Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   36.304907] ==================================================================
[   36.306034] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   36.307223] Write of size 1 at addr fff00000c67360c9 by task kunit_try_catch/151
[   36.308804] 
[   36.309735] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.310886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.311598] Hardware name: linux,dummy-virt (DT)
[   36.312291] Call trace:
[   36.312676]  show_stack+0x20/0x38 (C)
[   36.312957]  dump_stack_lvl+0x8c/0xd0
[   36.313222]  print_report+0x118/0x5e0
[   36.313989]  kasan_report+0xc8/0x118
[   36.314596]  __asan_report_store1_noabort+0x20/0x30
[   36.315386]  krealloc_less_oob_helper+0xa48/0xc50
[   36.316105]  krealloc_large_less_oob+0x20/0x38
[   36.316803]  kunit_try_run_case+0x14c/0x3d0
[   36.317340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.318167]  kthread+0x24c/0x2d0
[   36.318716]  ret_from_fork+0x10/0x20
[   36.319406] 
[   36.319816] The buggy address belongs to the physical page:
[   36.320575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.321551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.322512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.323409] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.324413] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.325177] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.326219] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.327361] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.328799] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.330191] page dumped because: kasan: bad access detected
[   36.330915] 
[   36.331079] Memory state around the buggy address:
[   36.331337]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.332437]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.333239] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.334229]                                               ^
[   36.334633]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.335384]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.336088] ==================================================================
[   36.007581] ==================================================================
[   36.008713] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   36.009504] Write of size 1 at addr fff00000c449b6c9 by task kunit_try_catch/147
[   36.010350] 
[   36.011302] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.012649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.013252] Hardware name: linux,dummy-virt (DT)
[   36.014046] Call trace:
[   36.014412]  show_stack+0x20/0x38 (C)
[   36.014979]  dump_stack_lvl+0x8c/0xd0
[   36.015911]  print_report+0x118/0x5e0
[   36.016460]  kasan_report+0xc8/0x118
[   36.017158]  __asan_report_store1_noabort+0x20/0x30
[   36.018089]  krealloc_less_oob_helper+0xa48/0xc50
[   36.018884]  krealloc_less_oob+0x20/0x38
[   36.019628]  kunit_try_run_case+0x14c/0x3d0
[   36.020293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.021038]  kthread+0x24c/0x2d0
[   36.021820]  ret_from_fork+0x10/0x20
[   36.022561] 
[   36.022905] Allocated by task 147:
[   36.023405]  kasan_save_stack+0x3c/0x68
[   36.024364]  kasan_save_track+0x20/0x40
[   36.025104]  kasan_save_alloc_info+0x40/0x58
[   36.025966]  __kasan_krealloc+0x118/0x178
[   36.026693]  krealloc_noprof+0x128/0x360
[   36.027417]  krealloc_less_oob_helper+0x168/0xc50
[   36.028202]  krealloc_less_oob+0x20/0x38
[   36.028915]  kunit_try_run_case+0x14c/0x3d0
[   36.029996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.031119]  kthread+0x24c/0x2d0
[   36.031564]  ret_from_fork+0x10/0x20
[   36.031901] 
[   36.032743] The buggy address belongs to the object at fff00000c449b600
[   36.032743]  which belongs to the cache kmalloc-256 of size 256
[   36.034245] The buggy address is located 0 bytes to the right of
[   36.034245]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.035432] 
[   36.035807] The buggy address belongs to the physical page:
[   36.036437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.037368] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.038346] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.039224] page_type: f5(slab)
[   36.039687] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.040594] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.041498] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.042418] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.043251] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.044101] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.044913] page dumped because: kasan: bad access detected
[   36.045837] 
[   36.046207] Memory state around the buggy address:
[   36.046839]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.047637]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.048454] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.049196]                                               ^
[   36.049948]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.050989]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.052390] ==================================================================
[   36.339582] ==================================================================
[   36.340399] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   36.341047] Write of size 1 at addr fff00000c67360d0 by task kunit_try_catch/151
[   36.341922] 
[   36.342268] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.343343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.343856] Hardware name: linux,dummy-virt (DT)
[   36.344358] Call trace:
[   36.344792]  show_stack+0x20/0x38 (C)
[   36.345276]  dump_stack_lvl+0x8c/0xd0
[   36.345882]  print_report+0x118/0x5e0
[   36.346425]  kasan_report+0xc8/0x118
[   36.347104]  __asan_report_store1_noabort+0x20/0x30
[   36.347798]  krealloc_less_oob_helper+0xb9c/0xc50
[   36.348345]  krealloc_large_less_oob+0x20/0x38
[   36.349006]  kunit_try_run_case+0x14c/0x3d0
[   36.349639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.350380]  kthread+0x24c/0x2d0
[   36.350944]  ret_from_fork+0x10/0x20
[   36.351517] 
[   36.351860] The buggy address belongs to the physical page:
[   36.352417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.353311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.354137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.354930] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.355827] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.356670] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.357543] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.358389] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.359210] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.359993] page dumped because: kasan: bad access detected
[   36.360631] 
[   36.360965] Memory state around the buggy address:
[   36.361538]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.362376]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.363091] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.363912]                                                  ^
[   36.364581]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.365385]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.366043] ==================================================================
[   36.368850] ==================================================================
[   36.369559] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   36.370384] Write of size 1 at addr fff00000c67360da by task kunit_try_catch/151
[   36.371011] 
[   36.371390] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.372551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.373003] Hardware name: linux,dummy-virt (DT)
[   36.373618] Call trace:
[   36.374030]  show_stack+0x20/0x38 (C)
[   36.374566]  dump_stack_lvl+0x8c/0xd0
