Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   50.434387] ==================================================================
[   50.441650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4
[   50.449279] Write of size 1 at addr cb2d1aea by task kunit_try_catch/214
[   50.456024] 
[   50.457519] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   50.457550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.457550] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.457580] Call trace: 
[   50.457580]  unwind_backtrace from show_stack+0x18/0x1c
[   50.457611]  show_stack from dump_stack_lvl+0x70/0x90
[   50.457611]  dump_stack_lvl from print_report+0x158/0x528
[   50.457641]  print_report from kasan_report+0xdc/0x118
[   50.457672]  kasan_report from krealloc_less_oob_helper+0xd58/0xea4
[   50.457702]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.457702]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.457733]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.457763]  kthread from ret_from_fork+0x14/0x20
[   50.457794] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   50.457794] bfa0:                                     00000000 00000000 00000000 00000000
[   50.457824] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.457824] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.457855] 
[   50.563934] Allocated by task 214:
[   50.567352]  kasan_save_track+0x30/0x5c
[   50.571228]  __kasan_krealloc+0xf4/0x140
[   50.575195]  krealloc_noprof+0x104/0x2e4
[   50.579132]  krealloc_less_oob_helper+0x1d8/0xea4
[   50.583892]  kunit_try_run_case+0x22c/0x5a8
[   50.588104]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.593627]  kthread+0x464/0x810
[   50.596893]  ret_from_fork+0x14/0x20
[   50.600494] 
[   50.601989] The buggy address belongs to the object at cb2d1a00
[   50.601989]  which belongs to the cache kmalloc-256 of size 256
[   50.613891] The buggy address is located 33 bytes to the right of
[   50.613891]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   50.625610] 
[   50.627105] The buggy address belongs to the physical page:
[   50.632720] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   50.639984] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.647705] flags: 0x40(head|zone=0)
[   50.651306] page_type: f5(slab)
[   50.654479] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.662597] raw: 00000000
[   50.665252] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.673492] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.681732] head: 00000000 00000002
[   50.685241] page dumped because: kasan: bad access detected
[   50.690826] 
[   50.692321] Memory state around the buggy address:
[   50.697143]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.703735]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.710296] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.716857]                                                   ^
[   50.722839]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.729400]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.735961] ==================================================================
[   50.743286] ==================================================================
[   50.750549] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4
[   50.758178] Write of size 1 at addr cb2d1aeb by task kunit_try_catch/214
[   50.764923] 
[   50.766448] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   50.766448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.766479] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.766479] Call trace: 
[   50.766479]  unwind_backtrace from show_stack+0x18/0x1c
[   50.766510]  show_stack from dump_stack_lvl+0x70/0x90
[   50.766540]  dump_stack_lvl from print_report+0x158/0x528
[   50.766571]  print_report from kasan_report+0xdc/0x118
[   50.766571]  kasan_report from krealloc_less_oob_helper+0xd00/0xea4
[   50.766601]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.766632]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.766662]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.766693]  kthread from ret_from_fork+0x14/0x20
[   50.766693] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   50.766723] bfa0:                                     00000000 00000000 00000000 00000000
[   50.766723] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.766754] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.766754] 
[   50.872863] Allocated by task 214:
[   50.876281]  kasan_save_track+0x30/0x5c
[   50.880157]  __kasan_krealloc+0xf4/0x140
[   50.884094]  krealloc_noprof+0x104/0x2e4
[   50.888061]  krealloc_less_oob_helper+0x1d8/0xea4
[   50.892791]  kunit_try_run_case+0x22c/0x5a8
[   50.897003]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.902526]  kthread+0x464/0x810
[   50.905792]  ret_from_fork+0x14/0x20
[   50.909393] 
[   50.910919] The buggy address belongs to the object at cb2d1a00
[   50.910919]  which belongs to the cache kmalloc-256 of size 256
[   50.922790] The buggy address is located 34 bytes to the right of
[   50.922790]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   50.934539] 
[   50.936035] The buggy address belongs to the physical page:
[   50.941650] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   50.948913] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.956604] flags: 0x40(head|zone=0)
[   50.960205] page_type: f5(slab)
[   50.963378] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.971527] raw: 00000000
[   50.974182] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.982421] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.990631] head: 00000000 00000002
[   50.994140] page dumped because: kasan: bad access detected
[   50.999755] 
[   51.001251] Memory state around the buggy address:
[   51.006072]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.012664]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.019226] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   51.025787]                                                   ^
[   51.031738]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.038330]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.044891] ==================================================================
[   52.044830] ==================================================================
[   52.052124] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4
[   52.059722] Write of size 1 at addr ccb3a0da by task kunit_try_catch/218
[   52.066467] 
[   52.067993] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   52.068023] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.068023] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.068023] Call trace: 
[   52.068054]  unwind_backtrace from show_stack+0x18/0x1c
[   52.068054]  show_stack from dump_stack_lvl+0x70/0x90
[   52.068084]  dump_stack_lvl from print_report+0x158/0x528
[   52.068115]  print_report from kasan_report+0xdc/0x118
[   52.068145]  kasan_report from krealloc_less_oob_helper+0xd18/0xea4
[   52.068145]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   52.068176]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.068206]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.068237]  kthread from ret_from_fork+0x14/0x20
[   52.068237] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   52.068267] bfa0:                                     00000000 00000000 00000000 00000000
[   52.068267] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.068298] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.068298] 
[   52.174407] The buggy address belongs to the physical page:
[   52.180023] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   52.187286] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.194976] flags: 0x40(head|zone=0)
[   52.198577] page_type: f8(unknown)
[   52.202026] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.210174] raw: 00000000
[   52.212799] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.221038] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.229278] head: 00000000 00000004
[   52.232788] page dumped because: kasan: bad access detected
[   52.238372] 
[   52.239898] Memory state around the buggy address:
[   52.244720]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.251281]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.257843] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.264434]                                             ^
