Hay
Date
July 23, 2025, 2:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.223259] ==================================================================
[   15.223342] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.223397] Write of size 1 at addr fff00000c0b938d0 by task kunit_try_catch/158
[   15.223473] 
[   15.223832] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.223933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.223960] Hardware name: linux,dummy-virt (DT)
[   15.224015] Call trace:
[   15.224044]  show_stack+0x20/0x38 (C)
[   15.224097]  dump_stack_lvl+0x8c/0xd0
[   15.224249]  print_report+0x118/0x5d0
[   15.224333]  kasan_report+0xdc/0x128
[   15.224442]  __asan_report_store1_noabort+0x20/0x30
[   15.224525]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.224575]  krealloc_less_oob+0x20/0x38
[   15.224637]  kunit_try_run_case+0x170/0x3f0
[   15.224923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.225104]  kthread+0x328/0x630
[   15.225200]  ret_from_fork+0x10/0x20
[   15.225262] 
[   15.225334] Allocated by task 158:
[   15.225369]  kasan_save_stack+0x3c/0x68
[   15.225413]  kasan_save_track+0x20/0x40
[   15.225449]  kasan_save_alloc_info+0x40/0x58
[   15.225488]  __kasan_krealloc+0x118/0x178
[   15.225525]  krealloc_noprof+0x128/0x360
[   15.225896]  krealloc_less_oob_helper+0x168/0xc50
[   15.225999]  krealloc_less_oob+0x20/0x38
[   15.226104]  kunit_try_run_case+0x170/0x3f0
[   15.226147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.226234]  kthread+0x328/0x630
[   15.226269]  ret_from_fork+0x10/0x20
[   15.226305] 
[   15.226324] The buggy address belongs to the object at fff00000c0b93800
[   15.226324]  which belongs to the cache kmalloc-256 of size 256
[   15.226686] The buggy address is located 7 bytes to the right of
[   15.226686]  allocated 201-byte region [fff00000c0b93800, fff00000c0b938c9)
[   15.226894] 
[   15.226973] The buggy address belongs to the physical page:
[   15.227050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b92
[   15.227116] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.227163] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.227222] page_type: f5(slab)
[   15.227261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.227778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.227878] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.228026] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.228080] head: 0bfffe0000000001 ffffc1ffc302e481 00000000ffffffff 00000000ffffffff
[   15.228195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.228256] page dumped because: kasan: bad access detected
[   15.228288] 
[   15.228305] Memory state around the buggy address:
[   15.228353]  fff00000c0b93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228410]  fff00000c0b93800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.228452] >fff00000c0b93880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.228490]                                                  ^
[   15.228527]  fff00000c0b93900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228569]  fff00000c0b93980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228612] ==================================================================
[   15.318744] ==================================================================
[   15.318798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.318845] Write of size 1 at addr fff00000c65060eb by task kunit_try_catch/162
[   15.319116] 
[   15.319174] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.319449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.319516] Hardware name: linux,dummy-virt (DT)
[   15.319550] Call trace:
[   15.319591]  show_stack+0x20/0x38 (C)
[   15.319691]  dump_stack_lvl+0x8c/0xd0
[   15.319777]  print_report+0x118/0x5d0
[   15.319824]  kasan_report+0xdc/0x128
[   15.320022]  __asan_report_store1_noabort+0x20/0x30
[   15.320075]  krealloc_less_oob_helper+0xa58/0xc50
[   15.320350]  krealloc_large_less_oob+0x20/0x38
[   15.320474]  kunit_try_run_case+0x170/0x3f0
[   15.320525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.320591]  kthread+0x328/0x630
[   15.320710]  ret_from_fork+0x10/0x20
[   15.321009] 
[   15.321113] The buggy address belongs to the physical page:
[   15.321188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106504
[   15.321325] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.321377] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.321430] page_type: f8(unknown)
[   15.321518] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.321571] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.321621] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.321943] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.321997] head: 0bfffe0000000002 ffffc1ffc3194101 00000000ffffffff 00000000ffffffff
[   15.322416] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.322488] page dumped because: kasan: bad access detected
[   15.322568] 
[   15.322588] Memory state around the buggy address:
[   15.322672]  fff00000c6505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.322815]  fff00000c6506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.322926] >fff00000c6506080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.322964]                                                           ^
[   15.323010]  fff00000c6506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.323053]  fff00000c6506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.323467] ==================================================================
[   15.239864] ==================================================================
[   15.239919] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.240404] Write of size 1 at addr fff00000c0b938ea by task kunit_try_catch/158
[   15.240541] 
[   15.240575] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.241000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.241044] Hardware name: linux,dummy-virt (DT)
[   15.241348] Call trace:
[   15.241468]  show_stack+0x20/0x38 (C)
[   15.241624]  dump_stack_lvl+0x8c/0xd0
[   15.241695]  print_report+0x118/0x5d0
[   15.241748]  kasan_report+0xdc/0x128
[   15.241793]  __asan_report_store1_noabort+0x20/0x30
[   15.241847]  krealloc_less_oob_helper+0xae4/0xc50
[   15.242151]  krealloc_less_oob+0x20/0x38
[   15.242221]  kunit_try_run_case+0x170/0x3f0
[   15.242277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.242735]  kthread+0x328/0x630
[   15.242932]  ret_from_fork+0x10/0x20
[   15.243187] 
[   15.243231] Allocated by task 158:
[   15.243365]  kasan_save_stack+0x3c/0x68
[   15.243498]  kasan_save_track+0x20/0x40
[   15.243597]  kasan_save_alloc_info+0x40/0x58
[   15.243810]  __kasan_krealloc+0x118/0x178
[   15.244082]  krealloc_noprof+0x128/0x360
[   15.244259]  krealloc_less_oob_helper+0x168/0xc50
[   15.244507]  krealloc_less_oob+0x20/0x38
[   15.244552]  kunit_try_run_case+0x170/0x3f0
[   15.244763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.245105]  kthread+0x328/0x630
[   15.245212]  ret_from_fork+0x10/0x20
[   15.245501] 
[   15.245686] The buggy address belongs to the object at fff00000c0b93800
[   15.245686]  which belongs to the cache kmalloc-256 of size 256
[   15.246114] The buggy address is located 33 bytes to the right of
[   15.246114]  allocated 201-byte region [fff00000c0b93800, fff00000c0b938c9)
[   15.246604] 
[   15.246688] The buggy address belongs to the physical page:
[   15.246768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b92
[   15.246838] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.247075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.247296] page_type: f5(slab)
[   15.247398] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.247452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.247549] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.247839] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.248088] head: 0bfffe0000000001 ffffc1ffc302e481 00000000ffffffff 00000000ffffffff
[   15.248145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.248331] page dumped because: kasan: bad access detected
[   15.248528] 
[   15.248584] Memory state around the buggy address:
[   15.248701]  fff00000c0b93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.248773]  fff00000c0b93800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.249000] >fff00000c0b93880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.249089]                                                           ^