[   36.375150]  print_report+0x118/0x5e0
[   36.375712]  kasan_report+0xc8/0x118
[   36.376284]  __asan_report_store1_noabort+0x20/0x30
[   36.376850]  krealloc_less_oob_helper+0xa80/0xc50
[   36.377537]  krealloc_large_less_oob+0x20/0x38
[   36.378181]  kunit_try_run_case+0x14c/0x3d0
[   36.378805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.379482]  kthread+0x24c/0x2d0
[   36.379934]  ret_from_fork+0x10/0x20
[   36.380531] 
[   36.380860] The buggy address belongs to the physical page:
[   36.381491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.382401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.383178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.384097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.384817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.385721] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.386560] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.387463] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.388216] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.389029] page dumped because: kasan: bad access detected
[   36.389592] 
[   36.389927] Memory state around the buggy address:
[   36.390520]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.391273]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.391897] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.392731]                                                     ^
[   36.393333]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.394208]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.394915] ==================================================================
[   36.426334] ==================================================================
[   36.427071] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   36.427806] Write of size 1 at addr fff00000c67360eb by task kunit_try_catch/151
[   36.428529] 
[   36.428883] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.429902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.430420] Hardware name: linux,dummy-virt (DT)
[   36.430986] Call trace:
[   36.431405]  show_stack+0x20/0x38 (C)
[   36.431905]  dump_stack_lvl+0x8c/0xd0
[   36.432522]  print_report+0x118/0x5e0
[   36.433092]  kasan_report+0xc8/0x118
[   36.433688]  __asan_report_store1_noabort+0x20/0x30
[   36.434251]  krealloc_less_oob_helper+0xa58/0xc50
[   36.434874]  krealloc_large_less_oob+0x20/0x38
[   36.435502]  kunit_try_run_case+0x14c/0x3d0
[   36.436130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.436778]  kthread+0x24c/0x2d0
[   36.437315]  ret_from_fork+0x10/0x20
[   36.437907] 
[   36.438208] The buggy address belongs to the physical page:
[   36.438797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.439724] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.440524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.441218] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.442120] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.442885] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.443658] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.444515] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.445276] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.446050] page dumped because: kasan: bad access detected
[   36.446688] 
[   36.447026] Memory state around the buggy address:
[   36.447667]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.448387]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.449130] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.449762]                                                           ^
[   36.450547]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.451253]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.452052] ==================================================================
[   36.139849] ==================================================================
[   36.140901] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   36.141668] Write of size 1 at addr fff00000c449b6ea by task kunit_try_catch/147
[   36.142524] 
[   36.142900] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.144825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.145502] Hardware name: linux,dummy-virt (DT)
[   36.146226] Call trace:
[   36.146789]  show_stack+0x20/0x38 (C)
[   36.147509]  dump_stack_lvl+0x8c/0xd0
[   36.148205]  print_report+0x118/0x5e0
[   36.148914]  kasan_report+0xc8/0x118
[   36.149600]  __asan_report_store1_noabort+0x20/0x30
[   36.150358]  krealloc_less_oob_helper+0xae4/0xc50
[   36.150892]  krealloc_less_oob+0x20/0x38
[   36.151405]  kunit_try_run_case+0x14c/0x3d0
[   36.152035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.152772]  kthread+0x24c/0x2d0
[   36.153215]  ret_from_fork+0x10/0x20
[   36.153813] 
[   36.154136] Allocated by task 147:
[   36.154635]  kasan_save_stack+0x3c/0x68
[   36.155254]  kasan_save_track+0x20/0x40
[   36.155823]  kasan_save_alloc_info+0x40/0x58
[   36.156423]  __kasan_krealloc+0x118/0x178
[   36.157027]  krealloc_noprof+0x128/0x360
[   36.157575]  krealloc_less_oob_helper+0x168/0xc50
[   36.158154]  krealloc_less_oob+0x20/0x38
[   36.158633]  kunit_try_run_case+0x14c/0x3d0
[   36.159239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.159819]  kthread+0x24c/0x2d0
[   36.160357]  ret_from_fork+0x10/0x20
[   36.160911] 
[   36.161250] The buggy address belongs to the object at fff00000c449b600
[   36.161250]  which belongs to the cache kmalloc-256 of size 256
[   36.162305] The buggy address is located 33 bytes to the right of
[   36.162305]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.163525] 
[   36.163860] The buggy address belongs to the physical page:
[   36.164569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.165457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.166178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.166988] page_type: f5(slab)
[   36.167428] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.168268] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.169037] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.169854] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.170745] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.171546] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.172257] page dumped because: kasan: bad access detected
[   36.172924] 
[   36.173263] Memory state around the buggy address:
[   36.173809]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.174609]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.175356] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.176097]                                                           ^
[   36.176890]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.177600]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.178416] ==================================================================
[   36.054004] ==================================================================
[   36.054690] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   36.055414] Write of size 1 at addr fff00000c449b6d0 by task kunit_try_catch/147
[   36.057238] 
[   36.057818] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.059533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.060211] Hardware name: linux,dummy-virt (DT)
[   36.061149] Call trace:
[   36.061538]  show_stack+0x20/0x38 (C)
[   36.062081]  dump_stack_lvl+0x8c/0xd0
[   36.062564]  print_report+0x118/0x5e0
[   36.063055]  kasan_report+0xc8/0x118
[   36.063656]  __asan_report_store1_noabort+0x20/0x30
[   36.064413]  krealloc_less_oob_helper+0xb9c/0xc50
[   36.065134]  krealloc_less_oob+0x20/0x38
[   36.065807]  kunit_try_run_case+0x14c/0x3d0
[   36.066365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.067032]  kthread+0x24c/0x2d0
[   36.067577]  ret_from_fork+0x10/0x20
[   36.068088] 
[   36.068435] Allocated by task 147:
[   36.068938]  kasan_save_stack+0x3c/0x68
[   36.069542]  kasan_save_track+0x20/0x40
