Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   17.607441] ==================================================================
[   17.607633] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.607733] Write of size 1 at addr fff00000c79d60da by task kunit_try_catch/164
[   17.608262] 
[   17.608344] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.608610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.608679] Hardware name: linux,dummy-virt (DT)
[   17.608830] Call trace:
[   17.608893]  show_stack+0x20/0x38 (C)
[   17.609366]  dump_stack_lvl+0x8c/0xd0
[   17.609657]  print_report+0x118/0x608
[   17.609868]  kasan_report+0xdc/0x128
[   17.609970]  __asan_report_store1_noabort+0x20/0x30
[   17.610285]  krealloc_less_oob_helper+0xa80/0xc50
[   17.610620]  krealloc_large_less_oob+0x20/0x38
[   17.610815]  kunit_try_run_case+0x170/0x3f0
[   17.611004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.611122]  kthread+0x328/0x630
[   17.611222]  ret_from_fork+0x10/0x20
[   17.611793] 
[   17.611870] The buggy address belongs to the physical page:
[   17.611953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d4
[   17.612162] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.612264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.612621] page_type: f8(unknown)
[   17.612869] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.613010] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.613403] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.613954] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.614204] head: 0bfffe0000000002 ffffc1ffc31e7501 00000000ffffffff 00000000ffffffff
[   17.614323] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.614432] page dumped because: kasan: bad access detected
[   17.614510] 
[   17.614560] Memory state around the buggy address:
[   17.614633]  fff00000c79d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.614730]  fff00000c79d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.614903] >fff00000c79d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.615024]                                                     ^
[   17.615108]  fff00000c79d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.615208]  fff00000c79d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.615919] ==================================================================
[   17.532312] ==================================================================
[   17.532417] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.532524] Write of size 1 at addr fff00000c47146eb by task kunit_try_catch/160
[   17.532682] 
[   17.532751] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.532920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.532988] Hardware name: linux,dummy-virt (DT)
[   17.533062] Call trace:
[   17.533109]  show_stack+0x20/0x38 (C)
[   17.533201]  dump_stack_lvl+0x8c/0xd0
[   17.533352]  print_report+0x118/0x608
[   17.533439]  kasan_report+0xdc/0x128
[   17.533553]  __asan_report_store1_noabort+0x20/0x30
[   17.533657]  krealloc_less_oob_helper+0xa58/0xc50
[   17.533762]  krealloc_less_oob+0x20/0x38
[   17.533851]  kunit_try_run_case+0x170/0x3f0
[   17.533951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.534060]  kthread+0x328/0x630
[   17.534148]  ret_from_fork+0x10/0x20
[   17.534767] 
[   17.534815] Allocated by task 160:
[   17.535000]  kasan_save_stack+0x3c/0x68
[   17.536598]  kasan_save_track+0x20/0x40
[   17.536725]  kasan_save_alloc_info+0x40/0x58
[   17.536993]  __kasan_krealloc+0x118/0x178
[   17.537080]  krealloc_noprof+0x128/0x360
[   17.537223]  krealloc_less_oob_helper+0x168/0xc50
[   17.537323]  krealloc_less_oob+0x20/0x38
[   17.537404]  kunit_try_run_case+0x170/0x3f0
[   17.537684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.538042]  kthread+0x328/0x630
[   17.538167]  ret_from_fork+0x10/0x20
[   17.538252] 
[   17.538297] The buggy address belongs to the object at fff00000c4714600
[   17.538297]  which belongs to the cache kmalloc-256 of size 256
[   17.538431] The buggy address is located 34 bytes to the right of
[   17.538431]  allocated 201-byte region [fff00000c4714600, fff00000c47146c9)
[   17.538586] 
[   17.538634] The buggy address belongs to the physical page:
[   17.539014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104714
[   17.539164] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.539484] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.539884] page_type: f5(slab)
[   17.540018] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.540309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.540438] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.540655] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.540922] head: 0bfffe0000000001 ffffc1ffc311c501 00000000ffffffff 00000000ffffffff
[   17.541038] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.541404] page dumped because: kasan: bad access detected
[   17.541664] 
[   17.541731] Memory state around the buggy address:
[   17.541819]  fff00000c4714580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.541924]  fff00000c4714600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.542023] >fff00000c4714680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.542111]                                                           ^
[   17.542200]  fff00000c4714700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543044]  fff00000c4714780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543171] ==================================================================
[   17.503231] ==================================================================
[   17.503787] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.504050] Write of size 1 at addr fff00000c47146d0 by task kunit_try_catch/160
[   17.504179] 
[   17.504322] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.504701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.504800] Hardware name: linux,dummy-virt (DT)
[   17.504867] Call trace:
[   17.505068]  show_stack+0x20/0x38 (C)
[   17.505283]  dump_stack_lvl+0x8c/0xd0
[   17.505402]  print_report+0x118/0x608
[   17.505514]  kasan_report+0xdc/0x128
[   17.505627]  __asan_report_store1_noabort+0x20/0x30
[   17.505745]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.505863]  krealloc_less_oob+0x20/0x38
[   17.505971]  kunit_try_run_case+0x170/0x3f0
[   17.506080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.506203]  kthread+0x328/0x630
[   17.506310]  ret_from_fork+0x10/0x20
[   17.506439] 
[   17.506491] Allocated by task 160:
[   17.506577]  kasan_save_stack+0x3c/0x68
[   17.506684]  kasan_save_track+0x20/0x40
[   17.506774]  kasan_save_alloc_info+0x40/0x58
[   17.506861]  __kasan_krealloc+0x118/0x178
[   17.506939]  krealloc_noprof+0x128/0x360
[   17.507039]  krealloc_less_oob_helper+0x168/0xc50
[   17.507143]  krealloc_less_oob+0x20/0x38
[   17.507230]  kunit_try_run_case+0x170/0x3f0
[   17.507349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.507440]  kthread+0x328/0x630
[   17.507521]  ret_from_fork+0x10/0x20
[   17.507613] 
[   17.507658] The buggy address belongs to the object at fff00000c4714600
[   17.507658]  which belongs to the cache kmalloc-256 of size 256
[   17.508227] The buggy address is located 7 bytes to the right of
[   17.508227]  allocated 201-byte region [fff00000c4714600, fff00000c47146c9)
[   17.508357] 
[   17.508398] The buggy address belongs to the physical page:
[   17.508461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104714
[   17.508818] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.508959] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.509081] page_type: f5(slab)
[   17.509182] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.509347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.509511] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.509670] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.509785] head: 0bfffe0000000001 ffffc1ffc311c501 00000000ffffffff 00000000ffffffff
[   17.509896] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.509988] page dumped because: kasan: bad access detected
[   17.510056] 
[   17.510098] Memory state around the buggy address:
[   17.510169]  fff00000c4714580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.510270]  fff00000c4714600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.510378] >fff00000c4714680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.510515]                                                  ^
[   17.510954]  fff00000c4714700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.511164]  fff00000c4714780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.511255] ==================================================================
[   17.632258] ==================================================================
[   17.632820] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.633059] Write of size 1 at addr fff00000c79d60eb by task kunit_try_catch/164
[   17.633597] 
[   17.633671] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.633844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.633902] Hardware name: linux,dummy-virt (DT)
[   17.633968] Call trace:
[   17.634042]  show_stack+0x20/0x38 (C)
[   17.634168]  dump_stack_lvl+0x8c/0xd0
[   17.634274]  print_report+0x118/0x608
[   17.634377]  kasan_report+0xdc/0x128
[   17.634477]  __asan_report_store1_noabort+0x20/0x30
[   17.634957]  krealloc_less_oob_helper+0xa58/0xc50
[   17.635220]  krealloc_large_less_oob+0x20/0x38
[   17.635346]  kunit_try_run_case+0x170/0x3f0
[   17.635454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.635579]  kthread+0x328/0x630
[   17.635673]  ret_from_fork+0x10/0x20
[   17.635770] 
[   17.635810] The buggy address belongs to the physical page:
[   17.635869] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d4
[   17.636207] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.636347] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.636517] page_type: f8(unknown)
[   17.636633] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.636811] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.636941] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.637048] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.637139] head: 0bfffe0000000002 ffffc1ffc31e7501 00000000ffffffff 00000000ffffffff
[   17.637251] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.637341] page dumped because: kasan: bad access detected
[   17.637407] 
[   17.637443] Memory state around the buggy address:
[   17.637519]  fff00000c79d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.637631]  fff00000c79d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.637700] >fff00000c79d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.637739]                                                           ^
[   17.637779]  fff00000c79d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.637837]  fff00000c79d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.637910] ==================================================================
[   17.596373] ==================================================================
[   17.596470] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.597362] Write of size 1 at addr fff00000c79d60d0 by task kunit_try_catch/164
[   17.597575] 
[   17.597840] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.598217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.598289] Hardware name: linux,dummy-virt (DT)
[   17.598361] Call trace:
[   17.598408]  show_stack+0x20/0x38 (C)
[   17.598522]  dump_stack_lvl+0x8c/0xd0
[   17.598641]  print_report+0x118/0x608
[   17.599186]  kasan_report+0xdc/0x128
[   17.599654]  __asan_report_store1_noabort+0x20/0x30
[   17.599957]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.600148]  krealloc_large_less_oob+0x20/0x38