[   52.269866]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.276428]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.282989] ==================================================================
[   52.536315] ==================================================================
[   52.543579] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4
[   52.551208] Write of size 1 at addr ccb3a0eb by task kunit_try_catch/218
[   52.557952] 
[   52.559448] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   52.559478] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.559509] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.559509] Call trace: 
[   52.559509]  unwind_backtrace from show_stack+0x18/0x1c
[   52.559539]  show_stack from dump_stack_lvl+0x70/0x90
[   52.559570]  dump_stack_lvl from print_report+0x158/0x528
[   52.559600]  print_report from kasan_report+0xdc/0x118
[   52.559600]  kasan_report from krealloc_less_oob_helper+0xd00/0xea4
[   52.559631]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   52.559661]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.559692]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.559722]  kthread from ret_from_fork+0x14/0x20
[   52.559722] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   52.559753] bfa0:                                     00000000 00000000 00000000 00000000
[   52.559753] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.559783] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.559783] 
[   52.665893] The buggy address belongs to the physical page:
[   52.671478] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   52.678771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.686462] flags: 0x40(head|zone=0)
[   52.690063] page_type: f8(unknown)
[   52.693511] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.701660] raw: 00000000
[   52.704284] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.712524] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.720764] head: 00000000 00000004
[   52.724273] page dumped because: kasan: bad access detected
[   52.729858] 
[   52.731384] Memory state around the buggy address:
[   52.736206]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.742767]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.749328] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.755920]                                                   ^
[   52.761871]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.768432]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.774993] ==================================================================
[   51.550170] ==================================================================
[   51.561798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4
[   51.569427] Write of size 1 at addr ccb3a0c9 by task kunit_try_catch/218
[   51.576171] 
[   51.577697] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   51.577728] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.577728] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.577728] Call trace: 
[   51.577728]  unwind_backtrace from show_stack+0x18/0x1c
[   51.577758]  show_stack from dump_stack_lvl+0x70/0x90
[   51.577789]  dump_stack_lvl from print_report+0x158/0x528
[   51.577819]  print_report from kasan_report+0xdc/0x118
[   51.577850]  kasan_report from krealloc_less_oob_helper+0xcf4/0xea4
[   51.577850]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.577880]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.577911]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.577941]  kthread from ret_from_fork+0x14/0x20
[   51.577941] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   51.577972] bfa0:                                     00000000 00000000 00000000 00000000
[   51.577972] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.578002] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.578002] 
[   51.684112] The buggy address belongs to the physical page:
[   51.689727] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   51.696990] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.704711] flags: 0x40(head|zone=0)
[   51.708312] page_type: f8(unknown)
[   51.711730] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.719879] raw: 00000000
[   51.722534] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.730743] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.738983] head: 00000000 00000004
[   51.742492] page dumped because: kasan: bad access detected
[   51.748107] 
[   51.749603] Memory state around the buggy address:
[   51.754425]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.760986]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.767578] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   51.774139]                                       ^
[   51.779052]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.785614]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.792175] ==================================================================
[   52.290313] ==================================================================
[   52.297576] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4
[   52.305206] Write of size 1 at addr ccb3a0ea by task kunit_try_catch/218
[   52.311950] 
[   52.313476] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   52.313476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.313507] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.313507] Call trace: 
[   52.313507]  unwind_backtrace from show_stack+0x18/0x1c
[   52.313537]  show_stack from dump_stack_lvl+0x70/0x90
[   52.313568]  dump_stack_lvl from print_report+0x158/0x528
[   52.313598]  print_report from kasan_report+0xdc/0x118
[   52.313598]  kasan_report from krealloc_less_oob_helper+0xd58/0xea4
[   52.313629]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   52.313659]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.313690]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.313720]  kthread from ret_from_fork+0x14/0x20
[   52.313720] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   52.313751] bfa0:                                     00000000 00000000 00000000 00000000
[   52.313751] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.313781] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.313781] 
[   52.419891] The buggy address belongs to the physical page:
[   52.425476] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   52.432769] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.440460] flags: 0x40(head|zone=0)
[   52.444061] page_type: f8(unknown)
[   52.447509] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.455627] raw: 00000000
[   52.458282] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.466522] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.474761] head: 00000000 00000004
[   52.478271] page dumped because: kasan: bad access detected
[   52.483856] 
[   52.485382] Memory state around the buggy address:
[   52.490203]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.496765]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.503326] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.509918]                                                   ^
[   52.515869]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.522430]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.528991] ==================================================================
[   49.506317] ==================================================================
[   49.517425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4
[   49.525054] Write of size 1 at addr cb2d1ac9 by task kunit_try_catch/214
[   49.531799] 
[   49.533325] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   49.533355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   49.533355] Hardware name: Generic DRA74X (Flattened Device Tree)
[   49.533355] Call trace: 
[   49.533355]  unwind_backtrace from show_stack+0x18/0x1c
[   49.533386]  show_stack from dump_stack_lvl+0x70/0x90
[   49.533416]  dump_stack_lvl from print_report+0x158/0x528
[   49.533447]  print_report from kasan_report+0xdc/0x118
[   49.533477]  kasan_report from krealloc_less_oob_helper+0xcf4/0xea4