[   36.070111]  kasan_save_alloc_info+0x40/0x58
[   36.070686]  __kasan_krealloc+0x118/0x178
[   36.071236]  krealloc_noprof+0x128/0x360
[   36.071834]  krealloc_less_oob_helper+0x168/0xc50
[   36.072494]  krealloc_less_oob+0x20/0x38
[   36.073010]  kunit_try_run_case+0x14c/0x3d0
[   36.073571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.074223]  kthread+0x24c/0x2d0
[   36.074709]  ret_from_fork+0x10/0x20
[   36.075166] 
[   36.075507] The buggy address belongs to the object at fff00000c449b600
[   36.075507]  which belongs to the cache kmalloc-256 of size 256
[   36.076666] The buggy address is located 7 bytes to the right of
[   36.076666]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.077920] 
[   36.078222] The buggy address belongs to the physical page:
[   36.078905] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.079713] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.080592] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.081287] page_type: f5(slab)
[   36.081824] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.082670] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.083576] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.084305] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.085115] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.085893] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.086698] page dumped because: kasan: bad access detected
[   36.087372] 
[   36.087713] Memory state around the buggy address:
[   36.088272]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.089009]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.089723] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.090535]                                                  ^
[   36.091217]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.092084]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.092775] ==================================================================
[   36.096761] ==================================================================
[   36.097488] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   36.098245] Write of size 1 at addr fff00000c449b6da by task kunit_try_catch/147
[   36.099002] 
[   36.099373] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.100877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.101716] Hardware name: linux,dummy-virt (DT)
[   36.102291] Call trace:
[   36.102657]  show_stack+0x20/0x38 (C)
[   36.103212]  dump_stack_lvl+0x8c/0xd0
[   36.103759]  print_report+0x118/0x5e0
[   36.104260]  kasan_report+0xc8/0x118
[   36.104886]  __asan_report_store1_noabort+0x20/0x30
[   36.106041]  krealloc_less_oob_helper+0xa80/0xc50
[   36.106674]  krealloc_less_oob+0x20/0x38
[   36.107180]  kunit_try_run_case+0x14c/0x3d0
[   36.107835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.108557]  kthread+0x24c/0x2d0
[   36.109080]  ret_from_fork+0x10/0x20
[   36.109948] 
[   36.110264] Allocated by task 147:
[   36.110819]  kasan_save_stack+0x3c/0x68
[   36.111418]  kasan_save_track+0x20/0x40
[   36.111938]  kasan_save_alloc_info+0x40/0x58
[   36.112587]  __kasan_krealloc+0x118/0x178
[   36.113160]  krealloc_noprof+0x128/0x360
[   36.113774]  krealloc_less_oob_helper+0x168/0xc50
[   36.114934]  krealloc_less_oob+0x20/0x38
[   36.115328]  kunit_try_run_case+0x14c/0x3d0
[   36.116300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.117101]  kthread+0x24c/0x2d0
[   36.117521]  ret_from_fork+0x10/0x20
[   36.118139] 
[   36.118555] The buggy address belongs to the object at fff00000c449b600
[   36.118555]  which belongs to the cache kmalloc-256 of size 256
[   36.119853] The buggy address is located 17 bytes to the right of
[   36.119853]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.121212] 
[   36.121684] The buggy address belongs to the physical page:
[   36.122318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.123035] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.123947] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.124868] page_type: f5(slab)
[   36.125342] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.126119] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.127024] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.127869] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.128677] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.129561] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.130314] page dumped because: kasan: bad access detected
[   36.130919] 
[   36.131258] Memory state around the buggy address:
[   36.131791]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.132593]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.133368] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.134100]                                                     ^
[   36.134787]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.135550]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.136296] ==================================================================
[   36.182322] ==================================================================
[   36.183552] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   36.184146] Write of size 1 at addr fff00000c449b6eb by task kunit_try_catch/147
[   36.185053] 
[   36.186118] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.187590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.188273] Hardware name: linux,dummy-virt (DT)
[   36.188834] Call trace:
[   36.189206]  show_stack+0x20/0x38 (C)
[   36.189823]  dump_stack_lvl+0x8c/0xd0
[   36.190397]  print_report+0x118/0x5e0
[   36.191027]  kasan_report+0xc8/0x118
[   36.191643]  __asan_report_store1_noabort+0x20/0x30
[   36.192250]  krealloc_less_oob_helper+0xa58/0xc50
[   36.192957]  krealloc_less_oob+0x20/0x38
[   36.193523]  kunit_try_run_case+0x14c/0x3d0
[   36.194182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.194818]  kthread+0x24c/0x2d0
[   36.195388]  ret_from_fork+0x10/0x20
[   36.195962] 
[   36.196344] Allocated by task 147:
[   36.196904]  kasan_save_stack+0x3c/0x68
[   36.197416]  kasan_save_track+0x20/0x40
[   36.198033]  kasan_save_alloc_info+0x40/0x58
[   36.198634]  __kasan_krealloc+0x118/0x178
[   36.199259]  krealloc_noprof+0x128/0x360
[   36.199805]  krealloc_less_oob_helper+0x168/0xc50
[   36.200551]  krealloc_less_oob+0x20/0x38
[   36.201090]  kunit_try_run_case+0x14c/0x3d0
[   36.201697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.202391]  kthread+0x24c/0x2d0
[   36.202935]  ret_from_fork+0x10/0x20
[   36.203462] 
[   36.203840] The buggy address belongs to the object at fff00000c449b600
[   36.203840]  which belongs to the cache kmalloc-256 of size 256
[   36.204980] The buggy address is located 34 bytes to the right of
[   36.204980]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.206246] 
[   36.206627] The buggy address belongs to the physical page:
[   36.207274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.208124] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.209019] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.209852] page_type: f5(slab)
[   36.210296] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.211181] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.212079] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.212957] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.213737] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.214111] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.214477] page dumped because: kasan: bad access detected
[   36.215120] 
[   36.215479] Memory state around the buggy address:
[   36.216398]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217162]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.217590] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.218530]                                                           ^
[   36.219385]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.220281]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.221146] ==================================================================