[   17.600253]  kunit_try_run_case+0x170/0x3f0
[   17.600349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.600446]  kthread+0x328/0x630
[   17.600548]  ret_from_fork+0x10/0x20
[   17.601295] 
[   17.601433] The buggy address belongs to the physical page:
[   17.601729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d4
[   17.601856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.602071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.602199] page_type: f8(unknown)
[   17.602503] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.602670] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.603100] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.603330] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.603463] head: 0bfffe0000000002 ffffc1ffc31e7501 00000000ffffffff 00000000ffffffff
[   17.603656] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.603931] page dumped because: kasan: bad access detected
[   17.604003] 
[   17.604041] Memory state around the buggy address:
[   17.604400]  fff00000c79d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.604569]  fff00000c79d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.604748] >fff00000c79d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.604956]                                                  ^
[   17.605038]  fff00000c79d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.605343]  fff00000c79d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.605540] ==================================================================
[   17.582686] ==================================================================
[   17.582803] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.582912] Write of size 1 at addr fff00000c79d60c9 by task kunit_try_catch/164
[   17.583063] 
[   17.583159] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.583458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.583523] Hardware name: linux,dummy-virt (DT)
[   17.583874] Call trace:
[   17.584170]  show_stack+0x20/0x38 (C)
[   17.584292]  dump_stack_lvl+0x8c/0xd0
[   17.584427]  print_report+0x118/0x608
[   17.584766]  kasan_report+0xdc/0x128
[   17.585033]  __asan_report_store1_noabort+0x20/0x30
[   17.585324]  krealloc_less_oob_helper+0xa48/0xc50
[   17.585497]  krealloc_large_less_oob+0x20/0x38
[   17.586006]  kunit_try_run_case+0x170/0x3f0
[   17.586306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.586662]  kthread+0x328/0x630
[   17.586891]  ret_from_fork+0x10/0x20
[   17.586997] 
[   17.587363] The buggy address belongs to the physical page:
[   17.587459] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d4
[   17.587615] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.587718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.588183] page_type: f8(unknown)
[   17.588352] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.588470] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.588819] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.589228] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.589357] head: 0bfffe0000000002 ffffc1ffc31e7501 00000000ffffffff 00000000ffffffff
[   17.589829] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.590033] page dumped because: kasan: bad access detected
[   17.590371] 
[   17.590421] Memory state around the buggy address:
[   17.590492]  fff00000c79d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.590967]  fff00000c79d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.591334] >fff00000c79d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.591444]                                               ^
[   17.591528]  fff00000c79d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.591644]  fff00000c79d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.591741] ==================================================================
[   17.617832] ==================================================================
[   17.618324] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.618441] Write of size 1 at addr fff00000c79d60ea by task kunit_try_catch/164
[   17.618573] 
[   17.618640] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.618812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.618874] Hardware name: linux,dummy-virt (DT)
[   17.619249] Call trace:
[   17.619395]  show_stack+0x20/0x38 (C)
[   17.619522]  dump_stack_lvl+0x8c/0xd0
[   17.620131]  print_report+0x118/0x608
[   17.620374]  kasan_report+0xdc/0x128
[   17.620488]  __asan_report_store1_noabort+0x20/0x30
[   17.620739]  krealloc_less_oob_helper+0xae4/0xc50
[   17.621193]  krealloc_large_less_oob+0x20/0x38
[   17.622073]  kunit_try_run_case+0x170/0x3f0
[   17.622260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.622873]  kthread+0x328/0x630
[   17.622991]  ret_from_fork+0x10/0x20
[   17.623112] 
[   17.623166] The buggy address belongs to the physical page:
[   17.623238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d4
[   17.623353] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.623784] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.623915] page_type: f8(unknown)
[   17.624605] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.624998] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.625153] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.625263] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.625866] head: 0bfffe0000000002 ffffc1ffc31e7501 00000000ffffffff 00000000ffffffff
[   17.626158] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.626278] page dumped because: kasan: bad access detected
[   17.626390] 
[   17.626437] Memory state around the buggy address:
[   17.626752]  fff00000c79d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.627013]  fff00000c79d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.627159] >fff00000c79d6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.627239]                                                           ^
[   17.627502]  fff00000c79d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.627754]  fff00000c79d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.628179] ==================================================================
[   17.486757] ==================================================================
[   17.486888] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.487009] Write of size 1 at addr fff00000c47146c9 by task kunit_try_catch/160
[   17.487120] 
[   17.487201] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.487400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.487457] Hardware name: linux,dummy-virt (DT)
[   17.487653] Call trace:
[   17.487716]  show_stack+0x20/0x38 (C)
[   17.487829]  dump_stack_lvl+0x8c/0xd0
[   17.487945]  print_report+0x118/0x608
[   17.488256]  kasan_report+0xdc/0x128
[   17.488363]  __asan_report_store1_noabort+0x20/0x30
[   17.488472]  krealloc_less_oob_helper+0xa48/0xc50
[   17.488598]  krealloc_less_oob+0x20/0x38
[   17.488696]  kunit_try_run_case+0x170/0x3f0
[   17.488857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.489097]  kthread+0x328/0x630
[   17.489256]  ret_from_fork+0x10/0x20
[   17.489438] 
[   17.489519] Allocated by task 160:
[   17.489593]  kasan_save_stack+0x3c/0x68
[   17.489683]  kasan_save_track+0x20/0x40
[   17.489757]  kasan_save_alloc_info+0x40/0x58
[   17.489840]  __kasan_krealloc+0x118/0x178
[   17.489921]  krealloc_noprof+0x128/0x360
[   17.490009]  krealloc_less_oob_helper+0x168/0xc50
[   17.490094]  krealloc_less_oob+0x20/0x38
[   17.490276]  kunit_try_run_case+0x170/0x3f0
[   17.490360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.490452]  kthread+0x328/0x630
[   17.490523]  ret_from_fork+0x10/0x20
[   17.490611] 
[   17.490652] The buggy address belongs to the object at fff00000c4714600
[   17.490652]  which belongs to the cache kmalloc-256 of size 256
[   17.490852] The buggy address is located 0 bytes to the right of
[   17.490852]  allocated 201-byte region [fff00000c4714600, fff00000c47146c9)
[   17.491079] 
[   17.491154] The buggy address belongs to the physical page:
[   17.491235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104714
[   17.491419] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.491702] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.492059] page_type: f5(slab)
[   17.492182] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.492401] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.492844] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.493131] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.493713] head: 0bfffe0000000001 ffffc1ffc311c501 00000000ffffffff 00000000ffffffff
[   17.493837] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.494364] page dumped because: kasan: bad access detected
[   17.494569] 
[   17.494608] Memory state around the buggy address:
[   17.495008]  fff00000c4714580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.495123]  fff00000c4714600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.495740] >fff00000c4714680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.496055]                                               ^
[   17.496135]  fff00000c4714700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.496415]  fff00000c4714780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.496669] ==================================================================
[   17.521301] ==================================================================
[   17.521404] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.521544] Write of size 1 at addr fff00000c47146ea by task kunit_try_catch/160
[   17.521657] 
[   17.521721] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.521873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.521928] Hardware name: linux,dummy-virt (DT)
[   17.521991] Call trace:
[   17.522035]  show_stack+0x20/0x38 (C)
[   17.522135]  dump_stack_lvl+0x8c/0xd0
[   17.522228]  print_report+0x118/0x608
[   17.522323]  kasan_report+0xdc/0x128
[   17.522410]  __asan_report_store1_noabort+0x20/0x30
[   17.522509]  krealloc_less_oob_helper+0xae4/0xc50
[   17.522629]  krealloc_less_oob+0x20/0x38
[   17.522728]  kunit_try_run_case+0x170/0x3f0
[   17.522816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.522908]  kthread+0x328/0x630
[   17.522999]  ret_from_fork+0x10/0x20
[   17.523613] 
[   17.523664] Allocated by task 160:
[   17.523717]  kasan_save_stack+0x3c/0x68
[   17.523792]  kasan_save_track+0x20/0x40
[   17.523850]  kasan_save_alloc_info+0x40/0x58
[   17.523912]  __kasan_krealloc+0x118/0x178
[   17.523973]  krealloc_noprof+0x128/0x360
[   17.524040]  krealloc_less_oob_helper+0x168/0xc50
[   17.524116]  krealloc_less_oob+0x20/0x38
[   17.524188]  kunit_try_run_case+0x170/0x3f0
[   17.524259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.524336]  kthread+0x328/0x630
[   17.524401]  ret_from_fork+0x10/0x20
[   17.524455] 
[   17.524486] The buggy address belongs to the object at fff00000c4714600
[   17.524486]  which belongs to the cache kmalloc-256 of size 256
[   17.524598] The buggy address is located 33 bytes to the right of
[   17.524598]  allocated 201-byte region [fff00000c4714600, fff00000c47146c9)
[   17.524743] 
[   17.524829] The buggy address belongs to the physical page:
[   17.524887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104714
[   17.525644] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.525773] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.525875] page_type: f5(slab)
[   17.525944] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.526300] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.526427] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.526769] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.527469] head: 0bfffe0000000001 ffffc1ffc311c501 00000000ffffffff 00000000ffffffff