[   49.533477]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   49.533508]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.533538]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   49.533569]  kthread from ret_from_fork+0x14/0x20
[   49.533569] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   49.533599] bfa0:                                     00000000 00000000 00000000 00000000
[   49.533599] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   49.533630] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   49.533630] 
[   49.639739] Allocated by task 214:
[   49.643157]  kasan_save_track+0x30/0x5c
[   49.647033]  __kasan_krealloc+0xf4/0x140
[   49.650970]  krealloc_noprof+0x104/0x2e4
[   49.654937]  krealloc_less_oob_helper+0x1d8/0xea4
[   49.659667]  kunit_try_run_case+0x22c/0x5a8
[   49.663909]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.669433]  kthread+0x464/0x810
[   49.672668]  ret_from_fork+0x14/0x20
[   49.676300] 
[   49.677795] The buggy address belongs to the object at cb2d1a00
[   49.677795]  which belongs to the cache kmalloc-256 of size 256
[   49.689697] The buggy address is located 0 bytes to the right of
[   49.689697]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   49.701324] 
[   49.702819] The buggy address belongs to the physical page:
[   49.708435] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   49.715698] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.723419] flags: 0x40(head|zone=0)
[   49.727020] page_type: f5(slab)
[   49.730194] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.738342] raw: 00000000
[   49.740966] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.749206] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   49.757446] head: 00000000 00000002
[   49.760955] page dumped because: kasan: bad access detected
[   49.766571] 
[   49.768066] Memory state around the buggy address:
[   49.772888]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.779449]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.786041] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   49.792602]                                       ^
[   49.797515]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.804077]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.810638] ==================================================================
[   50.125976] ==================================================================
[   50.133270] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4
[   50.140899] Write of size 1 at addr cb2d1ada by task kunit_try_catch/214
[   50.147644] 
[   50.149139] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   50.149169] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.149169] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.149169] Call trace: 
[   50.149200]  unwind_backtrace from show_stack+0x18/0x1c
[   50.149200]  show_stack from dump_stack_lvl+0x70/0x90
[   50.149230]  dump_stack_lvl from print_report+0x158/0x528
[   50.149261]  print_report from kasan_report+0xdc/0x118
[   50.149291]  kasan_report from krealloc_less_oob_helper+0xd18/0xea4
[   50.149291]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.149322]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.149353]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.149383]  kthread from ret_from_fork+0x14/0x20
[   50.149414] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   50.149414] bfa0:                                     00000000 00000000 00000000 00000000
[   50.149444] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.149444] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.149475] 
[   50.255554] Allocated by task 214:
[   50.258972]  kasan_save_track+0x30/0x5c
[   50.262847]  __kasan_krealloc+0xf4/0x140
[   50.266815]  krealloc_noprof+0x104/0x2e4
[   50.270751]  krealloc_less_oob_helper+0x1d8/0xea4
[   50.275512]  kunit_try_run_case+0x22c/0x5a8
[   50.279724]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.285247]  kthread+0x464/0x810
[   50.288513]  ret_from_fork+0x14/0x20
[   50.292114] 
[   50.293609] The buggy address belongs to the object at cb2d1a00
[   50.293609]  which belongs to the cache kmalloc-256 of size 256
[   50.305511] The buggy address is located 17 bytes to the right of
[   50.305511]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   50.317230] 
[   50.318725] The buggy address belongs to the physical page:
[   50.324340] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   50.331604] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.339324] flags: 0x40(head|zone=0)
[   50.342926] page_type: f5(slab)
[   50.346099] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.354217] raw: 00000000
[   50.356872] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.365112] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.373352] head: 00000000 00000002
[   50.376861] page dumped because: kasan: bad access detected
[   50.382446] 
[   50.383972] Memory state around the buggy address:
[   50.388793]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.395355]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.401916] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.408477]                                             ^
[   50.413940]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.420501]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.427062] ==================================================================
[   51.799621] ==================================================================
[   51.806884] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4
[   51.814514] Write of size 1 at addr ccb3a0d0 by task kunit_try_catch/218
[   51.821258] 
[   51.822784] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   51.822814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.822814] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.822814] Call trace: 
[   51.822814]  unwind_backtrace from show_stack+0x18/0x1c
[   51.822845]  show_stack from dump_stack_lvl+0x70/0x90
[   51.822875]  dump_stack_lvl from print_report+0x158/0x528
[   51.822906]  print_report from kasan_report+0xdc/0x118
[   51.822937]  kasan_report from krealloc_less_oob_helper+0xdd0/0xea4
[   51.822937]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.822967]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.822998]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.823028]  kthread from ret_from_fork+0x14/0x20
[   51.823028] Exception stack(0xf23ebfb0 to 0xf23ebff8)
[   51.823059] bfa0:                                     00000000 00000000 00000000 00000000
[   51.823059] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.823089] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.823089] 
[   51.929199] The buggy address belongs to the physical page:
[   51.934814] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38
[   51.942077] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.949768] flags: 0x40(head|zone=0)
[   51.953369] page_type: f8(unknown)
[   51.956817] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.964965] raw: 00000000
[   51.967590] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.975830] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.984069] head: 00000000 00000004
[   51.987579] page dumped because: kasan: bad access detected
[   51.993194] 
[   51.994689] Memory state around the buggy address:
[   51.999511]  ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.006072]  ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.012634] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.019226]                                          ^
[   52.024383]  ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.030975]  ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.037536] ==================================================================
[   49.817962] ==================================================================
[   49.825225] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4
[   49.832855] Write of size 1 at addr cb2d1ad0 by task kunit_try_catch/214
[   49.839599] 
[   49.841094] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   49.841125] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   49.841125] Hardware name: Generic DRA74X (Flattened Device Tree)
[   49.841156] Call trace: 
[   49.841156]  unwind_backtrace from show_stack+0x18/0x1c
[   49.841186]  show_stack from dump_stack_lvl+0x70/0x90