[   36.396426] ==================================================================
[   36.397995] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   36.398855] Write of size 1 at addr fff00000c67360ea by task kunit_try_catch/151
[   36.399709] 
[   36.400070] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.402369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.402847] Hardware name: linux,dummy-virt (DT)
[   36.403394] Call trace:
[   36.403825]  show_stack+0x20/0x38 (C)
[   36.404374]  dump_stack_lvl+0x8c/0xd0
[   36.404897]  print_report+0x118/0x5e0
[   36.405410]  kasan_report+0xc8/0x118
[   36.405995]  __asan_report_store1_noabort+0x20/0x30
[   36.406680]  krealloc_less_oob_helper+0xae4/0xc50
[   36.407337]  krealloc_large_less_oob+0x20/0x38
[   36.408005]  kunit_try_run_case+0x14c/0x3d0
[   36.408655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.409341]  kthread+0x24c/0x2d0
[   36.409836]  ret_from_fork+0x10/0x20
[   36.410354] 
[   36.410687] The buggy address belongs to the physical page:
[   36.411354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.412159] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.412966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.413769] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.414518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.415301] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.416036] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.416901] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.417744] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.418606] page dumped because: kasan: bad access detected
[   36.419198] 
[   36.419528] Memory state around the buggy address:
[   36.420002]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.420855]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.421599] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.422307]                                                           ^
[   36.423108]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.423811]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.424560] ==================================================================

[   27.268648] ==================================================================
[   27.269707] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   27.270390] Write of size 1 at addr ffff888100aa18c9 by task kunit_try_catch/165
[   27.271165] 
[   27.271416] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.272212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.272701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.273404] Call Trace:
[   27.274012]  <TASK>
[   27.274229]  dump_stack_lvl+0x73/0xb0
[   27.274743]  print_report+0xd1/0x640
[   27.275439]  ? __virt_addr_valid+0x1db/0x2d0
[   27.275794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.276372]  kasan_report+0x102/0x140
[   27.276973]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   27.277313]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   27.277947]  __asan_report_store1_noabort+0x1b/0x30
[   27.278518]  krealloc_less_oob_helper+0xd72/0x11d0
[   27.279030]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.279486]  ? finish_task_switch.isra.0+0x153/0x700
[   27.280328]  ? __switch_to+0x5d9/0xf60
[   27.280621]  ? __schedule+0xc3e/0x2790
[   27.281249]  ? __pfx_read_tsc+0x10/0x10
[   27.281764]  krealloc_less_oob+0x1c/0x30
[   27.282102]  kunit_try_run_case+0x1b3/0x490
[   27.282415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.282882]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.283450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.284505]  ? __kthread_parkme+0x82/0x160
[   27.285031]  ? preempt_count_sub+0x50/0x80
[   27.285837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.286289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.286671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.287177]  kthread+0x257/0x310
[   27.287614]  ? __pfx_kthread+0x10/0x10
[   27.288107]  ret_from_fork+0x41/0x80
[   27.288551]  ? __pfx_kthread+0x10/0x10
[   27.289301]  ret_from_fork_asm+0x1a/0x30
[   27.289808]  </TASK>
[   27.290114] 
[   27.290266] Allocated by task 165:
[   27.290506]  kasan_save_stack+0x3d/0x60
[   27.290876]  kasan_save_track+0x18/0x40
[   27.291669]  kasan_save_alloc_info+0x3b/0x50
[   27.292180]  __kasan_krealloc+0x190/0x1f0
[   27.292882]  krealloc_noprof+0xf3/0x340
[   27.293408]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.293886]  krealloc_less_oob+0x1c/0x30
[   27.294533]  kunit_try_run_case+0x1b3/0x490
[   27.295324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.295717]  kthread+0x257/0x310
[   27.296234]  ret_from_fork+0x41/0x80
[   27.296501]  ret_from_fork_asm+0x1a/0x30
[   27.297078] 
[   27.297305] The buggy address belongs to the object at ffff888100aa1800
[   27.297305]  which belongs to the cache kmalloc-256 of size 256
[   27.298347] The buggy address is located 0 bytes to the right of
[   27.298347]  allocated 201-byte region [ffff888100aa1800, ffff888100aa18c9)
[   27.299062] 
[   27.299304] The buggy address belongs to the physical page:
[   27.300165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   27.301247] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.301750] flags: 0x200000000000040(head|node=0|zone=2)
[   27.302181] page_type: f5(slab)
[   27.302428] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.303049] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.303893] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.305753] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.306381] head: 0200000000000001 ffffea000402a801 ffffffffffffffff 0000000000000000
[   27.307444] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.308178] page dumped because: kasan: bad access detected
[   27.308575] 
[   27.308932] Memory state around the buggy address:
[   27.309599]  ffff888100aa1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.310163]  ffff888100aa1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.310568] >ffff888100aa1880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.311430]                                               ^
[   27.312284]  ffff888100aa1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.312944]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.313430] ==================================================================
[   27.314866] ==================================================================
[   27.316052] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   27.316509] Write of size 1 at addr ffff888100aa18d0 by task kunit_try_catch/165
[   27.317436] 
[   27.317605] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.319439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.319755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.320812] Call Trace:
[   27.321039]  <TASK>
[   27.321443]  dump_stack_lvl+0x73/0xb0
[   27.321817]  print_report+0xd1/0x640
[   27.322353]  ? __virt_addr_valid+0x1db/0x2d0
[   27.322678]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.323709]  kasan_report+0x102/0x140
[   27.323996]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.324336]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.324963]  __asan_report_store1_noabort+0x1b/0x30
[   27.325819]  krealloc_less_oob_helper+0xe25/0x11d0
[   27.326327]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.326677]  ? finish_task_switch.isra.0+0x153/0x700
[   27.327631]  ? __switch_to+0x5d9/0xf60
[   27.328412]  ? __schedule+0xc3e/0x2790
[   27.329007]  ? __pfx_read_tsc+0x10/0x10
[   27.329784]  krealloc_less_oob+0x1c/0x30
[   27.330317]  kunit_try_run_case+0x1b3/0x490
[   27.330642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.331246]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.331788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.332125]  ? __kthread_parkme+0x82/0x160