[   15.249130]  fff00000c0b93900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.249295]  fff00000c0b93980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.249343] ==================================================================
[   15.294493] ==================================================================
[   15.294538] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.295164] Write of size 1 at addr fff00000c65060d0 by task kunit_try_catch/162
[   15.295247] 
[   15.295309] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.295540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.295570] Hardware name: linux,dummy-virt (DT)
[   15.295861] Call trace:
[   15.295989]  show_stack+0x20/0x38 (C)
[   15.296097]  dump_stack_lvl+0x8c/0xd0
[   15.296256]  print_report+0x118/0x5d0
[   15.296346]  kasan_report+0xdc/0x128
[   15.296920]  __asan_report_store1_noabort+0x20/0x30
[   15.297055]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.297172]  krealloc_large_less_oob+0x20/0x38
[   15.297327]  kunit_try_run_case+0x170/0x3f0
[   15.297416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.297846]  kthread+0x328/0x630
[   15.297959]  ret_from_fork+0x10/0x20
[   15.298047] 
[   15.298820] The buggy address belongs to the physical page:
[   15.298938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106504
[   15.299023] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.299080] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.299353] page_type: f8(unknown)
[   15.299934] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.300021] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.300074] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.300539] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.300795] head: 0bfffe0000000002 ffffc1ffc3194101 00000000ffffffff 00000000ffffffff
[   15.300882] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.300925] page dumped because: kasan: bad access detected
[   15.301228] 
[   15.301268] Memory state around the buggy address:
[   15.301387]  fff00000c6505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.301495]  fff00000c6506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.301734] >fff00000c6506080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.301859]                                                  ^
[   15.302012]  fff00000c6506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.302157]  fff00000c6506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.302282] ==================================================================
[   15.208981] ==================================================================
[   15.209504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.209757] Write of size 1 at addr fff00000c0b938c9 by task kunit_try_catch/158
[   15.209867] 
[   15.209904] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.210259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.210303] Hardware name: linux,dummy-virt (DT)
[   15.210337] Call trace:
[   15.210359]  show_stack+0x20/0x38 (C)
[   15.210718]  dump_stack_lvl+0x8c/0xd0
[   15.210950]  print_report+0x118/0x5d0
[   15.211032]  kasan_report+0xdc/0x128
[   15.211078]  __asan_report_store1_noabort+0x20/0x30
[   15.211130]  krealloc_less_oob_helper+0xa48/0xc50
[   15.211177]  krealloc_less_oob+0x20/0x38
[   15.211502]  kunit_try_run_case+0x170/0x3f0
[   15.211686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.211748]  kthread+0x328/0x630
[   15.212301]  ret_from_fork+0x10/0x20
[   15.212529] 
[   15.212614] Allocated by task 158:
[   15.212774]  kasan_save_stack+0x3c/0x68
[   15.212906]  kasan_save_track+0x20/0x40
[   15.212976]  kasan_save_alloc_info+0x40/0x58
[   15.213209]  __kasan_krealloc+0x118/0x178
[   15.213410]  krealloc_noprof+0x128/0x360
[   15.213605]  krealloc_less_oob_helper+0x168/0xc50
[   15.213743]  krealloc_less_oob+0x20/0x38
[   15.213908]  kunit_try_run_case+0x170/0x3f0
[   15.214134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.214235]  kthread+0x328/0x630
[   15.214553]  ret_from_fork+0x10/0x20
[   15.214732] 
[   15.215024] The buggy address belongs to the object at fff00000c0b93800
[   15.215024]  which belongs to the cache kmalloc-256 of size 256
[   15.215269] The buggy address is located 0 bytes to the right of
[   15.215269]  allocated 201-byte region [fff00000c0b93800, fff00000c0b938c9)
[   15.215378] 
[   15.215400] The buggy address belongs to the physical page:
[   15.215431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b92
[   15.215489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.215985] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.216077] page_type: f5(slab)
[   15.216198] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.216291] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.216522] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.216604] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.216791] head: 0bfffe0000000001 ffffc1ffc302e481 00000000ffffffff 00000000ffffffff
[   15.217002] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.217092] page dumped because: kasan: bad access detected
[   15.217315] 
[   15.217424] Memory state around the buggy address:
[   15.217677]  fff00000c0b93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.217879]  fff00000c0b93800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.217940] >fff00000c0b93880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.218001]                                               ^
[   15.218044]  fff00000c0b93900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.218108]  fff00000c0b93980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.218154] ==================================================================
[   15.230304] ==================================================================
[   15.230536] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.230608] Write of size 1 at addr fff00000c0b938da by task kunit_try_catch/158
[   15.230670] 
[   15.230699] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.231254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.231388] Hardware name: linux,dummy-virt (DT)
[   15.231465] Call trace:
[   15.231592]  show_stack+0x20/0x38 (C)
[   15.231646]  dump_stack_lvl+0x8c/0xd0
[   15.231842]  print_report+0x118/0x5d0
[   15.232155]  kasan_report+0xdc/0x128
[   15.232251]  __asan_report_store1_noabort+0x20/0x30
[   15.232339]  krealloc_less_oob_helper+0xa80/0xc50
[   15.232503]  krealloc_less_oob+0x20/0x38
[   15.232598]  kunit_try_run_case+0x170/0x3f0
[   15.232882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.233090]  kthread+0x328/0x630
[   15.233231]  ret_from_fork+0x10/0x20
[   15.233357] 
[   15.233546] Allocated by task 158:
[   15.233655]  kasan_save_stack+0x3c/0x68
[   15.233827]  kasan_save_track+0x20/0x40
[   15.234299]  kasan_save_alloc_info+0x40/0x58
[   15.234729]  __kasan_krealloc+0x118/0x178
[   15.234809]  krealloc_noprof+0x128/0x360
[   15.234864]  krealloc_less_oob_helper+0x168/0xc50
[   15.234935]  krealloc_less_oob+0x20/0x38
[   15.234972]  kunit_try_run_case+0x170/0x3f0
[   15.235219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.235456]  kthread+0x328/0x630
[   15.235562]  ret_from_fork+0x10/0x20
[   15.235644] 
[   15.235918] The buggy address belongs to the object at fff00000c0b93800
[   15.235918]  which belongs to the cache kmalloc-256 of size 256
[   15.235981] The buggy address is located 17 bytes to the right of
[   15.235981]  allocated 201-byte region [fff00000c0b93800, fff00000c0b938c9)
[   15.236424] 
[   15.236602] The buggy address belongs to the physical page:
[   15.236704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b92
[   15.236797] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.236845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.236917] page_type: f5(slab)
[   15.236956] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.237031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.237084] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.237132] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.237191] head: 0bfffe0000000001 ffffc1ffc302e481 00000000ffffffff 00000000ffffffff
[   15.237245] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.237293] page dumped because: kasan: bad access detected
[   15.237325] 
[   15.237343] Memory state around the buggy address:
[   15.237379]  fff00000c0b93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.237437]  fff00000c0b93800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.237489] >fff00000c0b93880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.237535]                                                     ^
[   15.237572]  fff00000c0b93900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.237614]  fff00000c0b93980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.237652] ==================================================================
[   15.289022] ==================================================================
[   15.289085] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.289150] Write of size 1 at addr fff00000c65060c9 by task kunit_try_catch/162
[   15.289632] 
[   15.289717] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.289903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.289962] Hardware name: linux,dummy-virt (DT)
[   15.290031] Call trace:
[   15.290138]  show_stack+0x20/0x38 (C)
[   15.290214]  dump_stack_lvl+0x8c/0xd0
[   15.290415]  print_report+0x118/0x5d0
[   15.290548]  kasan_report+0xdc/0x128
[   15.290736]  __asan_report_store1_noabort+0x20/0x30
[   15.290869]  krealloc_less_oob_helper+0xa48/0xc50
[   15.290921]  krealloc_large_less_oob+0x20/0x38
[   15.290968]  kunit_try_run_case+0x170/0x3f0
[   15.291014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.291070]  kthread+0x328/0x630
[   15.291113]  ret_from_fork+0x10/0x20
[   15.291836] 
[   15.291905] The buggy address belongs to the physical page:
[   15.292283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106504
[   15.292421] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.292539] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.292697] page_type: f8(unknown)
[   15.292776] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.292863] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.293153] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.293394] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.293480] head: 0bfffe0000000002 ffffc1ffc3194101 00000000ffffffff 00000000ffffffff
[   15.293539] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.293621] page dumped because: kasan: bad access detected
[   15.293663] 
[   15.293680] Memory state around the buggy address:
[   15.293718]  fff00000c6505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.293761]  fff00000c6506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.293814] >fff00000c6506080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.293865]                                               ^
[   15.293902]  fff00000c6506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.293955]  fff00000c6506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.294002] ==================================================================
[   15.304465] ==================================================================
[   15.304514] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.304843] Write of size 1 at addr fff00000c65060da by task kunit_try_catch/162
[   15.304921] 
[   15.305205] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.305362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.305394] Hardware name: linux,dummy-virt (DT)
[   15.305424] Call trace:
[   15.305483]  show_stack+0x20/0x38 (C)
[   15.305951]  dump_stack_lvl+0x8c/0xd0
[   15.306260]  print_report+0x118/0x5d0
[   15.306355]  kasan_report+0xdc/0x128
[   15.306557]  __asan_report_store1_noabort+0x20/0x30
[   15.306774]  krealloc_less_oob_helper+0xa80/0xc50
[   15.306917]  krealloc_large_less_oob+0x20/0x38
[   15.306976]  kunit_try_run_case+0x170/0x3f0
[   15.307321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.307501]  kthread+0x328/0x630
[   15.307582]  ret_from_fork+0x10/0x20
[   15.307930] 
[   15.307965] The buggy address belongs to the physical page:
[   15.308033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106504
[   15.308159] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.308302] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.308518] page_type: f8(unknown)
[   15.308749] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.308972] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.309172] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.309229] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.309331] head: 0bfffe0000000002 ffffc1ffc3194101 00000000ffffffff 00000000ffffffff
[   15.309399] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.309462] page dumped because: kasan: bad access detected
[   15.309494] 
[   15.309512] Memory state around the buggy address:
[   15.309545]  fff00000c6505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.309588]  fff00000c6506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.309652] >fff00000c6506080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.309690]                                                     ^
[   15.309737]  fff00000c6506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.309790]  fff00000c6506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.309828] ==================================================================
[   15.311865] ==================================================================
[   15.312236] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.312323] Write of size 1 at addr fff00000c65060ea by task kunit_try_catch/162
[   15.312376] 
[   15.312609] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.312872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.313087] Hardware name: linux,dummy-virt (DT)
[   15.313144] Call trace:
[   15.313166]  show_stack+0x20/0x38 (C)
[   15.313455]  dump_stack_lvl+0x8c/0xd0
[   15.313620]  print_report+0x118/0x5d0
[   15.313692]  kasan_report+0xdc/0x128
[   15.313788]  __asan_report_store1_noabort+0x20/0x30
[   15.313995]  krealloc_less_oob_helper+0xae4/0xc50
[   15.314058]  krealloc_large_less_oob+0x20/0x38
[   15.314248]  kunit_try_run_case+0x170/0x3f0
[   15.314368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.314740]  kthread+0x328/0x630
[   15.314992]  ret_from_fork+0x10/0x20
[   15.315436] 
[   15.315608] The buggy address belongs to the physical page:
[   15.315667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106504
[   15.315864] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.316157] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.316370] page_type: f8(unknown)
[   15.316474] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.316608] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.316801] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.317204] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.317290] head: 0bfffe0000000002 ffffc1ffc3194101 00000000ffffffff 00000000ffffffff
[   15.317428] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.317471] page dumped because: kasan: bad access detected
[   15.317502] 
[   15.317519] Memory state around the buggy address:
[   15.317551]  fff00000c6505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.317611]  fff00000c6506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.317654] >fff00000c6506080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.317690]                                                           ^
[   15.317737]  fff00000c6506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.317780]  fff00000c6506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.317821] ==================================================================
[   15.249833] ==================================================================
[   15.249896] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.250648] Write of size 1 at addr fff00000c0b938eb by task kunit_try_catch/158
[   15.250722] 
[   15.250752] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.251447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.251523] Hardware name: linux,dummy-virt (DT)
[   15.251754] Call trace:
[   15.251839]  show_stack+0x20/0x38 (C)
[   15.252036]  dump_stack_lvl+0x8c/0xd0
[   15.252162]  print_report+0x118/0x5d0
[   15.252325]  kasan_report+0xdc/0x128
[   15.252432]  __asan_report_store1_noabort+0x20/0x30
[   15.252640]  krealloc_less_oob_helper+0xa58/0xc50
[   15.252901]  krealloc_less_oob+0x20/0x38
[   15.253037]  kunit_try_run_case+0x170/0x3f0
[   15.253318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.253498]  kthread+0x328/0x630
[   15.253675]  ret_from_fork+0x10/0x20
[   15.253892] 
[   15.253912] Allocated by task 158:
[   15.254146]  kasan_save_stack+0x3c/0x68
[   15.254306]  kasan_save_track+0x20/0x40
[   15.254604]  kasan_save_alloc_info+0x40/0x58