[   49.841186]  dump_stack_lvl from print_report+0x158/0x528
[   49.841217]  print_report from kasan_report+0xdc/0x118
[   49.841247]  kasan_report from krealloc_less_oob_helper+0xdd0/0xea4
[   49.841278]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   49.841308]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.841308]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   49.841339]  kthread from ret_from_fork+0x14/0x20
[   49.841369] Exception stack(0xf23cbfb0 to 0xf23cbff8)
[   49.841369] bfa0:                                     00000000 00000000 00000000 00000000
[   49.841400] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   49.841400] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   49.841430] 
[   49.947509] Allocated by task 214:
[   49.950927]  kasan_save_track+0x30/0x5c
[   49.954803]  __kasan_krealloc+0xf4/0x140
[   49.958770]  krealloc_noprof+0x104/0x2e4
[   49.962707]  krealloc_less_oob_helper+0x1d8/0xea4
[   49.967468]  kunit_try_run_case+0x22c/0x5a8
[   49.971679]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.977203]  kthread+0x464/0x810
[   49.980468]  ret_from_fork+0x14/0x20
[   49.984069] 
[   49.985565] The buggy address belongs to the object at cb2d1a00
[   49.985565]  which belongs to the cache kmalloc-256 of size 256
[   49.997467] The buggy address is located 7 bytes to the right of
[   49.997467]  allocated 201-byte region [cb2d1a00, cb2d1ac9)
[   50.009094] 
[   50.010589] The buggy address belongs to the physical page:
[   50.016204] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0
[   50.023468] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.031188] flags: 0x40(head|zone=0)
[   50.034790] page_type: f5(slab)
[   50.037963] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.046112] raw: 00000000
[   50.048736] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.056976] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.065216] head: 00000000 00000002
[   50.068725] page dumped because: kasan: bad access detected
[   50.074310] 
[   50.075836] Memory state around the buggy address:
[   50.080657]  cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.087219]  cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.093780] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.100372]                                          ^
[   50.105529]  cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.112091]  cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.118682] ==================================================================

[   18.220783] ==================================================================
[   18.231855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   18.239516] Write of size 1 at addr ffff888100350ec9 by task kunit_try_catch/201
[   18.246909] 
[   18.248410] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.248418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.248420] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.248423] Call Trace:
[   18.248425]  <TASK>
[   18.248427]  dump_stack_lvl+0x73/0xb0
[   18.248431]  print_report+0xd1/0x650
[   18.248435]  ? __virt_addr_valid+0x1db/0x2d0
[   18.248439]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.248444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.248448]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.248452]  kasan_report+0x141/0x180
[   18.248457]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.248462]  __asan_report_store1_noabort+0x1b/0x30
[   18.248466]  krealloc_less_oob_helper+0xd70/0x11d0
[   18.248471]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.248476]  ? finish_task_switch.isra.0+0x153/0x700
[   18.248480]  ? __switch_to+0x5d9/0xf60
[   18.248484]  ? dequeue_task_fair+0x166/0x4e0
[   18.248488]  ? __schedule+0x10cc/0x2b30
[   18.248493]  krealloc_less_oob+0x1c/0x30
[   18.248497]  kunit_try_run_case+0x1a2/0x480
[   18.248502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.248506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.248510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.248515]  ? __kthread_parkme+0x82/0x180
[   18.248519]  ? preempt_count_sub+0x50/0x80
[   18.248523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.248527]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.248532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.248536]  kthread+0x334/0x6f0
[   18.248540]  ? trace_preempt_on+0x20/0xc0
[   18.248544]  ? __pfx_kthread+0x10/0x10
[   18.248548]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.248552]  ? calculate_sigpending+0x7b/0xa0
[   18.248556]  ? __pfx_kthread+0x10/0x10
[   18.248560]  ret_from_fork+0x3e/0x80
[   18.248564]  ? __pfx_kthread+0x10/0x10
[   18.248568]  ret_from_fork_asm+0x1a/0x30
[   18.248574]  </TASK>
[   18.248576] 
[   18.427853] Allocated by task 201:
[   18.431259]  kasan_save_stack+0x45/0x70
[   18.435106]  kasan_save_track+0x18/0x40
[   18.438944]  kasan_save_alloc_info+0x3b/0x50
[   18.443219]  __kasan_krealloc+0x190/0x1f0
[   18.447237]  krealloc_noprof+0xf3/0x340
[   18.451079]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.455878]  krealloc_less_oob+0x1c/0x30
[   18.459806]  kunit_try_run_case+0x1a2/0x480
[   18.463998]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.469397]  kthread+0x334/0x6f0
[   18.472631]  ret_from_fork+0x3e/0x80
[   18.476210]  ret_from_fork_asm+0x1a/0x30
[   18.480135] 
[   18.481635] The buggy address belongs to the object at ffff888100350e00
[   18.481635]  which belongs to the cache kmalloc-256 of size 256
[   18.494150] The buggy address is located 0 bytes to the right of
[   18.494150]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   18.507104] 
[   18.508603] The buggy address belongs to the physical page:
[   18.514177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   18.522183] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.529836] flags: 0x200000000000040(head|node=0|zone=2)
[   18.535149] page_type: f5(slab)
[   18.538296] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.546043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.553784] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.561617] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.569450] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   18.577275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.585102] page dumped because: kasan: bad access detected
[   18.590689] 
[   18.592215] Memory state around the buggy address:
[   18.597008]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.604227]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.611449] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.618684]                                               ^
[   18.624292]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.631519]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.638738] ==================================================================
[   19.489501] ==================================================================
[   19.496735] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   19.504393] Write of size 1 at addr ffff888100350eea by task kunit_try_catch/201
[   19.511784] 
[   19.513278] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   19.513285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.513287] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.513290] Call Trace:
[   19.513292]  <TASK>
[   19.513293]  dump_stack_lvl+0x73/0xb0
[   19.513297]  print_report+0xd1/0x650
[   19.513301]  ? __virt_addr_valid+0x1db/0x2d0
[   19.513304]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.513309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.513313]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.513317]  kasan_report+0x141/0x180
[   19.513321]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.513327]  __asan_report_store1_noabort+0x1b/0x30
[   19.513331]  krealloc_less_oob_helper+0xe90/0x11d0
[   19.513336]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.513340]  ? finish_task_switch.isra.0+0x153/0x700
[   19.513345]  ? __switch_to+0x5d9/0xf60
[   19.513348]  ? dequeue_task_fair+0x166/0x4e0
[   19.513352]  ? __schedule+0x10cc/0x2b30
[   19.513357]  krealloc_less_oob+0x1c/0x30
[   19.513362]  kunit_try_run_case+0x1a2/0x480
