000ffffffff 00000000ffffffff
[   12.692032] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.692338] page dumped because: kasan: bad access detected
[   12.692611] 
[   12.692707] Memory state around the buggy address:
[   12.692918]  ffff888100a9a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.693377]  ffff888100a9a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.693690] >ffff888100a9a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.694162]                                                           ^
[   12.694454]  ffff888100a9a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.694751]  ffff888100a9a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.695119] ==================================================================
[   12.650522] ==================================================================
[   12.650881] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.651158] Write of size 1 at addr ffff888100a9a2da by task kunit_try_catch/176
[   12.651520] 
[   12.651646] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.651694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.651705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.651726] Call Trace:
[   12.651742]  <TASK>
[   12.651758]  dump_stack_lvl+0x73/0xb0
[   12.651786]  print_report+0xd1/0x610
[   12.651807]  ? __virt_addr_valid+0x1db/0x2d0
[   12.651830]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.651853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.651875]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.651899]  kasan_report+0x141/0x180
[   12.651920]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.651948]  __asan_report_store1_noabort+0x1b/0x30
[   12.651973]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.651998]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.652022]  ? finish_task_switch.isra.0+0x153/0x700
[   12.652092]  ? __switch_to+0x47/0xf50
[   12.652118]  ? __schedule+0x10c6/0x2b60
[   12.652140]  ? __pfx_read_tsc+0x10/0x10
[   12.652164]  krealloc_less_oob+0x1c/0x30
[   12.652185]  kunit_try_run_case+0x1a5/0x480
[   12.652210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.652232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.652255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.652278]  ? __kthread_parkme+0x82/0x180
[   12.652298]  ? preempt_count_sub+0x50/0x80
[   12.652320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.652344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.652367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.652390]  kthread+0x337/0x6f0
[   12.652410]  ? trace_preempt_on+0x20/0xc0
[   12.652433]  ? __pfx_kthread+0x10/0x10
[   12.652453]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.652486]  ? calculate_sigpending+0x7b/0xa0
[   12.652510]  ? __pfx_kthread+0x10/0x10
[   12.652531]  ret_from_fork+0x116/0x1d0
[   12.652550]  ? __pfx_kthread+0x10/0x10
[   12.652570]  ret_from_fork_asm+0x1a/0x30
[   12.652601]  </TASK>
[   12.652611] 
[   12.662442] Allocated by task 176:
[   12.662662]  kasan_save_stack+0x45/0x70
[   12.662937]  kasan_save_track+0x18/0x40
[   12.663217]  kasan_save_alloc_info+0x3b/0x50
[   12.663391]  __kasan_krealloc+0x190/0x1f0
[   12.663619]  krealloc_noprof+0xf3/0x340
[   12.663820]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.663992]  krealloc_less_oob+0x1c/0x30
[   12.664140]  kunit_try_run_case+0x1a5/0x480
[   12.664295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.664553]  kthread+0x337/0x6f0
[   12.664777]  ret_from_fork+0x116/0x1d0
[   12.665133]  ret_from_fork_asm+0x1a/0x30
[   12.665281] 
[   12.665356] The buggy address belongs to the object at ffff888100a9a200
[   12.665356]  which belongs to the cache kmalloc-256 of size 256
[   12.666009] The buggy address is located 17 bytes to the right of
[   12.666009]  allocated 201-byte region [ffff888100a9a200, ffff888100a9a2c9)
[   12.666622] 
[   12.666724] The buggy address belongs to the physical page:
[   12.667137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   12.667447] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.667705] flags: 0x200000000000040(head|node=0|zone=2)
[   12.668235] page_type: f5(slab)
[   12.668431] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.668832] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.669201] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.669499] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.669750] head: 0200000000000001 ffffea000402a681 00000000ffffffff 00000000ffffffff
[   12.670128] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.670673] page dumped because: kasan: bad access detected
[   12.671119] 
[   12.671197] Memory state around the buggy address:
[   12.671361]  ffff888100a9a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.671631]  ffff888100a9a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.671958] >ffff888100a9a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.672433]                                                     ^
[   12.672654]  ffff888100a9a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.673151]  ffff888100a9a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.673462] ==================================================================
[   12.786083] ==================================================================