[   27.332997]  ? preempt_count_sub+0x50/0x80
[   27.333709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.334447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.335331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.335869]  kthread+0x257/0x310
[   27.336427]  ? __pfx_kthread+0x10/0x10
[   27.337039]  ret_from_fork+0x41/0x80
[   27.337747]  ? __pfx_kthread+0x10/0x10
[   27.338398]  ret_from_fork_asm+0x1a/0x30
[   27.339036]  </TASK>
[   27.339479] 
[   27.339748] Allocated by task 165:
[   27.340536]  kasan_save_stack+0x3d/0x60
[   27.341020]  kasan_save_track+0x18/0x40
[   27.341658]  kasan_save_alloc_info+0x3b/0x50
[   27.342316]  __kasan_krealloc+0x190/0x1f0
[   27.342890]  krealloc_noprof+0xf3/0x340
[   27.343441]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.343988]  krealloc_less_oob+0x1c/0x30
[   27.344886]  kunit_try_run_case+0x1b3/0x490
[   27.345386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.345920]  kthread+0x257/0x310
[   27.346325]  ret_from_fork+0x41/0x80
[   27.346866]  ret_from_fork_asm+0x1a/0x30
[   27.347453] 
[   27.347644] The buggy address belongs to the object at ffff888100aa1800
[   27.347644]  which belongs to the cache kmalloc-256 of size 256
[   27.349408] The buggy address is located 7 bytes to the right of
[   27.349408]  allocated 201-byte region [ffff888100aa1800, ffff888100aa18c9)
[   27.350786] 
[   27.350990] The buggy address belongs to the physical page:
[   27.351790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   27.352798] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.353750] flags: 0x200000000000040(head|node=0|zone=2)
[   27.354243] page_type: f5(slab)
[   27.354754] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.355672] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.356863] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.357721] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.358430] head: 0200000000000001 ffffea000402a801 ffffffffffffffff 0000000000000000
[   27.359403] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.360429] page dumped because: kasan: bad access detected
[   27.360950] 
[   27.361225] Memory state around the buggy address:
[   27.361753]  ffff888100aa1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.362671]  ffff888100aa1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.363315] >ffff888100aa1880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.364087]                                                  ^
[   27.364595]  ffff888100aa1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.365215]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.366206] ==================================================================
[   27.487742] ==================================================================
[   27.488145] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   27.489553] Write of size 1 at addr ffff888100aa18eb by task kunit_try_catch/165
[   27.490513] 
[   27.490749] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.492058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.492828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.494275] Call Trace:
[   27.494581]  <TASK>
[   27.494985]  dump_stack_lvl+0x73/0xb0
[   27.495782]  print_report+0xd1/0x640
[   27.496493]  ? __virt_addr_valid+0x1db/0x2d0
[   27.497497]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.498055]  kasan_report+0x102/0x140
[   27.498611]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.499426]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.500407]  __asan_report_store1_noabort+0x1b/0x30
[   27.500895]  krealloc_less_oob_helper+0xd49/0x11d0
[   27.501933]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.502537]  ? finish_task_switch.isra.0+0x153/0x700
[   27.503273]  ? __switch_to+0x5d9/0xf60
[   27.503980]  ? __schedule+0xc3e/0x2790
[   27.504587]  ? __pfx_read_tsc+0x10/0x10
[   27.505210]  krealloc_less_oob+0x1c/0x30
[   27.505746]  kunit_try_run_case+0x1b3/0x490
[   27.506581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.507483]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.508157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.508744]  ? __kthread_parkme+0x82/0x160
[   27.509515]  ? preempt_count_sub+0x50/0x80
[   27.510024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.510719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.511477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.512321]  kthread+0x257/0x310
[   27.512773]  ? __pfx_kthread+0x10/0x10
[   27.513496]  ret_from_fork+0x41/0x80
[   27.514153]  ? __pfx_kthread+0x10/0x10
[   27.514527]  ret_from_fork_asm+0x1a/0x30
[   27.515091]  </TASK>
[   27.515342] 
[   27.515529] Allocated by task 165:
[   27.516591]  kasan_save_stack+0x3d/0x60
[   27.517113]  kasan_save_track+0x18/0x40
[   27.517982]  kasan_save_alloc_info+0x3b/0x50
[   27.518518]  __kasan_krealloc+0x190/0x1f0
[   27.519417]  krealloc_noprof+0xf3/0x340
[   27.520527]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.521458]  krealloc_less_oob+0x1c/0x30
[   27.522213]  kunit_try_run_case+0x1b3/0x490
[   27.522632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.523767]  kthread+0x257/0x310
[   27.524173]  ret_from_fork+0x41/0x80
[   27.524941]  ret_from_fork_asm+0x1a/0x30
[   27.525402] 
[   27.525556] The buggy address belongs to the object at ffff888100aa1800
[   27.525556]  which belongs to the cache kmalloc-256 of size 256
[   27.527277] The buggy address is located 34 bytes to the right of
[   27.527277]  allocated 201-byte region [ffff888100aa1800, ffff888100aa18c9)
[   27.529456] 
[   27.529650] The buggy address belongs to the physical page:
[   27.530272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   27.531196] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.532411] flags: 0x200000000000040(head|node=0|zone=2)
[   27.533314] page_type: f5(slab)
[   27.533545] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.534336] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.535885] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.536732] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.537422] head: 0200000000000001 ffffea000402a801 ffffffffffffffff 0000000000000000
[   27.538450] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.539309] page dumped because: kasan: bad access detected
[   27.539947] 
[   27.540418] Memory state around the buggy address:
[   27.540748]  ffff888100aa1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.542113]  ffff888100aa1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.543011] >ffff888100aa1880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.543806]                                                           ^
[   27.544995]  ffff888100aa1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.545852]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.546978] ==================================================================
[   27.746400] ==================================================================
[   27.747291] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   27.748067] Write of size 1 at addr ffff8881023260da by task kunit_try_catch/169
[   27.748603] 
[   27.749157] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.749886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.750745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.751647] Call Trace:
[   27.752045]  <TASK>
[   27.752404]  dump_stack_lvl+0x73/0xb0
[   27.753438]  print_report+0xd1/0x640
[   27.753861]  ? __virt_addr_valid+0x1db/0x2d0
[   27.754518]  ? kasan_addr_to_slab+0x11/0xa0
[   27.755018]  kasan_report+0x102/0x140
[   27.755495]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.756492]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.757065]  __asan_report_store1_noabort+0x1b/0x30
[   27.757669]  krealloc_less_oob_helper+0xec8/0x11d0
[   27.758026]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.759107]  ? finish_task_switch.isra.0+0x153/0x700