[   19.513366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.513370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.513374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.513378]  ? __kthread_parkme+0x82/0x180
[   19.513382]  ? preempt_count_sub+0x50/0x80
[   19.513387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.513391]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.513395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.513399]  kthread+0x334/0x6f0
[   19.513403]  ? trace_preempt_on+0x20/0xc0
[   19.513407]  ? __pfx_kthread+0x10/0x10
[   19.513411]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.513415]  ? calculate_sigpending+0x7b/0xa0
[   19.513419]  ? __pfx_kthread+0x10/0x10
[   19.513423]  ret_from_fork+0x3e/0x80
[   19.513427]  ? __pfx_kthread+0x10/0x10
[   19.513431]  ret_from_fork_asm+0x1a/0x30
[   19.513437]  </TASK>
[   19.513438] 
[   19.692745] Allocated by task 201:
[   19.696150]  kasan_save_stack+0x45/0x70
[   19.699990]  kasan_save_track+0x18/0x40
[   19.703828]  kasan_save_alloc_info+0x3b/0x50
[   19.708104]  __kasan_krealloc+0x190/0x1f0
[   19.712116]  krealloc_noprof+0xf3/0x340
[   19.715962]  krealloc_less_oob_helper+0x1aa/0x11d0
[   19.720756]  krealloc_less_oob+0x1c/0x30
[   19.724704]  kunit_try_run_case+0x1a2/0x480
[   19.728908]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.734310]  kthread+0x334/0x6f0
[   19.737543]  ret_from_fork+0x3e/0x80
[   19.741130]  ret_from_fork_asm+0x1a/0x30
[   19.745064] 
[   19.746563] The buggy address belongs to the object at ffff888100350e00
[   19.746563]  which belongs to the cache kmalloc-256 of size 256
[   19.759077] The buggy address is located 33 bytes to the right of
[   19.759077]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   19.772111] 
[   19.773611] The buggy address belongs to the physical page:
[   19.779182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   19.787181] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.794834] flags: 0x200000000000040(head|node=0|zone=2)
[   19.800145] page_type: f5(slab)
[   19.803292] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.811032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.818773] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.826607] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.834439] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   19.842266] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.850098] page dumped because: kasan: bad access detected
[   19.855689] 
[   19.857214] Memory state around the buggy address:
[   19.862005]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.869225]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.876445] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.883664]                                                           ^
[   19.890309]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.897530]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.904749] ==================================================================
[   19.911990] ==================================================================
[   19.919220] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   19.926875] Write of size 1 at addr ffff888100350eeb by task kunit_try_catch/201
[   19.934275] 
[   19.935776] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   19.935784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.935785] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.935788] Call Trace:
[   19.935790]  <TASK>
[   19.935791]  dump_stack_lvl+0x73/0xb0
[   19.935795]  print_report+0xd1/0x650
[   19.935799]  ? __virt_addr_valid+0x1db/0x2d0
[   19.935802]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   19.935807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.935811]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   19.935815]  kasan_report+0x141/0x180
[   19.935820]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   19.935825]  __asan_report_store1_noabort+0x1b/0x30
[   19.935829]  krealloc_less_oob_helper+0xd47/0x11d0
[   19.935834]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.935838]  ? finish_task_switch.isra.0+0x153/0x700
[   19.935843]  ? __switch_to+0x5d9/0xf60
[   19.935846]  ? dequeue_task_fair+0x166/0x4e0
[   19.935850]  ? __schedule+0x10cc/0x2b30
[   19.935855]  krealloc_less_oob+0x1c/0x30
[   19.935859]  kunit_try_run_case+0x1a2/0x480
[   19.935864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.935868]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.935872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.935876]  ? __kthread_parkme+0x82/0x180
[   19.935880]  ? preempt_count_sub+0x50/0x80
[   19.935885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.935889]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.935893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.935897]  kthread+0x334/0x6f0
[   19.935901]  ? trace_preempt_on+0x20/0xc0
[   19.935905]  ? __pfx_kthread+0x10/0x10
[   19.935909]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.935913]  ? calculate_sigpending+0x7b/0xa0
[   19.935917]  ? __pfx_kthread+0x10/0x10
[   19.935921]  ret_from_fork+0x3e/0x80
[   19.935925]  ? __pfx_kthread+0x10/0x10
[   19.935929]  ret_from_fork_asm+0x1a/0x30
[   19.935935]  </TASK>
[   19.935936] 
[   20.115147] Allocated by task 201:
[   20.118555]  kasan_save_stack+0x45/0x70
[   20.122401]  kasan_save_track+0x18/0x40
[   20.126241]  kasan_save_alloc_info+0x3b/0x50
[   20.130513]  __kasan_krealloc+0x190/0x1f0
[   20.134526]  krealloc_noprof+0xf3/0x340
[   20.138365]  krealloc_less_oob_helper+0x1aa/0x11d0
[   20.143156]  krealloc_less_oob+0x1c/0x30
[   20.147083]  kunit_try_run_case+0x1a2/0x480
[   20.151269]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.156667]  kthread+0x334/0x6f0
[   20.159953]  ret_from_fork+0x3e/0x80
[   20.163533]  ret_from_fork_asm+0x1a/0x30
[   20.167456] 
[   20.168957] The buggy address belongs to the object at ffff888100350e00
[   20.168957]  which belongs to the cache kmalloc-256 of size 256
[   20.181470] The buggy address is located 34 bytes to the right of
[   20.181470]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   20.194504] 
[   20.196005] The buggy address belongs to the physical page:
[   20.201577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   20.209577] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.217236] flags: 0x200000000000040(head|node=0|zone=2)
[   20.222549] page_type: f5(slab)
[   20.225715] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   20.233461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.241201] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   20.249033] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.256860] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   20.264717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.272555] page dumped because: kasan: bad access detected
[   20.278126] 
[   20.279626] Memory state around the buggy address:
[   20.284419]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.291646]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.298865] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.306084]                                                           ^
[   20.312700]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.319942]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.327160] ==================================================================
[   18.645988] ==================================================================
[   18.653218] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   18.660881] Write of size 1 at addr ffff888100350ed0 by task kunit_try_catch/201
[   18.668279] 
[   18.669781] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.669789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.669791] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.669794] Call Trace:
[   18.669796]  <TASK>
[   18.669797]  dump_stack_lvl+0x73/0xb0
[   18.669801]  print_report+0xd1/0x650
[   18.669805]  ? __virt_addr_valid+0x1db/0x2d0
[   18.669809]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.669813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.669817]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.669822]  kasan_report+0x141/0x180
[   18.669826]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.669832]  __asan_report_store1_noabort+0x1b/0x30
[   18.669835]  krealloc_less_oob_helper+0xe23/0x11d0