[   15.254827]  __kasan_krealloc+0x118/0x178
[   15.254897]  krealloc_noprof+0x128/0x360
[   15.254936]  krealloc_less_oob_helper+0x168/0xc50
[   15.255005]  krealloc_less_oob+0x20/0x38
[   15.255268]  kunit_try_run_case+0x170/0x3f0
[   15.255595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.255672]  kthread+0x328/0x630
[   15.255779]  ret_from_fork+0x10/0x20
[   15.255844] 
[   15.255885] The buggy address belongs to the object at fff00000c0b93800
[   15.255885]  which belongs to the cache kmalloc-256 of size 256
[   15.255958] The buggy address is located 34 bytes to the right of
[   15.255958]  allocated 201-byte region [fff00000c0b93800, fff00000c0b938c9)
[   15.256054] 
[   15.256073] The buggy address belongs to the physical page:
[   15.256103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b92
[   15.256162] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.256224] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.256275] page_type: f5(slab)
[   15.256329] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.256379] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.256445] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.256496] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.256559] head: 0bfffe0000000001 ffffc1ffc302e481 00000000ffffffff 00000000ffffffff
[   15.256609] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.256657] page dumped because: kasan: bad access detected
[   15.256696] 
[   15.256714] Memory state around the buggy address:
[   15.256750]  fff00000c0b93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.256808]  fff00000c0b93800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.256868] >fff00000c0b93880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.256906]                                                           ^
[   15.256954]  fff00000c0b93900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.256996]  fff00000c0b93980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.257034] ==================================================================

[   12.345442] ==================================================================
[   12.345778] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.346076] Write of size 1 at addr ffff888100a1c8d0 by task kunit_try_catch/175
[   12.346664] 
[   12.346774] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.346829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.346841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.346860] Call Trace:
[   12.346871]  <TASK>
[   12.346884]  dump_stack_lvl+0x73/0xb0
[   12.346912]  print_report+0xd1/0x610
[   12.346933]  ? __virt_addr_valid+0x1db/0x2d0
[   12.346954]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.346977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.346998]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.347021]  kasan_report+0x141/0x180
[   12.347042]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.347070]  __asan_report_store1_noabort+0x1b/0x30
[   12.347093]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.347118]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.347141]  ? finish_task_switch.isra.0+0x153/0x700
[   12.347161]  ? __switch_to+0x47/0xf50
[   12.347185]  ? __schedule+0x10c6/0x2b60
[   12.347207]  ? __pfx_read_tsc+0x10/0x10
[   12.347230]  krealloc_less_oob+0x1c/0x30
[   12.347250]  kunit_try_run_case+0x1a5/0x480
[   12.347275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.347297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.347320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.347342]  ? __kthread_parkme+0x82/0x180
[   12.347361]  ? preempt_count_sub+0x50/0x80
[   12.347383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.347459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.347482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.347505]  kthread+0x337/0x6f0
[   12.347525]  ? trace_preempt_on+0x20/0xc0
[   12.347546]  ? __pfx_kthread+0x10/0x10
[   12.347566]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.347587]  ? calculate_sigpending+0x7b/0xa0
[   12.347610]  ? __pfx_kthread+0x10/0x10
[   12.347630]  ret_from_fork+0x116/0x1d0
[   12.347648]  ? __pfx_kthread+0x10/0x10
[   12.347668]  ret_from_fork_asm+0x1a/0x30
[   12.347697]  </TASK>
[   12.347706] 
[   12.355467] Allocated by task 175:
[   12.355643]  kasan_save_stack+0x45/0x70
[   12.355861]  kasan_save_track+0x18/0x40
[   12.356017]  kasan_save_alloc_info+0x3b/0x50
[   12.356297]  __kasan_krealloc+0x190/0x1f0
[   12.356469]  krealloc_noprof+0xf3/0x340
[   12.356605]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.356769]  krealloc_less_oob+0x1c/0x30
[   12.356923]  kunit_try_run_case+0x1a5/0x480
[   12.357074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.357251]  kthread+0x337/0x6f0
[   12.357372]  ret_from_fork+0x116/0x1d0
[   12.357505]  ret_from_fork_asm+0x1a/0x30
[   12.357645] 
[   12.357744] The buggy address belongs to the object at ffff888100a1c800
[   12.357744]  which belongs to the cache kmalloc-256 of size 256
[   12.358747] The buggy address is located 7 bytes to the right of
[   12.358747]  allocated 201-byte region [ffff888100a1c800, ffff888100a1c8c9)
[   12.359578] 
[   12.359656] The buggy address belongs to the physical page:
[   12.359843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a1c
[   12.360087] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.360321] flags: 0x200000000000040(head|node=0|zone=2)
[   12.360577] page_type: f5(slab)
[   12.360746] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.361157] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.363113] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.363734] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.364103] head: 0200000000000001 ffffea0004028701 00000000ffffffff 00000000ffffffff
[   12.364563] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.364946] page dumped because: kasan: bad access detected
[   12.365549] 
[   12.365792] Memory state around the buggy address:
[   12.366183]  ffff888100a1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.366541]  ffff888100a1c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.366864] >ffff888100a1c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.367389]                                                  ^
[   12.367875]  ffff888100a1c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.368615]  ffff888100a1c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.369164] ==================================================================
[   12.546458] ==================================================================
[   12.546771] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.547138] Write of size 1 at addr ffff8881029520eb by task kunit_try_catch/179
[   12.547565] 
[   12.547669] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.547710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.547721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.547741] Call Trace:
[   12.547755]  <TASK>
[   12.547769]  dump_stack_lvl+0x73/0xb0
[   12.547796]  print_report+0xd1/0x610
[   12.547830]  ? __virt_addr_valid+0x1db/0x2d0
[   12.547852]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.547875]  ? kasan_addr_to_slab+0x11/0xa0
[   12.547894]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.547917]  kasan_report+0x141/0x180
[   12.547939]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.547967]  __asan_report_store1_noabort+0x1b/0x30
[   12.547990]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.548015]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.548040]  ? finish_task_switch.isra.0+0x153/0x700
[   12.548062]  ? __switch_to+0x47/0xf50
[   12.548086]  ? __schedule+0x10c6/0x2b60
[   12.548143]  ? __pfx_read_tsc+0x10/0x10
[   12.548167]  krealloc_large_less_oob+0x1c/0x30
[   12.548190]  kunit_try_run_case+0x1a5/0x480
[   12.548215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.548237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.548259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.548283]  ? __kthread_parkme+0x82/0x180
[   12.548303]  ? preempt_count_sub+0x50/0x80
[   12.548325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.548349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.548371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.548394]  kthread+0x337/0x6f0
[   12.548414]  ? trace_preempt_on+0x20/0xc0
[   12.548435]  ? __pfx_kthread+0x10/0x10