[   12.786641] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.787186] Write of size 1 at addr ffff8881028120d0 by task kunit_try_catch/180
[   12.787547] 
[   12.787650] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.787716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.787728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.787749] Call Trace:
[   12.787762]  <TASK>
[   12.787776]  dump_stack_lvl+0x73/0xb0
[   12.787806]  print_report+0xd1/0x610
[   12.787829]  ? __virt_addr_valid+0x1db/0x2d0
[   12.787851]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.787876]  ? kasan_addr_to_slab+0x11/0xa0
[   12.787897]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.787942]  kasan_report+0x141/0x180
[   12.787966]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.787995]  __asan_report_store1_noabort+0x1b/0x30
[   12.788038]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.788065]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.788090]  ? finish_task_switch.isra.0+0x153/0x700
[   12.788112]  ? __switch_to+0x47/0xf50
[   12.788138]  ? __schedule+0x10c6/0x2b60
[   12.788161]  ? __pfx_read_tsc+0x10/0x10
[   12.788185]  krealloc_large_less_oob+0x1c/0x30
[   12.788208]  kunit_try_run_case+0x1a5/0x480
[   12.788234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.788256]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.788280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.788303]  ? __kthread_parkme+0x82/0x180
[   12.788324]  ? preempt_count_sub+0x50/0x80
[   12.788347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.788371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.788394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.788418]  kthread+0x337/0x6f0
[   12.788438]  ? trace_preempt_on+0x20/0xc0
[   12.788461]  ? __pfx_kthread+0x10/0x10
[   12.788492]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.788514]  ? calculate_sigpending+0x7b/0xa0
[   12.788538]  ? __pfx_kthread+0x10/0x10
[   12.788560]  ret_from_fork+0x116/0x1d0
[   12.788579]  ? __pfx_kthread+0x10/0x10
[   12.788599]  ret_from_fork_asm+0x1a/0x30
[   12.788630]  </TASK>
[   12.788641] 
[   12.798270] The buggy address belongs to the physical page:
[   12.798597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102810
[   12.799056] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.799511] flags: 0x200000000000040(head|node=0|zone=2)
[   12.799758] page_type: f8(unknown)
[   12.799926] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.800299] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.800747] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.801178] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.801674] head: 0200000000000002 ffffea00040a0401 00000000ffffffff 00000000ffffffff
[   12.801947] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.802233] page dumped because: kasan: bad access detected
[   12.802512] 
[   12.802611] Memory state around the buggy address:
[   12.803178]  ffff888102811f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.803563]  ffff888102812000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.803786] >ffff888102812080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.804424]                                                  ^
[   12.804737]  ffff888102812100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.805119]  ffff888102812180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.805762] ==================================================================
[   12.766336] ==================================================================
[   12.767148] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.767524] Write of size 1 at addr ffff8881028120c9 by task kunit_try_catch/180
[   12.767896] 
[   12.768001] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.768066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.768078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.768100] Call Trace:
[   12.768112]  <TASK>
[   12.768186]  dump_stack_lvl+0x73/0xb0
[   12.768221]  print_report+0xd1/0x610
[   12.768246]  ? __virt_addr_valid+0x1db/0x2d0
[   12.768269]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.768293]  ? kasan_addr_to_slab+0x11/0xa0
[   12.768338]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.768364]  kasan_report+0x141/0x180
[   12.768386]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.768415]  __asan_report_store1_noabort+0x1b/0x30
[   12.768440]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.768466]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.768503]  ? finish_task_switch.isra.0+0x153/0x700
[   12.768526]  ? __switch_to+0x47/0xf50
[   12.768552]  ? __schedule+0x10c6/0x2b60
[   12.768576]  ? __pfx_read_tsc+0x10/0x10
[   12.768621]  krealloc_large_less_oob+0x1c/0x30
[   12.768644]  kunit_try_run_case+0x1a5/0x480
[   12.768669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.768692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.768717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.768741]  ? __kthread_parkme+0x82/0x180
[   12.768761]  ? preempt_count_sub+0x50/0x80
[   12.768792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.768817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.768859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.768883]  kthread+0x337/0x6f0
[   12.768903]  ? trace_preempt_on+0x20/0xc0
[   12.768926]  ? __pfx_kthread+0x10/0x10