[   18.669840]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.669845]  ? finish_task_switch.isra.0+0x153/0x700
[   18.669850]  ? __switch_to+0x5d9/0xf60
[   18.669853]  ? dequeue_task_fair+0x166/0x4e0
[   18.669858]  ? __schedule+0x10cc/0x2b30
[   18.669863]  krealloc_less_oob+0x1c/0x30
[   18.669867]  kunit_try_run_case+0x1a2/0x480
[   18.669871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.669875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.669879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.669884]  ? __kthread_parkme+0x82/0x180
[   18.669888]  ? preempt_count_sub+0x50/0x80
[   18.669892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.669896]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.669900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.669904]  kthread+0x334/0x6f0
[   18.669908]  ? trace_preempt_on+0x20/0xc0
[   18.669912]  ? __pfx_kthread+0x10/0x10
[   18.669916]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.669920]  ? calculate_sigpending+0x7b/0xa0
[   18.669924]  ? __pfx_kthread+0x10/0x10
[   18.669928]  ret_from_fork+0x3e/0x80
[   18.669932]  ? __pfx_kthread+0x10/0x10
[   18.669936]  ret_from_fork_asm+0x1a/0x30
[   18.669942]  </TASK>
[   18.669944] 
[   18.849190] Allocated by task 201:
[   18.852595]  kasan_save_stack+0x45/0x70
[   18.856434]  kasan_save_track+0x18/0x40
[   18.860274]  kasan_save_alloc_info+0x3b/0x50
[   18.864555]  __kasan_krealloc+0x190/0x1f0
[   18.868566]  krealloc_noprof+0xf3/0x340
[   18.872404]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.877198]  krealloc_less_oob+0x1c/0x30
[   18.881123]  kunit_try_run_case+0x1a2/0x480
[   18.885309]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.890722]  kthread+0x334/0x6f0
[   18.893967]  ret_from_fork+0x3e/0x80
[   18.897545]  ret_from_fork_asm+0x1a/0x30
[   18.901473] 
[   18.902970] The buggy address belongs to the object at ffff888100350e00
[   18.902970]  which belongs to the cache kmalloc-256 of size 256
[   18.915478] The buggy address is located 7 bytes to the right of
[   18.915478]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   18.928432] 
[   18.929932] The buggy address belongs to the physical page:
[   18.935506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   18.943512] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.951165] flags: 0x200000000000040(head|node=0|zone=2)
[   18.956477] page_type: f5(slab)
[   18.959622] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.967363] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.975110] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.982935] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.990763] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   18.998595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.006422] page dumped because: kasan: bad access detected
[   19.011993] 
[   19.013493] Memory state around the buggy address:
[   19.018284]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.025503]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.032731] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.039950]                                                  ^
[   19.045784]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.053011]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.060230] ==================================================================
[   21.036104] ==================================================================
[   21.047720] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   21.055385] Write of size 1 at addr ffff888106ce20c9 by task kunit_try_catch/205
[   21.062778] 
[   21.064278] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.064287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.064289] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.064292] Call Trace:
[   21.064294]  <TASK>
[   21.064296]  dump_stack_lvl+0x73/0xb0
[   21.064300]  print_report+0xd1/0x650
[   21.064304]  ? __virt_addr_valid+0x1db/0x2d0
[   21.064308]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.064312]  ? kasan_addr_to_slab+0x11/0xa0
[   21.064316]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.064320]  kasan_report+0x141/0x180
[   21.064325]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.064330]  __asan_report_store1_noabort+0x1b/0x30
[   21.064334]  krealloc_less_oob_helper+0xd70/0x11d0
[   21.064339]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.064343]  ? finish_task_switch.isra.0+0x153/0x700
[   21.064348]  ? __switch_to+0x5d9/0xf60
[   21.064351]  ? dequeue_task_fair+0x166/0x4e0
[   21.064356]  ? __schedule+0x10cc/0x2b30
[   21.064361]  krealloc_large_less_oob+0x1c/0x30
[   21.064365]  kunit_try_run_case+0x1a2/0x480
[   21.064369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.064373]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.064378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.064383]  ? __kthread_parkme+0x82/0x180
[   21.064386]  ? preempt_count_sub+0x50/0x80
[   21.064391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.064395]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.064399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.064403]  kthread+0x334/0x6f0
[   21.064407]  ? trace_preempt_on+0x20/0xc0
[   21.064411]  ? __pfx_kthread+0x10/0x10
[   21.064416]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.064420]  ? calculate_sigpending+0x7b/0xa0
[   21.064423]  ? __pfx_kthread+0x10/0x10
[   21.064428]  ret_from_fork+0x3e/0x80
[   21.064432]  ? __pfx_kthread+0x10/0x10
[   21.064436]  ret_from_fork_asm+0x1a/0x30
[   21.064442]  </TASK>
[   21.064443] 
[   21.243070] The buggy address belongs to the physical page:
[   21.248646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   21.256651] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.264305] flags: 0x200000000000040(head|node=0|zone=2)
[   21.269625] page_type: f8(unknown)
[   21.273031] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.280771] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.288517] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.296342] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.304169] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   21.311995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.319827] page dumped because: kasan: bad access detected
[   21.325399] 
[   21.326901] Memory state around the buggy address:
[   21.331701]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.338947]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.346167] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.353392]                                               ^
[   21.358966]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.366185]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.373404] ==================================================================
[   22.061546] ==================================================================
[   22.068785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   22.076446] Write of size 1 at addr ffff888106ce20ea by task kunit_try_catch/205
[   22.083848] 
[   22.085347] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.085354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.085356] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.085359] Call Trace:
[   22.085361]  <TASK>
[   22.085362]  dump_stack_lvl+0x73/0xb0
[   22.085366]  print_report+0xd1/0x650
[   22.085370]  ? __virt_addr_valid+0x1db/0x2d0
[   22.085373]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.085378]  ? kasan_addr_to_slab+0x11/0xa0
[   22.085381]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.085386]  kasan_report+0x141/0x180
[   22.085390]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.085396]  __asan_report_store1_noabort+0x1b/0x30
[   22.085399]  krealloc_less_oob_helper+0xe90/0x11d0
[   22.085404]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.085409]  ? finish_task_switch.isra.0+0x153/0x700
[   22.085413]  ? __switch_to+0x5d9/0xf60
[   22.085417]  ? dequeue_task_fair+0x166/0x4e0
[   22.085421]  ? __schedule+0x10cc/0x2b30
[   22.085426]  krealloc_large_less_oob+0x1c/0x30
[   22.085430]  kunit_try_run_case+0x1a2/0x480
[   22.085434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.085438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.085443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.085447]  ? __kthread_parkme+0x82/0x180