[   17.527926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.528188] page dumped because: kasan: bad access detected
[   17.528388] 
[   17.528494] Memory state around the buggy address:
[   17.528645]  fff00000c4714580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.528742]  fff00000c4714600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.529172] >fff00000c4714680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.529412]                                                           ^
[   17.529885]  fff00000c4714700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.530009]  fff00000c4714780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.530719] ==================================================================
[   17.513058] ==================================================================
[   17.513170] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.513279] Write of size 1 at addr fff00000c47146da by task kunit_try_catch/160
[   17.513396] 
[   17.513480] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   17.514007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.514547] Hardware name: linux,dummy-virt (DT)
[   17.514716] Call trace:
[   17.514785]  show_stack+0x20/0x38 (C)
[   17.514962]  dump_stack_lvl+0x8c/0xd0
[   17.515289]  print_report+0x118/0x608
[   17.515478]  kasan_report+0xdc/0x128
[   17.515614]  __asan_report_store1_noabort+0x20/0x30
[   17.515910]  krealloc_less_oob_helper+0xa80/0xc50
[   17.516009]  krealloc_less_oob+0x20/0x38
[   17.516091]  kunit_try_run_case+0x170/0x3f0
[   17.516188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.516293]  kthread+0x328/0x630
[   17.516550]  ret_from_fork+0x10/0x20
[   17.516648] 
[   17.516685] Allocated by task 160:
[   17.516743]  kasan_save_stack+0x3c/0x68
[   17.516829]  kasan_save_track+0x20/0x40
[   17.516897]  kasan_save_alloc_info+0x40/0x58
[   17.516974]  __kasan_krealloc+0x118/0x178
[   17.517046]  krealloc_noprof+0x128/0x360
[   17.517161]  krealloc_less_oob_helper+0x168/0xc50
[   17.517241]  krealloc_less_oob+0x20/0x38
[   17.517304]  kunit_try_run_case+0x170/0x3f0
[   17.517380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.517456]  kthread+0x328/0x630
[   17.517549]  ret_from_fork+0x10/0x20
[   17.517625] 
[   17.517659] The buggy address belongs to the object at fff00000c4714600
[   17.517659]  which belongs to the cache kmalloc-256 of size 256
[   17.517766] The buggy address is located 17 bytes to the right of
[   17.517766]  allocated 201-byte region [fff00000c4714600, fff00000c47146c9)
[   17.518419] 
[   17.518488] The buggy address belongs to the physical page:
[   17.518572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104714
[   17.518663] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.518743] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.518836] page_type: f5(slab)
[   17.518907] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.519005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.519097] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.519191] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.519321] head: 0bfffe0000000001 ffffc1ffc311c501 00000000ffffffff 00000000ffffffff
[   17.519416] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.519491] page dumped because: kasan: bad access detected
[   17.519562] 
[   17.519597] Memory state around the buggy address:
[   17.519658]  fff00000c4714580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.519743]  fff00000c4714600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.519817] >fff00000c4714680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.519879]                                                     ^
[   17.519942]  fff00000c4714700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.520023]  fff00000c4714780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.520100] ==================================================================

[   17.625423] ==================================================================
[   17.626429] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   17.626973] Write of size 1 at addr ffff888103b8e0c9 by task kunit_try_catch/182
[   17.627467] 
[   17.627940] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.628058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.628094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.628152] Call Trace:
[   17.628191]  <TASK>
[   17.628238]  dump_stack_lvl+0x73/0xb0
[   17.628320]  print_report+0xd1/0x650
[   17.628394]  ? __virt_addr_valid+0x1db/0x2d0
[   17.628470]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.628599]  ? kasan_addr_to_slab+0x11/0xa0
[   17.628675]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.628887]  kasan_report+0x141/0x180
[   17.628970]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.629062]  __asan_report_store1_noabort+0x1b/0x30
[   17.629122]  krealloc_less_oob_helper+0xd70/0x11d0
[   17.629165]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.629202]  ? finish_task_switch.isra.0+0x153/0x700
[   17.629238]  ? __switch_to+0x5d9/0xf60
[   17.629268]  ? dequeue_task_fair+0x166/0x4e0
[   17.629304]  ? __schedule+0x10cc/0x2b30
[   17.629338]  ? __pfx_read_tsc+0x10/0x10
[   17.629372]  krealloc_large_less_oob+0x1c/0x30
[   17.629406]  kunit_try_run_case+0x1a5/0x480
[   17.629540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.629598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.629636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.629670]  ? __kthread_parkme+0x82/0x180
[   17.629701]  ? preempt_count_sub+0x50/0x80
[   17.629734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.629765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.629796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.629826]  kthread+0x337/0x6f0
[   17.629855]  ? trace_preempt_on+0x20/0xc0
[   17.629888]  ? __pfx_kthread+0x10/0x10
[   17.629918]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.629947]  ? calculate_sigpending+0x7b/0xa0
[   17.629976]  ? __pfx_kthread+0x10/0x10
[   17.630007]  ret_from_fork+0x41/0x80
[   17.630036]  ? __pfx_kthread+0x10/0x10
[   17.630066]  ret_from_fork_asm+0x1a/0x30
[   17.630108]  </TASK>
[   17.630124] 
[   17.648078] The buggy address belongs to the physical page:
[   17.648793] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b8c
[   17.649394] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.650331] flags: 0x200000000000040(head|node=0|zone=2)
[   17.651016] page_type: f8(unknown)
[   17.651432] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.652106] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.652959] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.653766] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.654466] head: 0200000000000002 ffffea00040ee301 00000000ffffffff 00000000ffffffff
[   17.655234] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.656054] page dumped because: kasan: bad access detected
[   17.656672] 
[   17.656908] Memory state around the buggy address:
[   17.657403]  ffff888103b8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.658193]  ffff888103b8e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.658936] >ffff888103b8e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.659746]                                               ^
[   17.660218]  ffff888103b8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.660967]  ffff888103b8e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.661609] ==================================================================
[   17.468866] ==================================================================
[   17.469416] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   17.470728] Write of size 1 at addr ffff888100aaeeeb by task kunit_try_catch/178
[   17.471277] 
[   17.471693] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.471819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.471857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.471911] Call Trace:
[   17.471963]  <TASK>
[   17.472012]  dump_stack_lvl+0x73/0xb0
[   17.472088]  print_report+0xd1/0x650
[   17.472158]  ? __virt_addr_valid+0x1db/0x2d0
[   17.472227]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.472299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.472369]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.472596]  kasan_report+0x141/0x180
[   17.472679]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.472767]  __asan_report_store1_noabort+0x1b/0x30
[   17.472841]  krealloc_less_oob_helper+0xd47/0x11d0
[   17.472928]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.473005]  ? finish_task_switch.isra.0+0x153/0x700
[   17.473073]  ? __switch_to+0x5d9/0xf60
[   17.473121]  ? dequeue_task_fair+0x166/0x4e0
[   17.473158]  ? __schedule+0x10cc/0x2b30
[   17.473192]  ? __pfx_read_tsc+0x10/0x10
[   17.473224]  krealloc_less_oob+0x1c/0x30
[   17.473255]  kunit_try_run_case+0x1a5/0x480
[   17.473287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.473316]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.473349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.473381]  ? __kthread_parkme+0x82/0x180
[   17.473410]  ? preempt_count_sub+0x50/0x80
[   17.473441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.473473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.473547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.473954]  kthread+0x337/0x6f0
[   17.473988]  ? trace_preempt_on+0x20/0xc0
[   17.474021]  ? __pfx_kthread+0x10/0x10
[   17.474051]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.474082]  ? calculate_sigpending+0x7b/0xa0
[   17.474111]  ? __pfx_kthread+0x10/0x10
[   17.474141]  ret_from_fork+0x41/0x80
[   17.474169]  ? __pfx_kthread+0x10/0x10
[   17.474198]  ret_from_fork_asm+0x1a/0x30
[   17.474239]  </TASK>
[   17.474252] 
[   17.495958] Allocated by task 178:
[   17.496262]  kasan_save_stack+0x45/0x70
[   17.497031]  kasan_save_track+0x18/0x40
[   17.497414]  kasan_save_alloc_info+0x3b/0x50
[   17.498512]  __kasan_krealloc+0x190/0x1f0
[   17.499234]  krealloc_noprof+0xf3/0x340
[   17.499878]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.500252]  krealloc_less_oob+0x1c/0x30
[   17.501196]  kunit_try_run_case+0x1a5/0x480
[   17.501484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.501985]  kthread+0x337/0x6f0
[   17.502666]  ret_from_fork+0x41/0x80
[   17.503985]  ret_from_fork_asm+0x1a/0x30
[   17.504329] 
[   17.504565] The buggy address belongs to the object at ffff888100aaee00
[   17.504565]  which belongs to the cache kmalloc-256 of size 256
[   17.506557] The buggy address is located 34 bytes to the right of
[   17.506557]  allocated 201-byte region [ffff888100aaee00, ffff888100aaeec9)
[   17.507404] 
[   17.508084] The buggy address belongs to the physical page:
[   17.508865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   17.509662] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.510235] flags: 0x200000000000040(head|node=0|zone=2)
[   17.510723] page_type: f5(slab)
[   17.511113] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.512731] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.513593] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.514390] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.515032] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   17.515709] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.516415] page dumped because: kasan: bad access detected
[   17.517206] 
[   17.517417] Memory state around the buggy address:
[   17.517925]  ffff888100aaed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.518547]  ffff888100aaee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.519334] >ffff888100aaee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.520047]                                                           ^