[   27.759721]  ? __switch_to+0x5d9/0xf60
[   27.760492]  ? __schedule+0xc3e/0x2790
[   27.761039]  ? __pfx_read_tsc+0x10/0x10
[   27.761543]  krealloc_large_less_oob+0x1c/0x30
[   27.761971]  kunit_try_run_case+0x1b3/0x490
[   27.762308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.762871]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.763334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.764130]  ? __kthread_parkme+0x82/0x160
[   27.764608]  ? preempt_count_sub+0x50/0x80
[   27.765577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.766253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.766971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.767614]  kthread+0x257/0x310
[   27.768208]  ? __pfx_kthread+0x10/0x10
[   27.768549]  ret_from_fork+0x41/0x80
[   27.769304]  ? __pfx_kthread+0x10/0x10
[   27.770200]  ret_from_fork_asm+0x1a/0x30
[   27.770813]  </TASK>
[   27.771114] 
[   27.771414] The buggy address belongs to the physical page:
[   27.772133] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324
[   27.772891] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.773664] flags: 0x200000000000040(head|node=0|zone=2)
[   27.774634] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.775275] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.776363] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.777111] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.778650] head: 0200000000000002 ffffea000408c901 ffffffffffffffff 0000000000000000
[   27.779333] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.780230] page dumped because: kasan: bad access detected
[   27.780935] 
[   27.781120] Memory state around the buggy address:
[   27.781596]  ffff888102325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.782257]  ffff888102326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.784200] >ffff888102326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.785323]                                                     ^
[   27.786016]  ffff888102326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.787074]  ffff888102326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.787859] ==================================================================
[   27.789933] ==================================================================
[   27.791259] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   27.792249] Write of size 1 at addr ffff8881023260ea by task kunit_try_catch/169
[   27.793790] 
[   27.794422] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.795611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.796332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.797668] Call Trace:
[   27.798247]  <TASK>
[   27.798642]  dump_stack_lvl+0x73/0xb0
[   27.799345]  print_report+0xd1/0x640
[   27.800040]  ? __virt_addr_valid+0x1db/0x2d0
[   27.800843]  ? kasan_addr_to_slab+0x11/0xa0
[   27.801665]  kasan_report+0x102/0x140
[   27.802303]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.803233]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.803642]  __asan_report_store1_noabort+0x1b/0x30
[   27.804448]  krealloc_less_oob_helper+0xe92/0x11d0
[   27.805058]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.805454]  ? finish_task_switch.isra.0+0x153/0x700
[   27.806341]  ? __switch_to+0x5d9/0xf60
[   27.807233]  ? __schedule+0xc3e/0x2790
[   27.807785]  ? __pfx_read_tsc+0x10/0x10
[   27.808280]  krealloc_large_less_oob+0x1c/0x30
[   27.808885]  kunit_try_run_case+0x1b3/0x490
[   27.809935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.810607]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.811167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.811957]  ? __kthread_parkme+0x82/0x160
[   27.812634]  ? preempt_count_sub+0x50/0x80
[   27.812985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.813934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.814792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.815365]  kthread+0x257/0x310
[   27.815997]  ? __pfx_kthread+0x10/0x10
[   27.816361]  ret_from_fork+0x41/0x80
[   27.816955]  ? __pfx_kthread+0x10/0x10
[   27.817994]  ret_from_fork_asm+0x1a/0x30
[   27.818556]  </TASK>
[   27.819003] 
[   27.819404] The buggy address belongs to the physical page:
[   27.819945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324
[   27.821006] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.822253] flags: 0x200000000000040(head|node=0|zone=2)
[   27.822754] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.823755] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.824408] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.825547] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.826346] head: 0200000000000002 ffffea000408c901 ffffffffffffffff 0000000000000000
[   27.827278] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.827964] page dumped because: kasan: bad access detected
[   27.828585] 
[   27.828838] Memory state around the buggy address:
[   27.829268]  ffff888102325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.829853]  ffff888102326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.830468] >ffff888102326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.831587]                                                           ^
[   27.832410]  ffff888102326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.833126]  ffff888102326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.833936] ==================================================================
[   27.836021] ==================================================================
[   27.837179] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   27.837807] Write of size 1 at addr ffff8881023260eb by task kunit_try_catch/169
[   27.838594] 
[   27.838845] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.839879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.840300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.841530] Call Trace:
[   27.841825]  <TASK>
[   27.842264]  dump_stack_lvl+0x73/0xb0
[   27.842740]  print_report+0xd1/0x640
[   27.843313]  ? __virt_addr_valid+0x1db/0x2d0
[   27.843811]  ? kasan_addr_to_slab+0x11/0xa0
[   27.844472]  kasan_report+0x102/0x140
[   27.844910]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.846047]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.846556]  __asan_report_store1_noabort+0x1b/0x30
[   27.847266]  krealloc_less_oob_helper+0xd49/0x11d0
[   27.847916]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.848446]  ? finish_task_switch.isra.0+0x153/0x700
[   27.849227]  ? __switch_to+0x5d9/0xf60
[   27.849587]  ? __schedule+0xc3e/0x2790
[   27.850465]  ? __pfx_read_tsc+0x10/0x10
[   27.851079]  krealloc_large_less_oob+0x1c/0x30
[   27.851729]  kunit_try_run_case+0x1b3/0x490
[   27.852387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.852992]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.853383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.853734]  ? __kthread_parkme+0x82/0x160
[   27.854791]  ? preempt_count_sub+0x50/0x80
[   27.855508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.856094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.856859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.857296]  kthread+0x257/0x310
[   27.857559]  ? __pfx_kthread+0x10/0x10
[   27.858066]  ret_from_fork+0x41/0x80
[   27.859074]  ? __pfx_kthread+0x10/0x10
[   27.859498]  ret_from_fork_asm+0x1a/0x30
[   27.860274]  </TASK>
[   27.860462] 
[   27.860779] The buggy address belongs to the physical page:
[   27.861410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324
[   27.862559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.863030] flags: 0x200000000000040(head|node=0|zone=2)
[   27.863854] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.864642] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.865404] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.866166] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.867480] head: 0200000000000002 ffffea000408c901 ffffffffffffffff 0000000000000000