[   12.768947]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.768969]  ? calculate_sigpending+0x7b/0xa0
[   12.768993]  ? __pfx_kthread+0x10/0x10
[   12.769015]  ret_from_fork+0x116/0x1d0
[   12.769035]  ? __pfx_kthread+0x10/0x10
[   12.769102]  ret_from_fork_asm+0x1a/0x30
[   12.769133]  </TASK>
[   12.769144] 
[   12.778542] The buggy address belongs to the physical page:
[   12.778781] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102810
[   12.779419] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.779758] flags: 0x200000000000040(head|node=0|zone=2)
[   12.780029] page_type: f8(unknown)
[   12.780281] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.780571] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.780977] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.781420] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.781777] head: 0200000000000002 ffffea00040a0401 00000000ffffffff 00000000ffffffff
[   12.782247] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.782715] page dumped because: kasan: bad access detected
[   12.783188] 
[   12.783292] Memory state around the buggy address:
[   12.783531]  ffff888102811f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.783888]  ffff888102812000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.784221] >ffff888102812080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.784562]                                               ^
[   12.784829]  ffff888102812100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.785257]  ffff888102812180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.785550] ==================================================================
[   12.695570] ==================================================================
[   12.695945] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.696424] Write of size 1 at addr ffff888100a9a2eb by task kunit_try_catch/176
[   12.696739] 
[   12.696881] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.696923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.696934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.696954] Call Trace:
[   12.696967]  <TASK>
[   12.696982]  dump_stack_lvl+0x73/0xb0
[   12.697009]  print_report+0xd1/0x610
[   12.697030]  ? __virt_addr_valid+0x1db/0x2d0
[   12.697053]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.697076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.697097]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.697121]  kasan_report+0x141/0x180
[   12.697143]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.697171]  __asan_report_store1_noabort+0x1b/0x30
[   12.697196]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.697221]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.697245]  ? finish_task_switch.isra.0+0x153/0x700
[   12.697267]  ? __switch_to+0x47/0xf50
[   12.697292]  ? __schedule+0x10c6/0x2b60
[   12.697315]  ? __pfx_read_tsc+0x10/0x10
[   12.697339]  krealloc_less_oob+0x1c/0x30
[   12.697360]  kunit_try_run_case+0x1a5/0x480
[   12.697384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.697407]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.697430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.697453]  ? __kthread_parkme+0x82/0x180
[   12.697484]  ? preempt_count_sub+0x50/0x80
[   12.697507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.697531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.697553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.697576]  kthread+0x337/0x6f0
[   12.697596]  ? trace_preempt_on+0x20/0xc0
[   12.697618]  ? __pfx_kthread+0x10/0x10
[   12.697638]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.697659]  ? calculate_sigpending+0x7b/0xa0
[   12.697683]  ? __pfx_kthread+0x10/0x10
[   12.697704]  ret_from_fork+0x116/0x1d0
[   12.697722]  ? __pfx_kthread+0x10/0x10
[   12.697743]  ret_from_fork_asm+0x1a/0x30
[   12.697772]  </TASK>
[   12.697781] 
[   12.705743] Allocated by task 176:
[   12.705944]  kasan_save_stack+0x45/0x70
[   12.706168]  kasan_save_track+0x18/0x40
[   12.706506]  kasan_save_alloc_info+0x3b/0x50
[   12.706713]  __kasan_krealloc+0x190/0x1f0
[   12.706990]  krealloc_noprof+0xf3/0x340
[   12.707209]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.707409]  krealloc_less_oob+0x1c/0x30
[   12.707561]  kunit_try_run_case+0x1a5/0x480
[   12.707773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.708030]  kthread+0x337/0x6f0
[   12.708191]  ret_from_fork+0x116/0x1d0
[   12.708357]  ret_from_fork_asm+0x1a/0x30
[   12.708507] 
[   12.708578] The buggy address belongs to the object at ffff888100a9a200
[   12.708578]  which belongs to the cache kmalloc-256 of size 256
[   12.708932] The buggy address is located 34 bytes to the right of
[   12.708932]  allocated 201-byte region [ffff888100a9a200, ffff888100a9a2c9)
[   12.709300] 
[   12.709372] The buggy address belongs to the physical page:
[   12.709891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   12.710269] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.710629] flags: 0x200000000000040(head|node=0|zone=2)
[   12.710902] page_type: f5(slab)
[   12.711070] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.711568] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.711922] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.712985] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.714294] head: 0200000000000001 ffffea000402a681 00000000ffffffff 00000000ffffffff