[   12.548455]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.548475]  ? calculate_sigpending+0x7b/0xa0
[   12.548499]  ? __pfx_kthread+0x10/0x10
[   12.548520]  ret_from_fork+0x116/0x1d0
[   12.548537]  ? __pfx_kthread+0x10/0x10
[   12.548558]  ret_from_fork_asm+0x1a/0x30
[   12.548588]  </TASK>
[   12.548597] 
[   12.556321] The buggy address belongs to the physical page:
[   12.556523] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102950
[   12.556878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.557264] flags: 0x200000000000040(head|node=0|zone=2)
[   12.557484] page_type: f8(unknown)
[   12.557634] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.557906] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.558130] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.558432] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.558868] head: 0200000000000002 ffffea00040a5401 00000000ffffffff 00000000ffffffff
[   12.559420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.559667] page dumped because: kasan: bad access detected
[   12.559936] 
[   12.560025] Memory state around the buggy address:
[   12.560318]  ffff888102951f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.560600]  ffff888102952000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.560894] >ffff888102952080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.561206]                                                           ^
[   12.561402]  ffff888102952100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.561613]  ffff888102952180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.562415] ==================================================================
[   12.493683] ==================================================================
[   12.493997] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   12.494496] Write of size 1 at addr ffff8881029520d0 by task kunit_try_catch/179
[   12.494797] 
[   12.494916] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.494957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.494968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.494988] Call Trace:
[   12.495000]  <TASK>
[   12.495014]  dump_stack_lvl+0x73/0xb0
[   12.495041]  print_report+0xd1/0x610
[   12.495062]  ? __virt_addr_valid+0x1db/0x2d0
[   12.495083]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.495115]  ? kasan_addr_to_slab+0x11/0xa0
[   12.495134]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.495158]  kasan_report+0x141/0x180
[   12.495179]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   12.495206]  __asan_report_store1_noabort+0x1b/0x30
[   12.495229]  krealloc_less_oob_helper+0xe23/0x11d0
[   12.495254]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.495278]  ? finish_task_switch.isra.0+0x153/0x700
[   12.495299]  ? __switch_to+0x47/0xf50
[   12.495324]  ? __schedule+0x10c6/0x2b60
[   12.495345]  ? __pfx_read_tsc+0x10/0x10
[   12.495368]  krealloc_large_less_oob+0x1c/0x30
[   12.495390]  kunit_try_run_case+0x1a5/0x480
[   12.495413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.495435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.495457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.495479]  ? __kthread_parkme+0x82/0x180
[   12.495499]  ? preempt_count_sub+0x50/0x80
[   12.495521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.495544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.495566]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.495589]  kthread+0x337/0x6f0
[   12.495608]  ? trace_preempt_on+0x20/0xc0
[   12.495629]  ? __pfx_kthread+0x10/0x10
[   12.495649]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.495670]  ? calculate_sigpending+0x7b/0xa0
[   12.495692]  ? __pfx_kthread+0x10/0x10
[   12.495713]  ret_from_fork+0x116/0x1d0
[   12.495730]  ? __pfx_kthread+0x10/0x10
[   12.495750]  ret_from_fork_asm+0x1a/0x30
[   12.495779]  </TASK>
[   12.495788] 
[   12.504670] The buggy address belongs to the physical page:
[   12.504959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102950
[   12.505426] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.505705] flags: 0x200000000000040(head|node=0|zone=2)
[   12.505934] page_type: f8(unknown)
[   12.506114] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.506524] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.507111] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.507492] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.507799] head: 0200000000000002 ffffea00040a5401 00000000ffffffff 00000000ffffffff
[   12.508127] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.508480] page dumped because: kasan: bad access detected
[   12.508656] 
[   12.508755] Memory state around the buggy address:
[   12.508997]  ffff888102951f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.509462]  ffff888102952000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.509683] >ffff888102952080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.510015]                                                  ^
[   12.510468]  ffff888102952100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.510806]  ffff888102952180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.511309] ==================================================================
[   12.528405] ==================================================================
[   12.528731] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.529118] Write of size 1 at addr ffff8881029520ea by task kunit_try_catch/179
[   12.529517] 
[   12.529610] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.529651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.529662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.529681] Call Trace:
[   12.529695]  <TASK>
[   12.529708]  dump_stack_lvl+0x73/0xb0
[   12.529734]  print_report+0xd1/0x610
[   12.529754]  ? __virt_addr_valid+0x1db/0x2d0
[   12.529774]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.529797]  ? kasan_addr_to_slab+0x11/0xa0
[   12.529829]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.529853]  kasan_report+0x141/0x180
[   12.529874]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.529901]  __asan_report_store1_noabort+0x1b/0x30
[   12.529924]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.529949]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.529972]  ? finish_task_switch.isra.0+0x153/0x700
[   12.529993]  ? __switch_to+0x47/0xf50
[   12.530016]  ? __schedule+0x10c6/0x2b60
[   12.530038]  ? __pfx_read_tsc+0x10/0x10
[   12.530060]  krealloc_large_less_oob+0x1c/0x30
[   12.530082]  kunit_try_run_case+0x1a5/0x480
[   12.530115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.530137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.530159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.530181]  ? __kthread_parkme+0x82/0x180
[   12.530200]  ? preempt_count_sub+0x50/0x80
[   12.530222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.530245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.530267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.530290]  kthread+0x337/0x6f0
[   12.530309]  ? trace_preempt_on+0x20/0xc0
[   12.530330]  ? __pfx_kthread+0x10/0x10
[   12.530350]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.530370]  ? calculate_sigpending+0x7b/0xa0
[   12.530393]  ? __pfx_kthread+0x10/0x10
[   12.530413]  ret_from_fork+0x116/0x1d0
[   12.530431]  ? __pfx_kthread+0x10/0x10
[   12.530450]  ret_from_fork_asm+0x1a/0x30
[   12.530479]  </TASK>
[   12.530489] 
[   12.538534] The buggy address belongs to the physical page:
[   12.538902] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102950
[   12.539561] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.539851] flags: 0x200000000000040(head|node=0|zone=2)
[   12.540109] page_type: f8(unknown)
[   12.540559] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.540933] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.541592] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.541928] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.542278] head: 0200000000000002 ffffea00040a5401 00000000ffffffff 00000000ffffffff
[   12.542618] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.542978] page dumped because: kasan: bad access detected
[   12.543209] 
[   12.543279] Memory state around the buggy address:
[   12.543431]  ffff888102951f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.543641]  ffff888102952000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.544164] >ffff888102952080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.544824]                                                           ^