[   22.085451]  ? preempt_count_sub+0x50/0x80
[   22.085456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.085460]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.085464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.085468]  kthread+0x334/0x6f0
[   22.085472]  ? trace_preempt_on+0x20/0xc0
[   22.085476]  ? __pfx_kthread+0x10/0x10
[   22.085480]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.085484]  ? calculate_sigpending+0x7b/0xa0
[   22.085488]  ? __pfx_kthread+0x10/0x10
[   22.085492]  ret_from_fork+0x3e/0x80
[   22.085496]  ? __pfx_kthread+0x10/0x10
[   22.085500]  ret_from_fork_asm+0x1a/0x30
[   22.085506]  </TASK>
[   22.085507] 
[   22.264068] The buggy address belongs to the physical page:
[   22.269642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   22.277642] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.285295] flags: 0x200000000000040(head|node=0|zone=2)
[   22.290613] page_type: f8(unknown)
[   22.294021] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.301759] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.309498] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.317327] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.325151] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   22.332986] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.340817] page dumped because: kasan: bad access detected
[   22.346392] 
[   22.347891] Memory state around the buggy address:
[   22.352714]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.359947]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.367165] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.374383]                                                           ^
[   22.380994]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.388213]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.395433] ==================================================================
[   22.402660] ==================================================================
[   22.409940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   22.417592] Write of size 1 at addr ffff888106ce20eb by task kunit_try_catch/205
[   22.424985] 
[   22.426487] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.426494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.426496] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.426499] Call Trace:
[   22.426501]  <TASK>
[   22.426502]  dump_stack_lvl+0x73/0xb0
[   22.426506]  print_report+0xd1/0x650
[   22.426510]  ? __virt_addr_valid+0x1db/0x2d0
[   22.426513]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.426518]  ? kasan_addr_to_slab+0x11/0xa0
[   22.426521]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.426526]  kasan_report+0x141/0x180
[   22.426530]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.426536]  __asan_report_store1_noabort+0x1b/0x30
[   22.426539]  krealloc_less_oob_helper+0xd47/0x11d0
[   22.426544]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.426549]  ? finish_task_switch.isra.0+0x153/0x700
[   22.426553]  ? __switch_to+0x5d9/0xf60
[   22.426557]  ? dequeue_task_fair+0x166/0x4e0
[   22.426561]  ? __schedule+0x10cc/0x2b30
[   22.426566]  krealloc_large_less_oob+0x1c/0x30
[   22.426570]  kunit_try_run_case+0x1a2/0x480
[   22.426575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.426579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.426583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.426587]  ? __kthread_parkme+0x82/0x180
[   22.426591]  ? preempt_count_sub+0x50/0x80
[   22.426596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.426600]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.426604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.426608]  kthread+0x334/0x6f0
[   22.426612]  ? trace_preempt_on+0x20/0xc0
[   22.426616]  ? __pfx_kthread+0x10/0x10
[   22.426620]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.426624]  ? calculate_sigpending+0x7b/0xa0
[   22.426628]  ? __pfx_kthread+0x10/0x10
[   22.426632]  ret_from_fork+0x3e/0x80
[   22.426636]  ? __pfx_kthread+0x10/0x10
[   22.426640]  ret_from_fork_asm+0x1a/0x30
[   22.426645]  </TASK>
[   22.426647] 
[   22.605287] The buggy address belongs to the physical page:
[   22.610860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   22.618868] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.626521] flags: 0x200000000000040(head|node=0|zone=2)
[   22.631831] page_type: f8(unknown)
[   22.635238] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.642979] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.650732] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.658559] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.666384] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   22.674210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.682036] page dumped because: kasan: bad access detected
[   22.687607] 
[   22.689107] Memory state around the buggy address:
[   22.693898]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.701120]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.708346] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.715565]                                                           ^
[   22.722179]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.729404]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.736625] ==================================================================
[   21.380660] ==================================================================
[   21.387885] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   21.395546] Write of size 1 at addr ffff888106ce20d0 by task kunit_try_catch/205
[   21.402946] 
[   21.404446] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.404454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.404456] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.404459] Call Trace:
[   21.404460]  <TASK>
[   21.404462]  dump_stack_lvl+0x73/0xb0
[   21.404466]  print_report+0xd1/0x650
[   21.404470]  ? __virt_addr_valid+0x1db/0x2d0
[   21.404474]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.404478]  ? kasan_addr_to_slab+0x11/0xa0
[   21.404482]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.404486]  kasan_report+0x141/0x180
[   21.404490]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.404496]  __asan_report_store1_noabort+0x1b/0x30
[   21.404500]  krealloc_less_oob_helper+0xe23/0x11d0
[   21.404504]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.404509]  ? finish_task_switch.isra.0+0x153/0x700
[   21.404513]  ? __switch_to+0x5d9/0xf60
[   21.404517]  ? dequeue_task_fair+0x166/0x4e0
[   21.404521]  ? __schedule+0x10cc/0x2b30
[   21.404526]  krealloc_large_less_oob+0x1c/0x30
[   21.404531]  kunit_try_run_case+0x1a2/0x480
[   21.404535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.404539]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.404543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.404548]  ? __kthread_parkme+0x82/0x180
[   21.404552]  ? preempt_count_sub+0x50/0x80
[   21.404556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.404560]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.404564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.404568]  kthread+0x334/0x6f0
[   21.404572]  ? trace_preempt_on+0x20/0xc0
[   21.404576]  ? __pfx_kthread+0x10/0x10
[   21.404581]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.404585]  ? calculate_sigpending+0x7b/0xa0
[   21.404588]  ? __pfx_kthread+0x10/0x10
[   21.404593]  ret_from_fork+0x3e/0x80
[   21.404597]  ? __pfx_kthread+0x10/0x10
[   21.404601]  ret_from_fork_asm+0x1a/0x30
[   21.404606]  </TASK>
[   21.404608] 
[   21.583197] The buggy address belongs to the physical page:
[   21.588767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   21.596766] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.604419] flags: 0x200000000000040(head|node=0|zone=2)
[   21.609732] page_type: f8(unknown)
[   21.613138] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.620878] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.628617] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.636442] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.644268] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   21.652093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.659918] page dumped because: kasan: bad access detected
[   21.665492] 