[   12.714606] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.715707] page dumped because: kasan: bad access detected
[   12.716316] 
[   12.716419] Memory state around the buggy address:
[   12.716656]  ffff888100a9a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.717435]  ffff888100a9a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.717999] >ffff888100a9a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.718382]                                                           ^
[   12.718683]  ffff888100a9a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.719511]  ffff888100a9a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.720317] ==================================================================
[   12.846308] ==================================================================
[   12.846659] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.846992] Write of size 1 at addr ffff8881028120eb by task kunit_try_catch/180
[   12.847387] 
[   12.847493] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.847539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.847550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.847572] Call Trace:
[   12.847586]  <TASK>
[   12.847601]  dump_stack_lvl+0x73/0xb0
[   12.847632]  print_report+0xd1/0x610
[   12.847655]  ? __virt_addr_valid+0x1db/0x2d0
[   12.847678]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.847703]  ? kasan_addr_to_slab+0x11/0xa0
[   12.847724]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.847748]  kasan_report+0x141/0x180
[   12.847771]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.847800]  __asan_report_store1_noabort+0x1b/0x30
[   12.847825]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.847851]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.847876]  ? finish_task_switch.isra.0+0x153/0x700
[   12.847899]  ? __switch_to+0x47/0xf50
[   12.847924]  ? __schedule+0x10c6/0x2b60
[   12.847948]  ? __pfx_read_tsc+0x10/0x10
[   12.848342]  krealloc_large_less_oob+0x1c/0x30
[   12.848389]  kunit_try_run_case+0x1a5/0x480
[   12.848429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.848453]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.848506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.848530]  ? __kthread_parkme+0x82/0x180
[   12.848551]  ? preempt_count_sub+0x50/0x80
[   12.848575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.848599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.848623]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.848648]  kthread+0x337/0x6f0
[   12.848668]  ? trace_preempt_on+0x20/0xc0
[   12.848693]  ? __pfx_kthread+0x10/0x10
[   12.848714]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.848736]  ? calculate_sigpending+0x7b/0xa0
[   12.848761]  ? __pfx_kthread+0x10/0x10
[   12.848793]  ret_from_fork+0x116/0x1d0
[   12.848812]  ? __pfx_kthread+0x10/0x10
[   12.848833]  ret_from_fork_asm+0x1a/0x30
[   12.848885]  </TASK>
[   12.848896] 
[   12.858149] The buggy address belongs to the physical page:
[   12.858336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102810
[   12.858894] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.859324] flags: 0x200000000000040(head|node=0|zone=2)
[   12.859644] page_type: f8(unknown)
[   12.859872] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.860375] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.860879] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.861342] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.861734] head: 0200000000000002 ffffea00040a0401 00000000ffffffff 00000000ffffffff
[   12.862160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.862408] page dumped because: kasan: bad access detected
[   12.862620] 
[   12.862721] Memory state around the buggy address:
[   12.863232]  ffff888102811f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.863604]  ffff888102812000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.863989] >ffff888102812080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.864500]                                                           ^
[   12.864778]  ffff888102812100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.865128]  ffff888102812180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.865449] ==================================================================
[   12.826353] ==================================================================
[   12.826705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.827624] Write of size 1 at addr ffff8881028120ea by task kunit_try_catch/180
[   12.827962] 
[   12.828051] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.828117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.828128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.828148] Call Trace:
[   12.828161]  <TASK>
[   12.828175]  dump_stack_lvl+0x73/0xb0
[   12.828282]  print_report+0xd1/0x610
[   12.828306]  ? __virt_addr_valid+0x1db/0x2d0
[   12.828328]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.828352]  ? kasan_addr_to_slab+0x11/0xa0
[   12.828373]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.828398]  kasan_report+0x141/0x180
[   12.828420]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.828450]  __asan_report_store1_noabort+0x1b/0x30