[   12.545336]  ffff888102952100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.545575]  ffff888102952180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.545859] ==================================================================
[   12.369855] ==================================================================
[   12.370099] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.370498] Write of size 1 at addr ffff888100a1c8da by task kunit_try_catch/175
[   12.370914] 
[   12.371011] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.371054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.371065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.371085] Call Trace:
[   12.371102]  <TASK>
[   12.371117]  dump_stack_lvl+0x73/0xb0
[   12.371143]  print_report+0xd1/0x610
[   12.371164]  ? __virt_addr_valid+0x1db/0x2d0
[   12.371185]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.371207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.371239]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.371263]  kasan_report+0x141/0x180
[   12.371285]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.371312]  __asan_report_store1_noabort+0x1b/0x30
[   12.371336]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.371361]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.371384]  ? finish_task_switch.isra.0+0x153/0x700
[   12.371405]  ? __switch_to+0x47/0xf50
[   12.371429]  ? __schedule+0x10c6/0x2b60
[   12.371451]  ? __pfx_read_tsc+0x10/0x10
[   12.371474]  krealloc_less_oob+0x1c/0x30
[   12.371495]  kunit_try_run_case+0x1a5/0x480
[   12.371520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.371541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.371564]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.371586]  ? __kthread_parkme+0x82/0x180
[   12.371605]  ? preempt_count_sub+0x50/0x80
[   12.371627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.371650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.371672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.371695]  kthread+0x337/0x6f0
[   12.371713]  ? trace_preempt_on+0x20/0xc0
[   12.371735]  ? __pfx_kthread+0x10/0x10
[   12.371754]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.371775]  ? calculate_sigpending+0x7b/0xa0
[   12.371797]  ? __pfx_kthread+0x10/0x10
[   12.371828]  ret_from_fork+0x116/0x1d0
[   12.371845]  ? __pfx_kthread+0x10/0x10
[   12.371865]  ret_from_fork_asm+0x1a/0x30
[   12.371894]  </TASK>
[   12.371903] 
[   12.380264] Allocated by task 175:
[   12.380530]  kasan_save_stack+0x45/0x70
[   12.380725]  kasan_save_track+0x18/0x40
[   12.380932]  kasan_save_alloc_info+0x3b/0x50
[   12.381115]  __kasan_krealloc+0x190/0x1f0
[   12.381254]  krealloc_noprof+0xf3/0x340
[   12.381584]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.381794]  krealloc_less_oob+0x1c/0x30
[   12.381944]  kunit_try_run_case+0x1a5/0x480
[   12.382435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.382734]  kthread+0x337/0x6f0
[   12.382921]  ret_from_fork+0x116/0x1d0
[   12.383084]  ret_from_fork_asm+0x1a/0x30
[   12.383225] 
[   12.383300] The buggy address belongs to the object at ffff888100a1c800
[   12.383300]  which belongs to the cache kmalloc-256 of size 256
[   12.383788] The buggy address is located 17 bytes to the right of
[   12.383788]  allocated 201-byte region [ffff888100a1c800, ffff888100a1c8c9)
[   12.384617] 
[   12.384690] The buggy address belongs to the physical page:
[   12.384876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a1c
[   12.385537] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.385853] flags: 0x200000000000040(head|node=0|zone=2)
[   12.386036] page_type: f5(slab)
[   12.386194] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.386695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.387043] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.387311] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.387805] head: 0200000000000001 ffffea0004028701 00000000ffffffff 00000000ffffffff
[   12.388069] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.388491] page dumped because: kasan: bad access detected
[   12.388938] 
[   12.389018] Memory state around the buggy address:
[   12.389195]  ffff888100a1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.389540]  ffff888100a1c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.389926] >ffff888100a1c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.390227]                                                     ^
[   12.390502]  ffff888100a1c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.390949]  ffff888100a1c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.391287] ==================================================================
[   12.413176] ==================================================================
[   12.413526] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   12.413864] Write of size 1 at addr ffff888100a1c8eb by task kunit_try_catch/175
[   12.414227] 
[   12.414339] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.414380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.414391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.414411] Call Trace:
[   12.414424]  <TASK>
[   12.414437]  dump_stack_lvl+0x73/0xb0
[   12.414463]  print_report+0xd1/0x610
[   12.414484]  ? __virt_addr_valid+0x1db/0x2d0
[   12.414504]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.414527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.414548]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.414571]  kasan_report+0x141/0x180
[   12.414592]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   12.414620]  __asan_report_store1_noabort+0x1b/0x30
[   12.414643]  krealloc_less_oob_helper+0xd47/0x11d0
[   12.414668]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.414691]  ? finish_task_switch.isra.0+0x153/0x700
[   12.414713]  ? __switch_to+0x47/0xf50
[   12.414737]  ? __schedule+0x10c6/0x2b60
[   12.414758]  ? __pfx_read_tsc+0x10/0x10
[   12.414781]  krealloc_less_oob+0x1c/0x30
[   12.414802]  kunit_try_run_case+0x1a5/0x480
[   12.414837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.414859]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.414882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.414904]  ? __kthread_parkme+0x82/0x180
[   12.414923]  ? preempt_count_sub+0x50/0x80
[   12.414945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.414968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.414990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.415012]  kthread+0x337/0x6f0
[   12.415031]  ? trace_preempt_on+0x20/0xc0
[   12.415053]  ? __pfx_kthread+0x10/0x10
[   12.415073]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.415093]  ? calculate_sigpending+0x7b/0xa0
[   12.415116]  ? __pfx_kthread+0x10/0x10
[   12.415136]  ret_from_fork+0x116/0x1d0
[   12.415154]  ? __pfx_kthread+0x10/0x10
[   12.415173]  ret_from_fork_asm+0x1a/0x30
[   12.415236]  </TASK>
[   12.415248] 
[   12.422744] Allocated by task 175:
[   12.422892]  kasan_save_stack+0x45/0x70
[   12.423037]  kasan_save_track+0x18/0x40
[   12.423175]  kasan_save_alloc_info+0x3b/0x50
[   12.423325]  __kasan_krealloc+0x190/0x1f0
[   12.423512]  krealloc_noprof+0xf3/0x340
[   12.423703]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.424053]  krealloc_less_oob+0x1c/0x30
[   12.424594]  kunit_try_run_case+0x1a5/0x480
[   12.424825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.425103]  kthread+0x337/0x6f0
[   12.425343]  ret_from_fork+0x116/0x1d0
[   12.425535]  ret_from_fork_asm+0x1a/0x30
[   12.425730] 
[   12.425837] The buggy address belongs to the object at ffff888100a1c800
[   12.425837]  which belongs to the cache kmalloc-256 of size 256
[   12.426472] The buggy address is located 34 bytes to the right of
[   12.426472]  allocated 201-byte region [ffff888100a1c800, ffff888100a1c8c9)
[   12.427014] 
[   12.427134] The buggy address belongs to the physical page:
[   12.427460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a1c
[   12.427835] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.428183] flags: 0x200000000000040(head|node=0|zone=2)
[   12.428428] page_type: f5(slab)
[   12.428588] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.428934] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.429268] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.429602] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.430005] head: 0200000000000001 ffffea0004028701 00000000ffffffff 00000000ffffffff