[   27.868325] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.869398] page dumped because: kasan: bad access detected
[   27.869910] 
[   27.870055] Memory state around the buggy address:
[   27.871383]  ffff888102325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.872027]  ffff888102326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.873319] >ffff888102326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.874010]                                                           ^
[   27.875627]  ffff888102326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.876219]  ffff888102326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.877248] ==================================================================
[   27.431656] ==================================================================
[   27.432311] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   27.433342] Write of size 1 at addr ffff888100aa18ea by task kunit_try_catch/165
[   27.434432] 
[   27.434836] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.436161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.436890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.438086] Call Trace:
[   27.438436]  <TASK>
[   27.438931]  dump_stack_lvl+0x73/0xb0
[   27.439677]  print_report+0xd1/0x640
[   27.440155]  ? __virt_addr_valid+0x1db/0x2d0
[   27.440839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.441701]  kasan_report+0x102/0x140
[   27.442182]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.442910]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.443528]  __asan_report_store1_noabort+0x1b/0x30
[   27.444373]  krealloc_less_oob_helper+0xe92/0x11d0
[   27.445106]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.445880]  ? finish_task_switch.isra.0+0x153/0x700
[   27.446379]  ? __switch_to+0x5d9/0xf60
[   27.447053]  ? __schedule+0xc3e/0x2790
[   27.447869]  ? __pfx_read_tsc+0x10/0x10
[   27.448501]  krealloc_less_oob+0x1c/0x30
[   27.449081]  kunit_try_run_case+0x1b3/0x490
[   27.449513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.450094]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.450528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.451180]  ? __kthread_parkme+0x82/0x160
[   27.451476]  ? preempt_count_sub+0x50/0x80
[   27.452513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.453820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.454824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.455893]  kthread+0x257/0x310
[   27.456381]  ? __pfx_kthread+0x10/0x10
[   27.457025]  ret_from_fork+0x41/0x80
[   27.457487]  ? __pfx_kthread+0x10/0x10
[   27.458142]  ret_from_fork_asm+0x1a/0x30
[   27.458775]  </TASK>
[   27.458985] 
[   27.459231] Allocated by task 165:
[   27.460113]  kasan_save_stack+0x3d/0x60
[   27.460607]  kasan_save_track+0x18/0x40
[   27.461311]  kasan_save_alloc_info+0x3b/0x50
[   27.461683]  __kasan_krealloc+0x190/0x1f0
[   27.462514]  krealloc_noprof+0xf3/0x340
[   27.462883]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.463533]  krealloc_less_oob+0x1c/0x30
[   27.464480]  kunit_try_run_case+0x1b3/0x490
[   27.465301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.465750]  kthread+0x257/0x310
[   27.466133]  ret_from_fork+0x41/0x80
[   27.466659]  ret_from_fork_asm+0x1a/0x30
[   27.467406] 
[   27.467724] The buggy address belongs to the object at ffff888100aa1800
[   27.467724]  which belongs to the cache kmalloc-256 of size 256
[   27.469113] The buggy address is located 33 bytes to the right of
[   27.469113]  allocated 201-byte region [ffff888100aa1800, ffff888100aa18c9)
[   27.470325] 
[   27.470576] The buggy address belongs to the physical page:
[   27.471648] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   27.472351] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.473190] flags: 0x200000000000040(head|node=0|zone=2)
[   27.474073] page_type: f5(slab)
[   27.474315] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.475315] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.476311] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.477071] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.477946] head: 0200000000000001 ffffea000402a801 ffffffffffffffff 0000000000000000
[   27.478638] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.479475] page dumped because: kasan: bad access detected
[   27.480584] 
[   27.480833] Memory state around the buggy address:
[   27.481216]  ffff888100aa1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.482199]  ffff888100aa1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.483079] >ffff888100aa1880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.484251]                                                           ^
[   27.485009]  ffff888100aa1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.486023]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.486816] ==================================================================
[   27.370043] ==================================================================
[   27.370718] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   27.371595] Write of size 1 at addr ffff888100aa18da by task kunit_try_catch/165
[   27.372870] 
[   27.373237] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.374620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.375141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.376211] Call Trace:
[   27.376804]  <TASK>
[   27.377423]  dump_stack_lvl+0x73/0xb0
[   27.377947]  print_report+0xd1/0x640
[   27.378634]  ? __virt_addr_valid+0x1db/0x2d0
[   27.379407]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.380070]  kasan_report+0x102/0x140
[   27.380638]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.381359]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.381866]  __asan_report_store1_noabort+0x1b/0x30
[   27.382890]  krealloc_less_oob_helper+0xec8/0x11d0
[   27.383705]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.384511]  ? finish_task_switch.isra.0+0x153/0x700
[   27.385063]  ? __switch_to+0x5d9/0xf60
[   27.385622]  ? __schedule+0xc3e/0x2790
[   27.386441]  ? __pfx_read_tsc+0x10/0x10
[   27.387075]  krealloc_less_oob+0x1c/0x30
[   27.387780]  kunit_try_run_case+0x1b3/0x490
[   27.388331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.389053]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.389425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.390233]  ? __kthread_parkme+0x82/0x160
[   27.390681]  ? preempt_count_sub+0x50/0x80
[   27.391103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.391559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.392642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.393531]  kthread+0x257/0x310
[   27.394204]  ? __pfx_kthread+0x10/0x10
[   27.394785]  ret_from_fork+0x41/0x80
[   27.395366]  ? __pfx_kthread+0x10/0x10
[   27.395940]  ret_from_fork_asm+0x1a/0x30
[   27.396569]  </TASK>
[   27.396972] 
[   27.397568] Allocated by task 165:
[   27.397956]  kasan_save_stack+0x3d/0x60
[   27.398765]  kasan_save_track+0x18/0x40
[   27.399386]  kasan_save_alloc_info+0x3b/0x50
[   27.399803]  __kasan_krealloc+0x190/0x1f0
[   27.400511]  krealloc_noprof+0xf3/0x340
[   27.401053]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.401897]  krealloc_less_oob+0x1c/0x30
[   27.402735]  kunit_try_run_case+0x1b3/0x490
[   27.403386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.404070]  kthread+0x257/0x310
[   27.404579]  ret_from_fork+0x41/0x80
[   27.405060]  ret_from_fork_asm+0x1a/0x30
[   27.405884] 
[   27.406206] The buggy address belongs to the object at ffff888100aa1800
[   27.406206]  which belongs to the cache kmalloc-256 of size 256
[   27.408118] The buggy address is located 17 bytes to the right of
[   27.408118]  allocated 201-byte region [ffff888100aa1800, ffff888100aa18c9)