[   12.828489]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.828534]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.828574]  ? finish_task_switch.isra.0+0x153/0x700
[   12.828597]  ? __switch_to+0x47/0xf50
[   12.828637]  ? __schedule+0x10c6/0x2b60
[   12.828675]  ? __pfx_read_tsc+0x10/0x10
[   12.828700]  krealloc_large_less_oob+0x1c/0x30
[   12.828723]  kunit_try_run_case+0x1a5/0x480
[   12.828748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.828785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.828824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.828848]  ? __kthread_parkme+0x82/0x180
[   12.828882]  ? preempt_count_sub+0x50/0x80
[   12.828905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.828930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.828954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.828977]  kthread+0x337/0x6f0
[   12.828998]  ? trace_preempt_on+0x20/0xc0
[   12.829020]  ? __pfx_kthread+0x10/0x10
[   12.829041]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.829063]  ? calculate_sigpending+0x7b/0xa0
[   12.829087]  ? __pfx_kthread+0x10/0x10
[   12.829109]  ret_from_fork+0x116/0x1d0
[   12.829128]  ? __pfx_kthread+0x10/0x10
[   12.829149]  ret_from_fork_asm+0x1a/0x30
[   12.829181]  </TASK>
[   12.829191] 
[   12.838518] The buggy address belongs to the physical page:
[   12.838846] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102810
[   12.839409] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.839771] flags: 0x200000000000040(head|node=0|zone=2)
[   12.840100] page_type: f8(unknown)
[   12.840312] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.840690] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.841002] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.841331] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.841958] head: 0200000000000002 ffffea00040a0401 00000000ffffffff 00000000ffffffff
[   12.842358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.842703] page dumped because: kasan: bad access detected
[   12.843030] 
[   12.843144] Memory state around the buggy address:
[   12.843589]  ffff888102811f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.843994]  ffff888102812000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.844395] >ffff888102812080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.844693]                                                           ^
[   12.845052]  ffff888102812100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.845435]  ffff888102812180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.845744] ==================================================================
[   12.806878] ==================================================================
[   12.807189] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.807577] Write of size 1 at addr ffff8881028120da by task kunit_try_catch/180
[   12.808168] 
[   12.808265] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.808311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.808322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.808344] Call Trace:
[   12.808359]  <TASK>
[   12.808374]  dump_stack_lvl+0x73/0xb0
[   12.808432]  print_report+0xd1/0x610
[   12.808455]  ? __virt_addr_valid+0x1db/0x2d0
[   12.808491]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.808516]  ? kasan_addr_to_slab+0x11/0xa0
[   12.808537]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.808582]  kasan_report+0x141/0x180
[   12.808605]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.808634]  __asan_report_store1_noabort+0x1b/0x30
[   12.808659]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.808686]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.808710]  ? finish_task_switch.isra.0+0x153/0x700
[   12.808750]  ? __switch_to+0x47/0xf50
[   12.808776]  ? __schedule+0x10c6/0x2b60
[   12.808814]  ? __pfx_read_tsc+0x10/0x10
[   12.808838]  krealloc_large_less_oob+0x1c/0x30
[   12.808862]  kunit_try_run_case+0x1a5/0x480
[   12.808887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.808910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.808934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.808957]  ? __kthread_parkme+0x82/0x180
[   12.808978]  ? preempt_count_sub+0x50/0x80
[   12.809001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.809026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.809049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.809073]  kthread+0x337/0x6f0
[   12.809093]  ? trace_preempt_on+0x20/0xc0
[   12.809116]  ? __pfx_kthread+0x10/0x10
[   12.809137]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.809159]  ? calculate_sigpending+0x7b/0xa0
[   12.809248]  ? __pfx_kthread+0x10/0x10
[   12.809272]  ret_from_fork+0x116/0x1d0
[   12.809315]  ? __pfx_kthread+0x10/0x10
[   12.809337]  ret_from_fork_asm+0x1a/0x30
[   12.809368]  </TASK>
[   12.809379] 
[   12.818607] The buggy address belongs to the physical page:
[   12.818796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102810
[   12.819216] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.819681] flags: 0x200000000000040(head|node=0|zone=2)
[   12.819925] page_type: f8(unknown)
[   12.820057] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.820441] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.820944] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.821396] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.821766] head: 0200000000000002 ffffea00040a0401 00000000ffffffff 00000000ffffffff