[   12.430569] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.430880] page dumped because: kasan: bad access detected
[   12.431167] 
[   12.431329] Memory state around the buggy address:
[   12.431555]  ffff888100a1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.431889]  ffff888100a1c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.432292] >ffff888100a1c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.432607]                                                           ^
[   12.432911]  ffff888100a1c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.433313]  ffff888100a1c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.433564] ==================================================================
[   12.323138] ==================================================================
[   12.324414] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.324719] Write of size 1 at addr ffff888100a1c8c9 by task kunit_try_catch/175
[   12.325000] 
[   12.325110] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.325151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.325163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.325183] Call Trace:
[   12.325195]  <TASK>
[   12.325209]  dump_stack_lvl+0x73/0xb0
[   12.325237]  print_report+0xd1/0x610
[   12.325258]  ? __virt_addr_valid+0x1db/0x2d0
[   12.325279]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.325303]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.325324]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.325347]  kasan_report+0x141/0x180
[   12.325368]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.325396]  __asan_report_store1_noabort+0x1b/0x30
[   12.325419]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.325444]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.325467]  ? finish_task_switch.isra.0+0x153/0x700
[   12.325489]  ? __switch_to+0x47/0xf50
[   12.325515]  ? __schedule+0x10c6/0x2b60
[   12.325536]  ? __pfx_read_tsc+0x10/0x10
[   12.325559]  krealloc_less_oob+0x1c/0x30
[   12.325580]  kunit_try_run_case+0x1a5/0x480
[   12.325604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.325626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.325649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.325671]  ? __kthread_parkme+0x82/0x180
[   12.325691]  ? preempt_count_sub+0x50/0x80
[   12.325713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.325736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.325758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.325781]  kthread+0x337/0x6f0
[   12.325801]  ? trace_preempt_on+0x20/0xc0
[   12.325834]  ? __pfx_kthread+0x10/0x10
[   12.325854]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.325875]  ? calculate_sigpending+0x7b/0xa0
[   12.325898]  ? __pfx_kthread+0x10/0x10
[   12.325918]  ret_from_fork+0x116/0x1d0
[   12.325936]  ? __pfx_kthread+0x10/0x10
[   12.325956]  ret_from_fork_asm+0x1a/0x30
[   12.325985]  </TASK>
[   12.325995] 
[   12.333860] Allocated by task 175:
[   12.334040]  kasan_save_stack+0x45/0x70
[   12.334508]  kasan_save_track+0x18/0x40
[   12.334724]  kasan_save_alloc_info+0x3b/0x50
[   12.334909]  __kasan_krealloc+0x190/0x1f0
[   12.335054]  krealloc_noprof+0xf3/0x340
[   12.335507]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.335767]  krealloc_less_oob+0x1c/0x30
[   12.335960]  kunit_try_run_case+0x1a5/0x480
[   12.336193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.336428]  kthread+0x337/0x6f0
[   12.336567]  ret_from_fork+0x116/0x1d0
[   12.336755]  ret_from_fork_asm+0x1a/0x30
[   12.336926] 
[   12.337002] The buggy address belongs to the object at ffff888100a1c800
[   12.337002]  which belongs to the cache kmalloc-256 of size 256
[   12.337752] The buggy address is located 0 bytes to the right of
[   12.337752]  allocated 201-byte region [ffff888100a1c800, ffff888100a1c8c9)
[   12.338135] 
[   12.338212] The buggy address belongs to the physical page:
[   12.338392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a1c
[   12.338719] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.339064] flags: 0x200000000000040(head|node=0|zone=2)
[   12.339679] page_type: f5(slab)
[   12.339863] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.340340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.340668] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.340918] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.341489] head: 0200000000000001 ffffea0004028701 00000000ffffffff 00000000ffffffff
[   12.341874] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.342367] page dumped because: kasan: bad access detected
[   12.342589] 
[   12.342685] Memory state around the buggy address:
[   12.342873]  ffff888100a1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.343254]  ffff888100a1c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.343548] >ffff888100a1c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.343784]                                               ^
[   12.343973]  ffff888100a1c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.344598]  ffff888100a1c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.344937] ==================================================================
[   12.476702] ==================================================================
[   12.477306] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   12.477615] Write of size 1 at addr ffff8881029520c9 by task kunit_try_catch/179
[   12.477906] 
[   12.478018] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.478061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.478072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.478093] Call Trace:
[   12.478106]  <TASK>
[   12.478120]  dump_stack_lvl+0x73/0xb0
[   12.478150]  print_report+0xd1/0x610
[   12.478172]  ? __virt_addr_valid+0x1db/0x2d0
[   12.478195]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.478230]  ? kasan_addr_to_slab+0x11/0xa0
[   12.478250]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.478273]  kasan_report+0x141/0x180
[   12.478294]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   12.478322]  __asan_report_store1_noabort+0x1b/0x30
[   12.478345]  krealloc_less_oob_helper+0xd70/0x11d0
[   12.478370]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.478394]  ? finish_task_switch.isra.0+0x153/0x700
[   12.478416]  ? __switch_to+0x47/0xf50
[   12.478441]  ? __schedule+0x10c6/0x2b60
[   12.478463]  ? __pfx_read_tsc+0x10/0x10
[   12.478488]  krealloc_large_less_oob+0x1c/0x30
[   12.478510]  kunit_try_run_case+0x1a5/0x480
[   12.478535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.478557]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.478580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.478603]  ? __kthread_parkme+0x82/0x180
[   12.478622]  ? preempt_count_sub+0x50/0x80
[   12.478644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.478668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.478691]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.478713]  kthread+0x337/0x6f0
[   12.478732]  ? trace_preempt_on+0x20/0xc0
[   12.478755]  ? __pfx_kthread+0x10/0x10
[   12.478775]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.478796]  ? calculate_sigpending+0x7b/0xa0
[   12.478831]  ? __pfx_kthread+0x10/0x10
[   12.478852]  ret_from_fork+0x116/0x1d0
[   12.478871]  ? __pfx_kthread+0x10/0x10
[   12.478890]  ret_from_fork_asm+0x1a/0x30
[   12.478920]  </TASK>
[   12.478931] 
[   12.486905] The buggy address belongs to the physical page:
[   12.487125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102950
[   12.487474] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.487702] flags: 0x200000000000040(head|node=0|zone=2)
[   12.488142] page_type: f8(unknown)
[   12.488430] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.488739] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.488993] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.489312] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.489656] head: 0200000000000002 ffffea00040a5401 00000000ffffffff 00000000ffffffff
[   12.490254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.490502] page dumped because: kasan: bad access detected
[   12.490698] 
[   12.490792] Memory state around the buggy address:
[   12.491034]  ffff888102951f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.491668]  ffff888102952000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.491946] >ffff888102952080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.492164]                                               ^
[   12.492422]  ffff888102952100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.492868]  ffff888102952180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.493117] ==================================================================
[   12.511655] ==================================================================
[   12.511895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   12.512451] Write of size 1 at addr ffff8881029520da by task kunit_try_catch/179
[   12.512680] 
[   12.512761] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.512800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.512823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.512847] Call Trace:
[   12.512860]  <TASK>
[   12.512872]  dump_stack_lvl+0x73/0xb0
[   12.512899]  print_report+0xd1/0x610
[   12.512919]  ? __virt_addr_valid+0x1db/0x2d0
[   12.512940]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.512962]  ? kasan_addr_to_slab+0x11/0xa0
[   12.512983]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.513005]  kasan_report+0x141/0x180
[   12.513026]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   12.513054]  __asan_report_store1_noabort+0x1b/0x30
[   12.513077]  krealloc_less_oob_helper+0xec6/0x11d0
[   12.513113]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.513137]  ? finish_task_switch.isra.0+0x153/0x700
[   12.513158]  ? __switch_to+0x47/0xf50
[   12.513181]  ? __schedule+0x10c6/0x2b60
[   12.513202]  ? __pfx_read_tsc+0x10/0x10
[   12.513225]  krealloc_large_less_oob+0x1c/0x30
[   12.513248]  kunit_try_run_case+0x1a5/0x480
[   12.513272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.513294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.513316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.513339]  ? __kthread_parkme+0x82/0x180
[   12.513358]  ? preempt_count_sub+0x50/0x80
[   12.513380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.513403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.513425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.513521]  kthread+0x337/0x6f0
[   12.513542]  ? trace_preempt_on+0x20/0xc0
[   12.513564]  ? __pfx_kthread+0x10/0x10
[   12.513583]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.513604]  ? calculate_sigpending+0x7b/0xa0
[   12.513626]  ? __pfx_kthread+0x10/0x10
[   12.513647]  ret_from_fork+0x116/0x1d0
[   12.513665]  ? __pfx_kthread+0x10/0x10
[   12.513685]  ret_from_fork_asm+0x1a/0x30
[   12.513713]  </TASK>
[   12.513723] 
[   12.521486] The buggy address belongs to the physical page:
[   12.521876] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102950
[   12.522208] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.522909] flags: 0x200000000000040(head|node=0|zone=2)
[   12.523178] page_type: f8(unknown)
[   12.523307] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.523672] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.524040] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.524492] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.524784] head: 0200000000000002 ffffea00040a5401 00000000ffffffff 00000000ffffffff
[   12.525034] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.525357] page dumped because: kasan: bad access detected
[   12.525612] 
[   12.525705] Memory state around the buggy address:
[   12.526039]  ffff888102951f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.526305]  ffff888102952000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.526937] >ffff888102952080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   12.527287]                                                     ^
[   12.527542]  ffff888102952100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.527837]  ffff888102952180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.528052] ==================================================================
[   12.391833] ==================================================================
[   12.392151] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   12.392561] Write of size 1 at addr ffff888100a1c8ea by task kunit_try_catch/175
[   12.392909] 
[   12.393021] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.393062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.393073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.393093] Call Trace:
[   12.393107]  <TASK>
[   12.393121]  dump_stack_lvl+0x73/0xb0
[   12.393148]  print_report+0xd1/0x610
[   12.393169]  ? __virt_addr_valid+0x1db/0x2d0
[   12.393192]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.393262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.393285]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.393308]  kasan_report+0x141/0x180
[   12.393330]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   12.393357]  __asan_report_store1_noabort+0x1b/0x30
[   12.393381]  krealloc_less_oob_helper+0xe90/0x11d0
[   12.393406]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   12.393453]  ? finish_task_switch.isra.0+0x153/0x700
[   12.393475]  ? __switch_to+0x47/0xf50
[   12.393499]  ? __schedule+0x10c6/0x2b60
[   12.393521]  ? __pfx_read_tsc+0x10/0x10
[   12.393544]  krealloc_less_oob+0x1c/0x30
[   12.393565]  kunit_try_run_case+0x1a5/0x480
[   12.393589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.393611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.393634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.393656]  ? __kthread_parkme+0x82/0x180
[   12.393675]  ? preempt_count_sub+0x50/0x80
[   12.393697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.393721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.393743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.393766]  kthread+0x337/0x6f0
[   12.393785]  ? trace_preempt_on+0x20/0xc0
[   12.393807]  ? __pfx_kthread+0x10/0x10
[   12.393838]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.393859]  ? calculate_sigpending+0x7b/0xa0
[   12.393882]  ? __pfx_kthread+0x10/0x10
[   12.393903]  ret_from_fork+0x116/0x1d0
[   12.393921]  ? __pfx_kthread+0x10/0x10
[   12.393941]  ret_from_fork_asm+0x1a/0x30
[   12.393971]  </TASK>
[   12.393981] 
[   12.402282] Allocated by task 175:
[   12.402583]  kasan_save_stack+0x45/0x70
[   12.402777]  kasan_save_track+0x18/0x40
[   12.402964]  kasan_save_alloc_info+0x3b/0x50
[   12.403156]  __kasan_krealloc+0x190/0x1f0
[   12.403428]  krealloc_noprof+0xf3/0x340
[   12.403602]  krealloc_less_oob_helper+0x1aa/0x11d0
[   12.403805]  krealloc_less_oob+0x1c/0x30
[   12.403987]  kunit_try_run_case+0x1a5/0x480
[   12.404198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.404594]  kthread+0x337/0x6f0
[   12.404772]  ret_from_fork+0x116/0x1d0
[   12.404963]  ret_from_fork_asm+0x1a/0x30
[   12.405184] 
[   12.405257] The buggy address belongs to the object at ffff888100a1c800
[   12.405257]  which belongs to the cache kmalloc-256 of size 256
[   12.405956] The buggy address is located 33 bytes to the right of
[   12.405956]  allocated 201-byte region [ffff888100a1c800, ffff888100a1c8c9)
[   12.406347] 
[   12.406540] The buggy address belongs to the physical page:
[   12.406797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a1c
[   12.407265] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.407528] flags: 0x200000000000040(head|node=0|zone=2)
[   12.407781] page_type: f5(slab)
[   12.407937] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.408171] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.408405] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.408640] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.409003] head: 0200000000000001 ffffea0004028701 00000000ffffffff 00000000ffffffff
[   12.409344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.409694] page dumped because: kasan: bad access detected
[   12.409876] 
[   12.409947] Memory state around the buggy address:
[   12.410143]  ffff888100a1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.410853]  ffff888100a1c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.411316] >ffff888100a1c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   12.411585]                                                           ^
[   12.411789]  ffff888100a1c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.412026]  ffff888100a1c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.412701] ==================================================================