[   27.409293] 
[   27.409466] The buggy address belongs to the physical page:
[   27.410532] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa0
[   27.410959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.411329] flags: 0x200000000000040(head|node=0|zone=2)
[   27.411621] page_type: f5(slab)
[   27.411883] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.412565] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.413661] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.414446] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.417060] head: 0200000000000001 ffffea000402a801 ffffffffffffffff 0000000000000000
[   27.419868] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.420240] page dumped because: kasan: bad access detected
[   27.420521] 
[   27.420653] Memory state around the buggy address:
[   27.420950]  ffff888100aa1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.421314]  ffff888100aa1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.421669] >ffff888100aa1880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.425415]                                                     ^
[   27.427140]  ffff888100aa1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.428761]  ffff888100aa1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.430199] ==================================================================
[   27.653765] ==================================================================
[   27.655056] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   27.655584] Write of size 1 at addr ffff8881023260c9 by task kunit_try_catch/169
[   27.656672] 
[   27.656993] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.658675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.659445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.660334] Call Trace:
[   27.660794]  <TASK>
[   27.661075]  dump_stack_lvl+0x73/0xb0
[   27.661579]  print_report+0xd1/0x640
[   27.662374]  ? __virt_addr_valid+0x1db/0x2d0
[   27.662967]  ? kasan_addr_to_slab+0x11/0xa0
[   27.663385]  kasan_report+0x102/0x140
[   27.663966]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   27.664535]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   27.665358]  __asan_report_store1_noabort+0x1b/0x30
[   27.665866]  krealloc_less_oob_helper+0xd72/0x11d0
[   27.666761]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.667415]  ? finish_task_switch.isra.0+0x153/0x700
[   27.667998]  ? __switch_to+0x5d9/0xf60
[   27.668481]  ? __schedule+0xc3e/0x2790
[   27.669059]  ? __pfx_read_tsc+0x10/0x10
[   27.669620]  krealloc_large_less_oob+0x1c/0x30
[   27.670210]  kunit_try_run_case+0x1b3/0x490
[   27.671026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.671650]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.672271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.672681]  ? __kthread_parkme+0x82/0x160
[   27.673395]  ? preempt_count_sub+0x50/0x80
[   27.673873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.674657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.675307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.675963]  kthread+0x257/0x310
[   27.676284]  ? __pfx_kthread+0x10/0x10
[   27.676538]  ret_from_fork+0x41/0x80
[   27.679304]  ? __pfx_kthread+0x10/0x10
[   27.680375]  ret_from_fork_asm+0x1a/0x30
[   27.681626]  </TASK>
[   27.682334] 
[   27.682497] The buggy address belongs to the physical page:
[   27.684194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324
[   27.686035] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.688148] flags: 0x200000000000040(head|node=0|zone=2)
[   27.689195] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.689591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.691538] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.692072] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.693483] head: 0200000000000002 ffffea000408c901 ffffffffffffffff 0000000000000000
[   27.693991] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.695042] page dumped because: kasan: bad access detected
[   27.695574] 
[   27.696494] Memory state around the buggy address:
[   27.697565]  ffff888102325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.698501]  ffff888102326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.699404] >ffff888102326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.700940]                                               ^
[   27.701758]  ffff888102326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.703079]  ffff888102326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.703915] ==================================================================
[   27.704961] ==================================================================
[   27.706450] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   27.708568] Write of size 1 at addr ffff8881023260d0 by task kunit_try_catch/169
[   27.709323] 
[   27.709530] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   27.710978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.711722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.713081] Call Trace:
[   27.713764]  <TASK>
[   27.714215]  dump_stack_lvl+0x73/0xb0
[   27.714885]  print_report+0xd1/0x640
[   27.715566]  ? __virt_addr_valid+0x1db/0x2d0
[   27.716033]  ? kasan_addr_to_slab+0x11/0xa0
[   27.716515]  kasan_report+0x102/0x140
[   27.716886]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.717291]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.718040]  __asan_report_store1_noabort+0x1b/0x30
[   27.718562]  krealloc_less_oob_helper+0xe25/0x11d0
[   27.719343]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.719924]  ? finish_task_switch.isra.0+0x153/0x700
[   27.720590]  ? __switch_to+0x5d9/0xf60
[   27.721235]  ? __schedule+0xc3e/0x2790
[   27.721534]  ? __pfx_read_tsc+0x10/0x10
[   27.722207]  krealloc_large_less_oob+0x1c/0x30
[   27.722624]  kunit_try_run_case+0x1b3/0x490
[   27.723462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.723877]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.724527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.725066]  ? __kthread_parkme+0x82/0x160
[   27.725709]  ? preempt_count_sub+0x50/0x80
[   27.726245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.726619]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.727541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.728229]  kthread+0x257/0x310
[   27.728583]  ? __pfx_kthread+0x10/0x10
[   27.728954]  ret_from_fork+0x41/0x80
[   27.729535]  ? __pfx_kthread+0x10/0x10
[   27.729951]  ret_from_fork_asm+0x1a/0x30
[   27.730524]  </TASK>
[   27.730854] 
[   27.731077] The buggy address belongs to the physical page:
[   27.731603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324
[   27.732131] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.733211] flags: 0x200000000000040(head|node=0|zone=2)
[   27.733917] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.734745] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.735469] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.736455] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.737005] head: 0200000000000002 ffffea000408c901 ffffffffffffffff 0000000000000000
[   27.737649] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.738269] page dumped because: kasan: bad access detected
[   27.738755] 
[   27.738966] Memory state around the buggy address:
[   27.739559]  ffff888102325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.740577]  ffff888102326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.741422] >ffff888102326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.742048]                                                  ^
[   27.742450]  ffff888102326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.743352]  ffff888102326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.744030] ==================================================================