[   12.822139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.822666] page dumped because: kasan: bad access detected
[   12.822950] 
[   12.823049] Memory state around the buggy address:
[   12.823582]  ffff888102811f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.823920]  ffff888102812000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.824454] >ffff888102812080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.824821]                                                     ^
[   12.825042]  ffff888102812100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.825566]  ffff888102812180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.825911] ==================================================================
[   12.602089] ==================================================================
[   12.602698] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.603586] Write of size 1 at addr ffff888100a9a2c9 by task kunit_try_catch/176
[   12.604142] 
[   12.604251] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.604298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.604310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.604332] Call Trace:
[   12.604345]  <TASK>
[   12.604361]  dump_stack_lvl+0x73/0xb0
[   12.604393]  print_report+0xd1/0x610
[   12.604416]  ? __virt_addr_valid+0x1db/0x2d0
[   12.604438]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.604461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.604497]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.604520]  kasan_report+0x141/0x180
[   12.604541]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.604569]  __asan_report_store1_noabort+0x1b/0x30
[   12.604593]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.604618]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.604641]  ? finish_task_switch.isra.0+0x153/0x700
[   12.604663]  ? __switch_to+0x47/0xf50
[   12.604690]  ? __schedule+0x10c6/0x2b60
[   12.604713]  ? __pfx_read_tsc+0x10/0x10
[   12.604739]  krealloc_less_oob+0x1c/0x30
[   12.604760]  kunit_try_run_case+0x1a5/0x480
[   12.604797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.604819]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.604843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.604865]  ? __kthread_parkme+0x82/0x180
[   12.604885]  ? preempt_count_sub+0x50/0x80
[   12.604908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.604931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.604954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.604977]  kthread+0x337/0x6f0
[   12.604995]  ? trace_preempt_on+0x20/0xc0
[   12.605018]  ? __pfx_kthread+0x10/0x10
[   12.605038]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.605059]  ? calculate_sigpending+0x7b/0xa0
[   12.605082]  ? __pfx_kthread+0x10/0x10
[   12.605103]  ret_from_fork+0x116/0x1d0
[   12.605123]  ? __pfx_kthread+0x10/0x10
[   12.605143]  ret_from_fork_asm+0x1a/0x30
[   12.605173]  </TASK>
[   12.605183] 
[   12.613075] Allocated by task 176:
[   12.613270]  kasan_save_stack+0x45/0x70
[   12.613511]  kasan_save_track+0x18/0x40
[   12.613736]  kasan_save_alloc_info+0x3b/0x50
[   12.613999]  __kasan_krealloc+0x190/0x1f0
[   12.614221]  krealloc_noprof+0xf3/0x340
[   12.614364]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.614543]  krealloc_less_oob+0x1c/0x30
[   12.614732]  kunit_try_run_case+0x1a5/0x480
[   12.614944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.615196]  kthread+0x337/0x6f0
[   12.615365]  ret_from_fork+0x116/0x1d0
[   12.615561]  ret_from_fork_asm+0x1a/0x30
[   12.615729] 
[   12.615803] The buggy address belongs to the object at ffff888100a9a200
[   12.615803]  which belongs to the cache kmalloc-256 of size 256
[   12.616604] The buggy address is located 0 bytes to the right of
[   12.616604]  allocated 201-byte region [ffff888100a9a200, ffff888100a9a2c9)
[   12.617400] 
[   12.617514] The buggy address belongs to the physical page:
[   12.617741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   12.618032] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.618593] flags: 0x200000000000040(head|node=0|zone=2)
[   12.618873] page_type: f5(slab)
[   12.619001] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.619300] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.619638] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.619877] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.620115] head: 0200000000000001 ffffea000402a681 00000000ffffffff 00000000ffffffff
[   12.620479] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.620891] page dumped because: kasan: bad access detected
[   12.621154] 
[   12.621255] Memory state around the buggy address:
[   12.621688]  ffff888100a9a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.622008]  ffff888100a9a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.622360] >ffff888100a9a280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.622604]                                               ^
[   12.622834]  ffff888100a9a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.623329]  ffff888100a9a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.623805] ==================================================================