[   17.520570]  ffff888100aaef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.521861]  ffff888100aaef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.522333] ==================================================================
[   17.417954] ==================================================================
[   17.418743] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   17.419867] Write of size 1 at addr ffff888100aaeeea by task kunit_try_catch/178
[   17.420441] 
[   17.420752] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.420873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.420908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.420962] Call Trace:
[   17.421001]  <TASK>
[   17.421049]  dump_stack_lvl+0x73/0xb0
[   17.421129]  print_report+0xd1/0x650
[   17.421206]  ? __virt_addr_valid+0x1db/0x2d0
[   17.421275]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.421346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.421417]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.421494]  kasan_report+0x141/0x180
[   17.421596]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.421920]  __asan_report_store1_noabort+0x1b/0x30
[   17.421963]  krealloc_less_oob_helper+0xe90/0x11d0
[   17.422002]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.422037]  ? finish_task_switch.isra.0+0x153/0x700
[   17.422068]  ? __switch_to+0x5d9/0xf60
[   17.422094]  ? dequeue_task_fair+0x166/0x4e0
[   17.422127]  ? __schedule+0x10cc/0x2b30
[   17.422158]  ? __pfx_read_tsc+0x10/0x10
[   17.422189]  krealloc_less_oob+0x1c/0x30
[   17.422219]  kunit_try_run_case+0x1a5/0x480
[   17.422250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.422279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.422311]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.422342]  ? __kthread_parkme+0x82/0x180
[   17.422371]  ? preempt_count_sub+0x50/0x80
[   17.422403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.422444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.422585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.422625]  kthread+0x337/0x6f0
[   17.422657]  ? trace_preempt_on+0x20/0xc0
[   17.422690]  ? __pfx_kthread+0x10/0x10
[   17.422720]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.422751]  ? calculate_sigpending+0x7b/0xa0
[   17.422780]  ? __pfx_kthread+0x10/0x10
[   17.422810]  ret_from_fork+0x41/0x80
[   17.422839]  ? __pfx_kthread+0x10/0x10
[   17.422869]  ret_from_fork_asm+0x1a/0x30
[   17.422912]  </TASK>
[   17.422924] 
[   17.443348] Allocated by task 178:
[   17.443920]  kasan_save_stack+0x45/0x70
[   17.444398]  kasan_save_track+0x18/0x40
[   17.444964]  kasan_save_alloc_info+0x3b/0x50
[   17.445376]  __kasan_krealloc+0x190/0x1f0
[   17.446340]  krealloc_noprof+0xf3/0x340
[   17.446741]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.447316]  krealloc_less_oob+0x1c/0x30
[   17.447845]  kunit_try_run_case+0x1a5/0x480
[   17.448331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.449092]  kthread+0x337/0x6f0
[   17.449902]  ret_from_fork+0x41/0x80
[   17.450353]  ret_from_fork_asm+0x1a/0x30
[   17.450727] 
[   17.450968] The buggy address belongs to the object at ffff888100aaee00
[   17.450968]  which belongs to the cache kmalloc-256 of size 256
[   17.452019] The buggy address is located 33 bytes to the right of
[   17.452019]  allocated 201-byte region [ffff888100aaee00, ffff888100aaeec9)
[   17.453154] 
[   17.454520] The buggy address belongs to the physical page:
[   17.455067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   17.455689] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.456283] flags: 0x200000000000040(head|node=0|zone=2)
[   17.456870] page_type: f5(slab)
[   17.457240] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.458396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.459124] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.459860] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.460457] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   17.461218] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.462254] page dumped because: kasan: bad access detected
[   17.462708] 
[   17.463085] Memory state around the buggy address:
[   17.463656]  ffff888100aaed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.464217]  ffff888100aaee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.464985] >ffff888100aaee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.466098]                                                           ^
[   17.466633]  ffff888100aaef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.467175]  ffff888100aaef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.467749] ==================================================================
[   17.706241] ==================================================================
[   17.707425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   17.708813] Write of size 1 at addr ffff888103b8e0da by task kunit_try_catch/182
[   17.709325] 
[   17.710626] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.710711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.710734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.710764] Call Trace:
[   17.710790]  <TASK>
[   17.710824]  dump_stack_lvl+0x73/0xb0
[   17.710863]  print_report+0xd1/0x650
[   17.710915]  ? __virt_addr_valid+0x1db/0x2d0
[   17.710947]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.711000]  ? kasan_addr_to_slab+0x11/0xa0
[   17.711034]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.711087]  kasan_report+0x141/0x180
[   17.711122]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.711178]  __asan_report_store1_noabort+0x1b/0x30
[   17.711211]  krealloc_less_oob_helper+0xec6/0x11d0
[   17.711265]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.711305]  ? finish_task_switch.isra.0+0x153/0x700
[   17.711357]  ? __switch_to+0x5d9/0xf60
[   17.711387]  ? dequeue_task_fair+0x166/0x4e0
[   17.711439]  ? __schedule+0x10cc/0x2b30
[   17.711556]  ? __pfx_read_tsc+0x10/0x10
[   17.711609]  krealloc_large_less_oob+0x1c/0x30
[   17.711646]  kunit_try_run_case+0x1a5/0x480
[   17.711681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.711712]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.711745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.711777]  ? __kthread_parkme+0x82/0x180
[   17.711806]  ? preempt_count_sub+0x50/0x80
[   17.711838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.711869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.711899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.711929]  kthread+0x337/0x6f0
[   17.711957]  ? trace_preempt_on+0x20/0xc0
[   17.711989]  ? __pfx_kthread+0x10/0x10
[   17.712019]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.712050]  ? calculate_sigpending+0x7b/0xa0
[   17.712080]  ? __pfx_kthread+0x10/0x10
[   17.712111]  ret_from_fork+0x41/0x80
[   17.712139]  ? __pfx_kthread+0x10/0x10
[   17.712169]  ret_from_fork_asm+0x1a/0x30
[   17.712213]  </TASK>
[   17.712226] 
[   17.734724] The buggy address belongs to the physical page:
[   17.735954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b8c
[   17.737267] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.738015] flags: 0x200000000000040(head|node=0|zone=2)
[   17.738958] page_type: f8(unknown)
[   17.739301] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.740361] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.741354] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.742253] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.743735] head: 0200000000000002 ffffea00040ee301 00000000ffffffff 00000000ffffffff
[   17.744381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.745270] page dumped because: kasan: bad access detected
[   17.745922] 
[   17.746101] Memory state around the buggy address:
[   17.746752]  ffff888103b8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.747258]  ffff888103b8e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.748206] >ffff888103b8e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.748910]                                                     ^
[   17.750548]  ffff888103b8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.751109]  ffff888103b8e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.751723] ==================================================================
[   17.662864] ==================================================================
[   17.663318] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   17.664414] Write of size 1 at addr ffff888103b8e0d0 by task kunit_try_catch/182
[   17.665976] 
[   17.666291] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.666586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.666631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.666687] Call Trace:
[   17.666726]  <TASK>
[   17.666795]  dump_stack_lvl+0x73/0xb0
[   17.666907]  print_report+0xd1/0x650
[   17.666977]  ? __virt_addr_valid+0x1db/0x2d0
[   17.667010]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.667044]  ? kasan_addr_to_slab+0x11/0xa0
[   17.667073]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.667122]  kasan_report+0x141/0x180
[   17.667189]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.667234]  __asan_report_store1_noabort+0x1b/0x30
[   17.667263]  krealloc_less_oob_helper+0xe23/0x11d0
[   17.667301]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.667335]  ? finish_task_switch.isra.0+0x153/0x700
[   17.667367]  ? __switch_to+0x5d9/0xf60
[   17.667393]  ? dequeue_task_fair+0x166/0x4e0
[   17.667448]  ? __schedule+0x10cc/0x2b30
[   17.667574]  ? __pfx_read_tsc+0x10/0x10
[   17.667614]  krealloc_large_less_oob+0x1c/0x30
[   17.667650]  kunit_try_run_case+0x1a5/0x480
[   17.667686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.667716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.667750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.667784]  ? __kthread_parkme+0x82/0x180
[   17.667815]  ? preempt_count_sub+0x50/0x80
[   17.667847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.667880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.667911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.667943]  kthread+0x337/0x6f0
[   17.667972]  ? trace_preempt_on+0x20/0xc0
[   17.668006]  ? __pfx_kthread+0x10/0x10
[   17.668037]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.668068]  ? calculate_sigpending+0x7b/0xa0
[   17.668098]  ? __pfx_kthread+0x10/0x10
[   17.668130]  ret_from_fork+0x41/0x80
[   17.668160]  ? __pfx_kthread+0x10/0x10
[   17.668190]  ret_from_fork_asm+0x1a/0x30
[   17.668231]  </TASK>
[   17.668244] 
[   17.688408] The buggy address belongs to the physical page:
[   17.689883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b8c
[   17.690668] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.691268] flags: 0x200000000000040(head|node=0|zone=2)
[   17.692146] page_type: f8(unknown)
[   17.692831] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.693653] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.694397] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.695307] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.696407] head: 0200000000000002 ffffea00040ee301 00000000ffffffff 00000000ffffffff
[   17.697280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.698112] page dumped because: kasan: bad access detected
[   17.698571] 
[   17.699092] Memory state around the buggy address:
[   17.699440]  ffff888103b8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.700189]  ffff888103b8e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.701766] >ffff888103b8e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.702285]                                                  ^