[   21.666989] Memory state around the buggy address:
[   21.671784]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.679003]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.686222] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.693439]                                                  ^
[   21.699272]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.706491]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.713712] ==================================================================
[   21.720982] ==================================================================
[   21.728208] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   21.735860] Write of size 1 at addr ffff888106ce20da by task kunit_try_catch/205
[   21.743253] 
[   21.744753] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.744761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.744763] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.744766] Call Trace:
[   21.744768]  <TASK>
[   21.744769]  dump_stack_lvl+0x73/0xb0
[   21.744773]  print_report+0xd1/0x650
[   21.744777]  ? __virt_addr_valid+0x1db/0x2d0
[   21.744780]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.744785]  ? kasan_addr_to_slab+0x11/0xa0
[   21.744789]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.744793]  kasan_report+0x141/0x180
[   21.744797]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.744803]  __asan_report_store1_noabort+0x1b/0x30
[   21.744807]  krealloc_less_oob_helper+0xec6/0x11d0
[   21.744811]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.744816]  ? finish_task_switch.isra.0+0x153/0x700
[   21.744820]  ? __switch_to+0x5d9/0xf60
[   21.744824]  ? dequeue_task_fair+0x166/0x4e0
[   21.744828]  ? __schedule+0x10cc/0x2b30
[   21.744833]  krealloc_large_less_oob+0x1c/0x30
[   21.744838]  kunit_try_run_case+0x1a2/0x480
[   21.744842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.744846]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.744850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.744855]  ? __kthread_parkme+0x82/0x180
[   21.744859]  ? preempt_count_sub+0x50/0x80
[   21.744863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.744868]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.744871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.744875]  kthread+0x334/0x6f0
[   21.744879]  ? trace_preempt_on+0x20/0xc0
[   21.744884]  ? __pfx_kthread+0x10/0x10
[   21.744888]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.744892]  ? calculate_sigpending+0x7b/0xa0
[   21.744896]  ? __pfx_kthread+0x10/0x10
[   21.744900]  ret_from_fork+0x3e/0x80
[   21.744904]  ? __pfx_kthread+0x10/0x10
[   21.744908]  ret_from_fork_asm+0x1a/0x30
[   21.744913]  </TASK>
[   21.744915] 
[   21.923469] The buggy address belongs to the physical page:
[   21.929041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   21.937047] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.944704] flags: 0x200000000000040(head|node=0|zone=2)
[   21.950040] page_type: f8(unknown)
[   21.953446] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.961184] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.968925] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.976759] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.984591] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   21.992419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.000250] page dumped because: kasan: bad access detected
[   22.005823] 
[   22.007323] Memory state around the buggy address:
[   22.012118]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.019345]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.026572] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.033791]                                                     ^
[   22.039882]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.047100]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.054322] ==================================================================
[   19.067495] ==================================================================
[   19.074745] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   19.082407] Write of size 1 at addr ffff888100350eda by task kunit_try_catch/201
[   19.089808] 
[   19.091309] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   19.091316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.091318] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.091321] Call Trace:
[   19.091323]  <TASK>
[   19.091325]  dump_stack_lvl+0x73/0xb0
[   19.091328]  print_report+0xd1/0x650
[   19.091332]  ? __virt_addr_valid+0x1db/0x2d0
[   19.091336]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.091340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.091344]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.091349]  kasan_report+0x141/0x180
[   19.091353]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.091358]  __asan_report_store1_noabort+0x1b/0x30
[   19.091362]  krealloc_less_oob_helper+0xec6/0x11d0
[   19.091367]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.091372]  ? finish_task_switch.isra.0+0x153/0x700
[   19.091376]  ? __switch_to+0x5d9/0xf60
[   19.091380]  ? dequeue_task_fair+0x166/0x4e0
[   19.091384]  ? __schedule+0x10cc/0x2b30
[   19.091389]  krealloc_less_oob+0x1c/0x30
[   19.091393]  kunit_try_run_case+0x1a2/0x480
[   19.091397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.091401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.091406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.091410]  ? __kthread_parkme+0x82/0x180
[   19.091414]  ? preempt_count_sub+0x50/0x80
[   19.091418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.091423]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.091426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.091430]  kthread+0x334/0x6f0
[   19.091434]  ? trace_preempt_on+0x20/0xc0
[   19.091439]  ? __pfx_kthread+0x10/0x10
[   19.091443]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.091447]  ? calculate_sigpending+0x7b/0xa0
[   19.091450]  ? __pfx_kthread+0x10/0x10
[   19.091455]  ret_from_fork+0x3e/0x80
[   19.091459]  ? __pfx_kthread+0x10/0x10
[   19.091463]  ret_from_fork_asm+0x1a/0x30
[   19.091468]  </TASK>
[   19.091470] 
[   19.270750] Allocated by task 201:
[   19.274156]  kasan_save_stack+0x45/0x70
[   19.277995]  kasan_save_track+0x18/0x40
[   19.281835]  kasan_save_alloc_info+0x3b/0x50
[   19.286106]  __kasan_krealloc+0x190/0x1f0
[   19.290120]  krealloc_noprof+0xf3/0x340
[   19.293959]  krealloc_less_oob_helper+0x1aa/0x11d0
[   19.298761]  krealloc_less_oob+0x1c/0x30
[   19.302715]  kunit_try_run_case+0x1a2/0x480
[   19.306914]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.312314]  kthread+0x334/0x6f0
[   19.315546]  ret_from_fork+0x3e/0x80
[   19.319126]  ret_from_fork_asm+0x1a/0x30
[   19.323053] 
[   19.324552] The buggy address belongs to the object at ffff888100350e00
[   19.324552]  which belongs to the cache kmalloc-256 of size 256
[   19.337065] The buggy address is located 17 bytes to the right of
[   19.337065]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   19.350100] 
[   19.351599] The buggy address belongs to the physical page:
[   19.357170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   19.365169] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.372821] flags: 0x200000000000040(head|node=0|zone=2)
[   19.378135] page_type: f5(slab)
[   19.381282] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.389029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.396768] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.404603] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.412437] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   19.420272] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.428105] page dumped because: kasan: bad access detected
[   19.433716] 
[   19.435218] Memory state around the buggy address:
[   19.440011]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.447232]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.454459] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.461701]                                                     ^
[   19.467822]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.475041]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.482261] ==================================================================