[   17.703573]  ffff888103b8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.704156]  ffff888103b8e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.704986] ==================================================================
[   17.752073] ==================================================================
[   17.752316] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   17.753544] Write of size 1 at addr ffff888103b8e0ea by task kunit_try_catch/182
[   17.755200] 
[   17.755764] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.755944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.755982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.756038] Call Trace:
[   17.756109]  <TASK>
[   17.756189]  dump_stack_lvl+0x73/0xb0
[   17.756261]  print_report+0xd1/0x650
[   17.756297]  ? __virt_addr_valid+0x1db/0x2d0
[   17.756327]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.756362]  ? kasan_addr_to_slab+0x11/0xa0
[   17.756391]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.756427]  kasan_report+0x141/0x180
[   17.756529]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   17.756607]  __asan_report_store1_noabort+0x1b/0x30
[   17.756640]  krealloc_less_oob_helper+0xe90/0x11d0
[   17.756679]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.756714]  ? finish_task_switch.isra.0+0x153/0x700
[   17.756745]  ? __switch_to+0x5d9/0xf60
[   17.756771]  ? dequeue_task_fair+0x166/0x4e0
[   17.756807]  ? __schedule+0x10cc/0x2b30
[   17.756840]  ? __pfx_read_tsc+0x10/0x10
[   17.756872]  krealloc_large_less_oob+0x1c/0x30
[   17.756906]  kunit_try_run_case+0x1a5/0x480
[   17.756940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.756971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.757004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.757039]  ? __kthread_parkme+0x82/0x180
[   17.757071]  ? preempt_count_sub+0x50/0x80
[   17.757105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.757138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.757170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.757202]  kthread+0x337/0x6f0
[   17.757232]  ? trace_preempt_on+0x20/0xc0
[   17.757264]  ? __pfx_kthread+0x10/0x10
[   17.757295]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.757326]  ? calculate_sigpending+0x7b/0xa0
[   17.757357]  ? __pfx_kthread+0x10/0x10
[   17.757390]  ret_from_fork+0x41/0x80
[   17.757419]  ? __pfx_kthread+0x10/0x10
[   17.757548]  ret_from_fork_asm+0x1a/0x30
[   17.757628]  </TASK>
[   17.757643] 
[   17.779221] The buggy address belongs to the physical page:
[   17.780021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b8c
[   17.780878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.782384] flags: 0x200000000000040(head|node=0|zone=2)
[   17.782898] page_type: f8(unknown)
[   17.783712] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.784250] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.785033] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.786058] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.787307] head: 0200000000000002 ffffea00040ee301 00000000ffffffff 00000000ffffffff
[   17.788282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.789347] page dumped because: kasan: bad access detected
[   17.790085] 
[   17.790313] Memory state around the buggy address:
[   17.791128]  ffff888103b8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.791368]  ffff888103b8e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.792125] >ffff888103b8e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.793620]                                                           ^
[   17.794369]  ffff888103b8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.795767]  ffff888103b8e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.796038] ==================================================================
[   17.315827] ==================================================================
[   17.316366] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   17.317897] Write of size 1 at addr ffff888100aaeed0 by task kunit_try_catch/178
[   17.318299] 
[   17.318409] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.318541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.318578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.318630] Call Trace:
[   17.318667]  <TASK>
[   17.318710]  dump_stack_lvl+0x73/0xb0
[   17.318788]  print_report+0xd1/0x650
[   17.318862]  ? __virt_addr_valid+0x1db/0x2d0
[   17.318927]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.319004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.319078]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.319155]  kasan_report+0x141/0x180
[   17.319231]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   17.319332]  __asan_report_store1_noabort+0x1b/0x30
[   17.319406]  krealloc_less_oob_helper+0xe23/0x11d0
[   17.319514]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.319595]  ? finish_task_switch.isra.0+0x153/0x700
[   17.319665]  ? __switch_to+0x5d9/0xf60
[   17.319728]  ? dequeue_task_fair+0x166/0x4e0
[   17.319805]  ? __schedule+0x10cc/0x2b30
[   17.319878]  ? __pfx_read_tsc+0x10/0x10
[   17.319948]  krealloc_less_oob+0x1c/0x30
[   17.320020]  kunit_try_run_case+0x1a5/0x480
[   17.320097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.320168]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.320242]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.320317]  ? __kthread_parkme+0x82/0x180
[   17.320389]  ? preempt_count_sub+0x50/0x80
[   17.320466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.320618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.320695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.320768]  kthread+0x337/0x6f0
[   17.320840]  ? trace_preempt_on+0x20/0xc0
[   17.320963]  ? __pfx_kthread+0x10/0x10
[   17.321037]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.321105]  ? calculate_sigpending+0x7b/0xa0
[   17.321174]  ? __pfx_kthread+0x10/0x10
[   17.321242]  ret_from_fork+0x41/0x80
[   17.321308]  ? __pfx_kthread+0x10/0x10
[   17.321363]  ret_from_fork_asm+0x1a/0x30
[   17.321409]  </TASK>
[   17.321422] 
[   17.340298] Allocated by task 178:
[   17.340924]  kasan_save_stack+0x45/0x70
[   17.341400]  kasan_save_track+0x18/0x40
[   17.342271]  kasan_save_alloc_info+0x3b/0x50
[   17.342898]  __kasan_krealloc+0x190/0x1f0
[   17.343261]  krealloc_noprof+0xf3/0x340
[   17.343803]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.344340]  krealloc_less_oob+0x1c/0x30
[   17.344902]  kunit_try_run_case+0x1a5/0x480
[   17.345410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.346358]  kthread+0x337/0x6f0
[   17.346859]  ret_from_fork+0x41/0x80
[   17.347214]  ret_from_fork_asm+0x1a/0x30
[   17.347853] 
[   17.348128] The buggy address belongs to the object at ffff888100aaee00
[   17.348128]  which belongs to the cache kmalloc-256 of size 256
[   17.349192] The buggy address is located 7 bytes to the right of
[   17.349192]  allocated 201-byte region [ffff888100aaee00, ffff888100aaeec9)
[   17.350697] 
[   17.350936] The buggy address belongs to the physical page:
[   17.351595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   17.352207] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.352904] flags: 0x200000000000040(head|node=0|zone=2)
[   17.354006] page_type: f5(slab)
[   17.354374] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.355003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.355718] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.356598] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.357220] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   17.358246] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.358945] page dumped because: kasan: bad access detected
[   17.359567] 
[   17.359802] Memory state around the buggy address:
[   17.360307]  ffff888100aaed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.361046]  ffff888100aaee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.362073] >ffff888100aaee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.362612]                                                  ^
[   17.363295]  ffff888100aaef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.364085]  ffff888100aaef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.364736] ==================================================================
[   17.796401] ==================================================================
[   17.797953] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   17.799191] Write of size 1 at addr ffff888103b8e0eb by task kunit_try_catch/182
[   17.800212] 
[   17.800399] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.800684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.800724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.800781] Call Trace:
[   17.800870]  <TASK>
[   17.800926]  dump_stack_lvl+0x73/0xb0
[   17.801005]  print_report+0xd1/0x650
[   17.801078]  ? __virt_addr_valid+0x1db/0x2d0
[   17.801149]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.801224]  ? kasan_addr_to_slab+0x11/0xa0
[   17.801333]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.801418]  kasan_report+0x141/0x180
[   17.801531]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   17.801638]  __asan_report_store1_noabort+0x1b/0x30
[   17.801705]  krealloc_less_oob_helper+0xd47/0x11d0
[   17.801792]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.801871]  ? finish_task_switch.isra.0+0x153/0x700
[   17.801941]  ? __switch_to+0x5d9/0xf60
[   17.802011]  ? dequeue_task_fair+0x166/0x4e0
[   17.802095]  ? __schedule+0x10cc/0x2b30
[   17.802169]  ? __pfx_read_tsc+0x10/0x10
[   17.802242]  krealloc_large_less_oob+0x1c/0x30
[   17.802315]  kunit_try_run_case+0x1a5/0x480
[   17.802456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.802545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.802616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.802684]  ? __kthread_parkme+0x82/0x180
[   17.802747]  ? preempt_count_sub+0x50/0x80
[   17.802813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.802876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.802942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.803002]  kthread+0x337/0x6f0
[   17.803035]  ? trace_preempt_on+0x20/0xc0
[   17.803069]  ? __pfx_kthread+0x10/0x10
[   17.803100]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.803132]  ? calculate_sigpending+0x7b/0xa0
[   17.803161]  ? __pfx_kthread+0x10/0x10
[   17.803193]  ret_from_fork+0x41/0x80
[   17.803223]  ? __pfx_kthread+0x10/0x10
[   17.803254]  ret_from_fork_asm+0x1a/0x30
[   17.803297]  </TASK>
[   17.803311] 
[   17.823153] The buggy address belongs to the physical page:
[   17.826576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b8c
[   17.828172] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.829221] flags: 0x200000000000040(head|node=0|zone=2)
[   17.830091] page_type: f8(unknown)
[   17.830356] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.831413] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.832404] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.834084] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.835017] head: 0200000000000002 ffffea00040ee301 00000000ffffffff 00000000ffffffff
[   17.836726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.837266] page dumped because: kasan: bad access detected
[   17.837682] 
[   17.837998] Memory state around the buggy address:
[   17.838445]  ffff888103b8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.839341]  ffff888103b8e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.840276] >ffff888103b8e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.840946]                                                           ^
[   17.842371]  ffff888103b8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.842990]  ffff888103b8e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.843462] ==================================================================
[   17.253785] ==================================================================
[   17.254760] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   17.255790] Write of size 1 at addr ffff888100aaeec9 by task kunit_try_catch/178
[   17.257212] 
[   17.257403] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.258030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.258052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.258083] Call Trace:
[   17.258101]  <TASK>
[   17.258124]  dump_stack_lvl+0x73/0xb0
[   17.258163]  print_report+0xd1/0x650
[   17.258196]  ? __virt_addr_valid+0x1db/0x2d0
[   17.258227]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.258260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.258291]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.258324]  kasan_report+0x141/0x180
[   17.258353]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   17.258393]  __asan_report_store1_noabort+0x1b/0x30
[   17.258420]  krealloc_less_oob_helper+0xd70/0x11d0
[   17.258559]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.258620]  ? finish_task_switch.isra.0+0x153/0x700
[   17.258657]  ? __switch_to+0x5d9/0xf60
[   17.258685]  ? dequeue_task_fair+0x166/0x4e0
[   17.258719]  ? __schedule+0x10cc/0x2b30
[   17.258751]  ? __pfx_read_tsc+0x10/0x10
[   17.258782]  krealloc_less_oob+0x1c/0x30
[   17.258812]  kunit_try_run_case+0x1a5/0x480
[   17.258846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.258875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.258907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.258938]  ? __kthread_parkme+0x82/0x180
[   17.258967]  ? preempt_count_sub+0x50/0x80
[   17.259002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.259033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.259062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.259092]  kthread+0x337/0x6f0
[   17.259120]  ? trace_preempt_on+0x20/0xc0
[   17.259152]  ? __pfx_kthread+0x10/0x10
[   17.259182]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.259210]  ? calculate_sigpending+0x7b/0xa0
[   17.259239]  ? __pfx_kthread+0x10/0x10
[   17.259269]  ret_from_fork+0x41/0x80
[   17.259296]  ? __pfx_kthread+0x10/0x10
[   17.259325]  ret_from_fork_asm+0x1a/0x30
[   17.259368]  </TASK>
[   17.259381] 
[   17.281292] Allocated by task 178:
[   17.281633]  kasan_save_stack+0x45/0x70
[   17.282478]  kasan_save_track+0x18/0x40
[   17.283646]  kasan_save_alloc_info+0x3b/0x50
[   17.284256]  __kasan_krealloc+0x190/0x1f0
[   17.285565]  krealloc_noprof+0xf3/0x340
[   17.286810]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.287731]  krealloc_less_oob+0x1c/0x30
[   17.288048]  kunit_try_run_case+0x1a5/0x480
[   17.288323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.290621]  kthread+0x337/0x6f0
[   17.291803]  ret_from_fork+0x41/0x80
[   17.293139]  ret_from_fork_asm+0x1a/0x30
[   17.294410] 
[   17.294936] The buggy address belongs to the object at ffff888100aaee00
[   17.294936]  which belongs to the cache kmalloc-256 of size 256
[   17.296292] The buggy address is located 0 bytes to the right of
[   17.296292]  allocated 201-byte region [ffff888100aaee00, ffff888100aaeec9)
[   17.297952] 
[   17.298176] The buggy address belongs to the physical page:
[   17.298748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   17.299635] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.300219] flags: 0x200000000000040(head|node=0|zone=2)
[   17.300827] page_type: f5(slab)
[   17.301138] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.302009] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.303120] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.304260] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.305361] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   17.307065] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.307683] page dumped because: kasan: bad access detected
[   17.308335] 
[   17.308882] Memory state around the buggy address:
[   17.309467]  ffff888100aaed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.310310]  ffff888100aaee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.311280] >ffff888100aaee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.312038]                                               ^
[   17.312933]  ffff888100aaef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.313409]  ffff888100aaef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.314221] ==================================================================
[   17.366416] ==================================================================
[   17.367028] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   17.368587] Write of size 1 at addr ffff888100aaeeda by task kunit_try_catch/178
[   17.369810] 
[   17.370273] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.370945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.370968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.370999] Call Trace:
[   17.371022]  <TASK>
[   17.371043]  dump_stack_lvl+0x73/0xb0
[   17.371085]  print_report+0xd1/0x650
[   17.371117]  ? __virt_addr_valid+0x1db/0x2d0
[   17.371146]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.371179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.371209]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.371242]  kasan_report+0x141/0x180
[   17.371273]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   17.371314]  __asan_report_store1_noabort+0x1b/0x30
[   17.371341]  krealloc_less_oob_helper+0xec6/0x11d0
[   17.371377]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.371410]  ? finish_task_switch.isra.0+0x153/0x700
[   17.371450]  ? __switch_to+0x5d9/0xf60
[   17.371596]  ? dequeue_task_fair+0x166/0x4e0
[   17.371653]  ? __schedule+0x10cc/0x2b30
[   17.371687]  ? __pfx_read_tsc+0x10/0x10
[   17.371719]  krealloc_less_oob+0x1c/0x30
[   17.371750]  kunit_try_run_case+0x1a5/0x480
[   17.371784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.371814]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.371845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.371877]  ? __kthread_parkme+0x82/0x180
[   17.371906]  ? preempt_count_sub+0x50/0x80
[   17.371938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.371969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.371998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.372027]  kthread+0x337/0x6f0
[   17.372054]  ? trace_preempt_on+0x20/0xc0
[   17.372085]  ? __pfx_kthread+0x10/0x10
[   17.372114]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.372144]  ? calculate_sigpending+0x7b/0xa0
[   17.372171]  ? __pfx_kthread+0x10/0x10
[   17.372201]  ret_from_fork+0x41/0x80
[   17.372229]  ? __pfx_kthread+0x10/0x10
[   17.372258]  ret_from_fork_asm+0x1a/0x30
[   17.372298]  </TASK>
[   17.372311] 
[   17.391196] Allocated by task 178:
[   17.391726]  kasan_save_stack+0x45/0x70
[   17.392240]  kasan_save_track+0x18/0x40
[   17.393027]  kasan_save_alloc_info+0x3b/0x50
[   17.393526]  __kasan_krealloc+0x190/0x1f0
[   17.394107]  krealloc_noprof+0xf3/0x340
[   17.394732]  krealloc_less_oob_helper+0x1aa/0x11d0
[   17.395288]  krealloc_less_oob+0x1c/0x30
[   17.395886]  kunit_try_run_case+0x1a5/0x480
[   17.396356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.397290]  kthread+0x337/0x6f0
[   17.397713]  ret_from_fork+0x41/0x80
[   17.398287]  ret_from_fork_asm+0x1a/0x30
[   17.398949] 
[   17.399201] The buggy address belongs to the object at ffff888100aaee00
[   17.399201]  which belongs to the cache kmalloc-256 of size 256
[   17.400288] The buggy address is located 17 bytes to the right of
[   17.400288]  allocated 201-byte region [ffff888100aaee00, ffff888100aaeec9)
[   17.401194] 
[   17.401426] The buggy address belongs to the physical page:
[   17.402329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   17.403590] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.404194] flags: 0x200000000000040(head|node=0|zone=2)
[   17.404811] page_type: f5(slab)
[   17.405179] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.406295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.406967] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.407591] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.408163] head: 0200000000000001 ffffea000402ab81 00000000ffffffff 00000000ffffffff
[   17.408883] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.409807] page dumped because: kasan: bad access detected
[   17.410263] 
[   17.410605] Memory state around the buggy address:
[   17.411065]  ffff888100aaed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.411771]  ffff888100aaee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.412333] >ffff888100aaee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.412880]                                                     ^
[   17.413401]  ffff888100aaef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.414420]  ffff888100aaef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.415176] ==================================================================

[   19.575343] ==================================================================
[   19.576018] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.576723] Write of size 1 at addr ffff00001039a0ea by task kunit_try_catch/220
[   19.577395] 
[   19.577551] CPU: 4 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.577587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.577596] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.577608] Call trace:
[   19.577616]  show_stack+0x20/0x38 (C)
[   19.577639]  dump_stack_lvl+0x8c/0xd0
[   19.577660]  print_report+0x118/0x608
[   19.577678]  kasan_report+0xdc/0x128
[   19.577697]  __asan_report_store1_noabort+0x20/0x30
[   19.577719]  krealloc_less_oob_helper+0xae4/0xc50
[   19.577743]  krealloc_large_less_oob+0x20/0x38
[   19.577766]  kunit_try_run_case+0x170/0x3f0
[   19.577790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.577815]  kthread+0x328/0x630
[   19.577838]  ret_from_fork+0x10/0x20
[   19.577859] 
[   19.583835] The buggy address belongs to the physical page:
[   19.584341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.585058] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.585751] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.586387] page_type: f8(unknown)
[   19.586709] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.587408] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.588109] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.588814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.589520] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.590225] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.590926] page dumped because: kasan: bad access detected
[   19.591429] 
[   19.591574] Memory state around the buggy address:
[   19.592010]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.592662]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.593313] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.593961]                                                           ^
[   19.594559]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.595212]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.595861] ==================================================================
[   19.508879] ==================================================================
[   19.509969] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.510699] Write of size 1 at addr ffff00001039a0c9 by task kunit_try_catch/220
[   19.511384] 
[   19.511550] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.511599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.511613] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.511630] Call trace:
[   19.511641]  show_stack+0x20/0x38 (C)
[   19.511673]  dump_stack_lvl+0x8c/0xd0
[   19.511704]  print_report+0x118/0x608
[   19.511733]  kasan_report+0xdc/0x128
[   19.511761]  __asan_report_store1_noabort+0x20/0x30
[   19.511795]  krealloc_less_oob_helper+0xa48/0xc50
[   19.511831]  krealloc_large_less_oob+0x20/0x38
[   19.511865]  kunit_try_run_case+0x170/0x3f0
[   19.511901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.511940]  kthread+0x328/0x630
[   19.511974]  ret_from_fork+0x10/0x20
[   19.512006] 
[   19.518036] The buggy address belongs to the physical page:
[   19.518553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.519283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.519988] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.520640] page_type: f8(unknown)
[   19.520976] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.521690] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.522405] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.523127] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.523850] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.524572] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.525287] page dumped because: kasan: bad access detected
[   19.525801] 
[   19.525953] Memory state around the buggy address:
[   19.526401]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.527067]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.527732] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.528393]                                               ^
[   19.528910]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.529576]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.530237] ==================================================================
[   19.553119] ==================================================================
[   19.553790] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.554507] Write of size 1 at addr ffff00001039a0da by task kunit_try_catch/220
[   19.555192] 
[   19.555356] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.555405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.555419] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.555436] Call trace:
[   19.555447]  show_stack+0x20/0x38 (C)
[   19.555479]  dump_stack_lvl+0x8c/0xd0
[   19.555509]  print_report+0x118/0x608
[   19.555538]  kasan_report+0xdc/0x128
[   19.555566]  __asan_report_store1_noabort+0x20/0x30
[   19.555601]  krealloc_less_oob_helper+0xa80/0xc50
[   19.555636]  krealloc_large_less_oob+0x20/0x38
[   19.555671]  kunit_try_run_case+0x170/0x3f0
[   19.555706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555744]  kthread+0x328/0x630
[   19.555778]  ret_from_fork+0x10/0x20
[   19.555810] 
[   19.561839] The buggy address belongs to the physical page:
[   19.562354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.563085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.563788] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.564439] page_type: f8(unknown)
[   19.564773] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.565487] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.566201] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.566921] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.567644] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.568366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.569081] page dumped because: kasan: bad access detected
[   19.569595] 
[   19.569747] Memory state around the buggy address:
[   19.570194]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.570860]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.571525] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.572186]                                                     ^
[   19.572749]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.573414]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.574075] ==================================================================
[   19.375361] ==================================================================
[   19.376015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.376704] Write of size 1 at addr ffff00000d6fccda by task kunit_try_catch/216
[   19.377373] 
[   19.377522] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.377554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.377563] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.377573] Call trace:
[   19.377580]  show_stack+0x20/0x38 (C)
[   19.377600]  dump_stack_lvl+0x8c/0xd0
[   19.377619]  print_report+0x118/0x608
[   19.377638]  kasan_report+0xdc/0x128
[   19.377656]  __asan_report_store1_noabort+0x20/0x30
[   19.377678]  krealloc_less_oob_helper+0xa80/0xc50
[   19.377702]  krealloc_less_oob+0x20/0x38
[   19.377725]  kunit_try_run_case+0x170/0x3f0
[   19.377747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.377772]  kthread+0x328/0x630
[   19.377793]  ret_from_fork+0x10/0x20
[   19.377812] 
[   19.383740] Allocated by task 216:
[   19.384055]  kasan_save_stack+0x3c/0x68
[   19.384415]  kasan_save_track+0x20/0x40
[   19.384773]  kasan_save_alloc_info+0x40/0x58
[   19.385172]  __kasan_krealloc+0x118/0x178
[   19.385546]  krealloc_noprof+0x128/0x360
[   19.385912]  krealloc_less_oob_helper+0x168/0xc50
[   19.386352]  krealloc_less_oob+0x20/0x38
[   19.386724]  kunit_try_run_case+0x170/0x3f0
[   19.387115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.387624]  kthread+0x328/0x630
[   19.387932]  ret_from_fork+0x10/0x20
[   19.388269] 
[   19.388413] The buggy address belongs to the object at ffff00000d6fcc00
[   19.388413]  which belongs to the cache kmalloc-256 of size 256
[   19.389528] The buggy address is located 17 bytes to the right of
[   19.389528]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.390693] 
[   19.390838] The buggy address belongs to the physical page:
[   19.391341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.392049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.392737] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.393370] page_type: f5(slab)
[   19.393667] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.394365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.395065] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.395770] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.396476] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.397182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.397883] page dumped because: kasan: bad access detected
[   19.398387] 
[   19.398533] Memory state around the buggy address:
[   19.398969]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.399621]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.400273] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.400921]                                                     ^
[   19.401473]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.402125]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.402774] ==================================================================
[   19.596686] ==================================================================
[   19.597340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.598029] Write of size 1 at addr ffff00001039a0eb by task kunit_try_catch/220
[   19.598699] 
[   19.598848] CPU: 4 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.598880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.598889] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.598899] Call trace:
[   19.598905]  show_stack+0x20/0x38 (C)
[   19.598925]  dump_stack_lvl+0x8c/0xd0
[   19.598943]  print_report+0x118/0x608
[   19.598961]  kasan_report+0xdc/0x128
[   19.598979]  __asan_report_store1_noabort+0x20/0x30
[   19.599000]  krealloc_less_oob_helper+0xa58/0xc50
[   19.599024]  krealloc_large_less_oob+0x20/0x38
[   19.599047]  kunit_try_run_case+0x170/0x3f0
[   19.599069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.599094]  kthread+0x328/0x630
[   19.599116]  ret_from_fork+0x10/0x20
[   19.599136] 
[   19.605108] The buggy address belongs to the physical page:
[   19.605610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.606325] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.607014] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.607646] page_type: f8(unknown)
[   19.607966] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.608664] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.609363] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.610068] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.610774] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.611480] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.612181] page dumped because: kasan: bad access detected
[   19.612683] 
[   19.612828] Memory state around the buggy address:
[   19.613263]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.613916]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.614566] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.615214]                                                           ^
[   19.615810]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.616461]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.617109] ==================================================================
[   19.403560] ==================================================================
[   19.404214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.404903] Write of size 1 at addr ffff00000d6fccea by task kunit_try_catch/216
[   19.405572] 
[   19.405722] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.405754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.405763] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.405773] Call trace:
[   19.405780]  show_stack+0x20/0x38 (C)
[   19.405800]  dump_stack_lvl+0x8c/0xd0
[   19.405820]  print_report+0x118/0x608
[   19.405838]  kasan_report+0xdc/0x128
[   19.405856]  __asan_report_store1_noabort+0x20/0x30
[   19.405879]  krealloc_less_oob_helper+0xae4/0xc50
[   19.405903]  krealloc_less_oob+0x20/0x38
[   19.405926]  kunit_try_run_case+0x170/0x3f0
[   19.405947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.405972]  kthread+0x328/0x630
[   19.405993]  ret_from_fork+0x10/0x20
[   19.406013] 
[   19.411939] Allocated by task 216:
[   19.412255]  kasan_save_stack+0x3c/0x68
[   19.412614]  kasan_save_track+0x20/0x40
[   19.412972]  kasan_save_alloc_info+0x40/0x58
[   19.413372]  __kasan_krealloc+0x118/0x178
[   19.413745]  krealloc_noprof+0x128/0x360
[   19.414111]  krealloc_less_oob_helper+0x168/0xc50
[   19.414552]  krealloc_less_oob+0x20/0x38
[   19.414923]  kunit_try_run_case+0x170/0x3f0
[   19.415315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.415823]  kthread+0x328/0x630
[   19.416131]  ret_from_fork+0x10/0x20
[   19.416468] 
[   19.416614] The buggy address belongs to the object at ffff00000d6fcc00
[   19.416614]  which belongs to the cache kmalloc-256 of size 256
[   19.417728] The buggy address is located 33 bytes to the right of
[   19.417728]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.418892] 
[   19.419037] The buggy address belongs to the physical page:
[   19.419541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.420247] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.420936] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.421567] page_type: f5(slab)
[   19.421864] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.422563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.423261] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.423967] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.424674] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.425378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.426079] page dumped because: kasan: bad access detected
[   19.426581] 
[   19.426726] Memory state around the buggy address:
[   19.427162]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.427813]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.428463] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.429112]                                                           ^
[   19.429708]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.430359]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431008] ==================================================================
[   19.347103] ==================================================================
[   19.347777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.348480] Write of size 1 at addr ffff00000d6fccd0 by task kunit_try_catch/216
[   19.349151] 
[   19.349306] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.349342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.349351] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.349363] Call trace:
[   19.349371]  show_stack+0x20/0x38 (C)
[   19.349394]  dump_stack_lvl+0x8c/0xd0
[   19.349415]  print_report+0x118/0x608
[   19.349434]  kasan_report+0xdc/0x128
[   19.349452]  __asan_report_store1_noabort+0x20/0x30
[   19.349475]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.349499]  krealloc_less_oob+0x20/0x38
[   19.349523]  kunit_try_run_case+0x170/0x3f0
[   19.349546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.349571]  kthread+0x328/0x630
[   19.349593]  ret_from_fork+0x10/0x20
[   19.349614] 
[   19.355545] Allocated by task 216:
[   19.355862]  kasan_save_stack+0x3c/0x68
[   19.356223]  kasan_save_track+0x20/0x40
[   19.356582]  kasan_save_alloc_info+0x40/0x58
[   19.356981]  __kasan_krealloc+0x118/0x178
[   19.357355]  krealloc_noprof+0x128/0x360
[   19.357722]  krealloc_less_oob_helper+0x168/0xc50
[   19.358162]  krealloc_less_oob+0x20/0x38
[   19.358532]  kunit_try_run_case+0x170/0x3f0
[   19.358925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.359433]  kthread+0x328/0x630
[   19.359743]  ret_from_fork+0x10/0x20
[   19.360079] 
[   19.360226] The buggy address belongs to the object at ffff00000d6fcc00
[   19.360226]  which belongs to the cache kmalloc-256 of size 256
[   19.361342] The buggy address is located 7 bytes to the right of
[   19.361342]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.362499] 
[   19.362645] The buggy address belongs to the physical page:
[   19.363149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.363858] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.364550] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.365185] page_type: f5(slab)
[   19.365485] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.366185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.366884] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.367590] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.368297] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.369003] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.369704] page dumped because: kasan: bad access detected
[   19.370208] 
[   19.370353] Memory state around the buggy address:
[   19.370790]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.371442]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.372093] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.372741]                                                  ^
[   19.373269]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.373921]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.374568] ==================================================================
[   19.531305] ==================================================================
[   19.531989] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.532704] Write of size 1 at addr ffff00001039a0d0 by task kunit_try_catch/220
[   19.533388] 
[   19.533552] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.533601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.533615] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.533632] Call trace:
[   19.533643]  show_stack+0x20/0x38 (C)
[   19.533674]  dump_stack_lvl+0x8c/0xd0
[   19.533705]  print_report+0x118/0x608
[   19.533734]  kasan_report+0xdc/0x128
[   19.533761]  __asan_report_store1_noabort+0x20/0x30
[   19.533795]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.533831]  krealloc_large_less_oob+0x20/0x38
[   19.533866]  kunit_try_run_case+0x170/0x3f0
[   19.533901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.533939]  kthread+0x328/0x630
[   19.533973]  ret_from_fork+0x10/0x20
[   19.534005] 
[   19.540033] The buggy address belongs to the physical page:
[   19.540549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.541280] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.541984] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.542634] page_type: f8(unknown)
[   19.542969] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.543684] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.544398] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.545120] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.545843] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.546566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.547280] page dumped because: kasan: bad access detected
[   19.547794] 
[   19.547946] Memory state around the buggy address:
[   19.548393]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.549059]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.549724] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.550385]                                                  ^
[   19.550927]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.551591]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.552252] ==================================================================
[   19.317399] ==================================================================
[   19.318458] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.319185] Write of size 1 at addr ffff00000d6fccc9 by task kunit_try_catch/216
[   19.319869] 
[   19.320034] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.320083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.320097] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.320113] Call trace:
[   19.320125]  show_stack+0x20/0x38 (C)
[   19.320157]  dump_stack_lvl+0x8c/0xd0
[   19.320188]  print_report+0x118/0x608
[   19.320217]  kasan_report+0xdc/0x128
[   19.320244]  __asan_report_store1_noabort+0x20/0x30
[   19.320278]  krealloc_less_oob_helper+0xa48/0xc50
[   19.320314]  krealloc_less_oob+0x20/0x38
[   19.320348]  kunit_try_run_case+0x170/0x3f0
[   19.320382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.320421]  kthread+0x328/0x630
[   19.320454]  ret_from_fork+0x10/0x20
[   19.320487] 
[   19.326473] Allocated by task 216:
[   19.326801]  kasan_save_stack+0x3c/0x68
[   19.327176]  kasan_save_track+0x20/0x40
[   19.327547]  kasan_save_alloc_info+0x40/0x58
[   19.327961]  __kasan_krealloc+0x118/0x178
[   19.328348]  krealloc_noprof+0x128/0x360
[   19.328728]  krealloc_less_oob_helper+0x168/0xc50
[   19.329183]  krealloc_less_oob+0x20/0x38
[   19.329567]  kunit_try_run_case+0x170/0x3f0
[   19.329974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.330499]  kthread+0x328/0x630
[   19.330821]  ret_from_fork+0x10/0x20
[   19.331171] 
[   19.331324] The buggy address belongs to the object at ffff00000d6fcc00
[   19.331324]  which belongs to the cache kmalloc-256 of size 256
[   19.332455] The buggy address is located 0 bytes to the right of
[   19.332455]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.333627] 
[   19.333781] The buggy address belongs to the physical page:
[   19.334298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.335021] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.335727] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.336378] page_type: f5(slab)
[   19.336692] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.337408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.338123] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.338846] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.339569] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.340292] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.341006] page dumped because: kasan: bad access detected
[   19.341519] 
[   19.341671] Memory state around the buggy address:
[   19.342119]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342785]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.343450] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.344112]                                               ^
[   19.344629]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.345294]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.345955] ==================================================================
[   19.431786] ==================================================================
[   19.432440] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.433131] Write of size 1 at addr ffff00000d6fcceb by task kunit_try_catch/216
[   19.433800] 
[   19.433949] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.433980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.433989] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.433999] Call trace:
[   19.434006]  show_stack+0x20/0x38 (C)
[   19.434025]  dump_stack_lvl+0x8c/0xd0
[   19.434043]  print_report+0x118/0x608
[   19.434062]  kasan_report+0xdc/0x128
[   19.434080]  __asan_report_store1_noabort+0x20/0x30
[   19.434101]  krealloc_less_oob_helper+0xa58/0xc50
[   19.434126]  krealloc_less_oob+0x20/0x38
[   19.434149]  kunit_try_run_case+0x170/0x3f0
[   19.434170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.434195]  kthread+0x328/0x630
[   19.434216]  ret_from_fork+0x10/0x20
[   19.434236] 
[   19.440161] Allocated by task 216:
[   19.440476]  kasan_save_stack+0x3c/0x68
[   19.440834]  kasan_save_track+0x20/0x40
[   19.441192]  kasan_save_alloc_info+0x40/0x58
[   19.441591]  __kasan_krealloc+0x118/0x178
[   19.441964]  krealloc_noprof+0x128/0x360
[   19.442329]  krealloc_less_oob_helper+0x168/0xc50
[   19.442768]  krealloc_less_oob+0x20/0x38
[   19.443138]  kunit_try_run_case+0x170/0x3f0
[   19.443530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.444036]  kthread+0x328/0x630
[   19.444345]  ret_from_fork+0x10/0x20
[   19.444681] 
[   19.444827] The buggy address belongs to the object at ffff00000d6fcc00
[   19.444827]  which belongs to the cache kmalloc-256 of size 256
[   19.445941] The buggy address is located 34 bytes to the right of
[   19.445941]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.447104] 
[   19.447250] The buggy address belongs to the physical page:
[   19.447752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.448459] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.449148] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.449779] page_type: f5(slab)
[   19.450075] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.450774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.451473] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.452179] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.452885] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.453591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.454292] page dumped because: kasan: bad access detected
[   19.454795] 
[   19.454940] Memory state around the buggy address:
[   19.455376]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.456027]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.456677] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.457326]                                                           ^
[   19.457923]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.458574]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459223] ==================================================================