Hay
Date
Dec. 3, 2024, 11:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.102312] ==================================================================
[   30.103165] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.103999] Write of size 1 at addr fff00000c65520ea by task kunit_try_catch/151
[   30.104849] 
[   30.105378] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.106735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.107763] Hardware name: linux,dummy-virt (DT)
[   30.109348] Call trace:
[   30.109739]  show_stack+0x20/0x38 (C)
[   30.110348]  dump_stack_lvl+0x8c/0xd0
[   30.111152]  print_report+0x118/0x5e0
[   30.111893]  kasan_report+0xc8/0x118
[   30.112547]  __asan_report_store1_noabort+0x20/0x30
[   30.113189]  krealloc_less_oob_helper+0xae4/0xc50
[   30.113916]  krealloc_large_less_oob+0x20/0x38
[   30.114673]  kunit_try_run_case+0x14c/0x3d0
[   30.115486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.116446]  kthread+0x24c/0x2d0
[   30.117189]  ret_from_fork+0x10/0x20
[   30.118157] 
[   30.118679] The buggy address belongs to the physical page:
[   30.120104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.121427] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.122594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.123891] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.125034] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.126167] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.127425] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.128443] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.129410] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.130473] page dumped because: kasan: bad access detected
[   30.131315] 
[   30.131834] Memory state around the buggy address:
[   30.132306]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.133816]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.134252] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.135657]                                                           ^
[   30.136713]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.137667]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.138705] ==================================================================
[   29.757363] ==================================================================
[   29.758213] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.759210] Write of size 1 at addr fff00000c09752da by task kunit_try_catch/147
[   29.760531] 
[   29.760822] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.762011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.762907] Hardware name: linux,dummy-virt (DT)
[   29.763745] Call trace:
[   29.764317]  show_stack+0x20/0x38 (C)
[   29.765129]  dump_stack_lvl+0x8c/0xd0
[   29.765935]  print_report+0x118/0x5e0
[   29.766714]  kasan_report+0xc8/0x118
[   29.767510]  __asan_report_store1_noabort+0x20/0x30
[   29.768406]  krealloc_less_oob_helper+0xa80/0xc50
[   29.769271]  krealloc_less_oob+0x20/0x38
[   29.770047]  kunit_try_run_case+0x14c/0x3d0
[   29.770891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.771860]  kthread+0x24c/0x2d0
[   29.772384]  ret_from_fork+0x10/0x20
[   29.772936] 
[   29.773246] Allocated by task 147:
[   29.773765]  kasan_save_stack+0x3c/0x68
[   29.774393]  kasan_save_track+0x20/0x40
[   29.775406]  kasan_save_alloc_info+0x40/0x58
[   29.776051]  __kasan_krealloc+0x118/0x178
[   29.776944]  krealloc_noprof+0x128/0x360
[   29.777600]  krealloc_less_oob_helper+0x168/0xc50
[   29.778529]  krealloc_less_oob+0x20/0x38
[   29.779254]  kunit_try_run_case+0x14c/0x3d0
[   29.779902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.780952]  kthread+0x24c/0x2d0
[   29.781704]  ret_from_fork+0x10/0x20
[   29.782404] 
[   29.782959] The buggy address belongs to the object at fff00000c0975200
[   29.782959]  which belongs to the cache kmalloc-256 of size 256
[   29.784612] The buggy address is located 17 bytes to the right of
[   29.784612]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.786578] 
[   29.787068] The buggy address belongs to the physical page:
[   29.787972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.789006] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.790106] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.791169] page_type: f5(slab)
[   29.791748] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.792851] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.793814] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.794836] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.795831] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.796831] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.797814] page dumped because: kasan: bad access detected
[   29.798593] 
[   29.798927] Memory state around the buggy address:
[   29.799706]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.800675]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.801615] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.802576]                                                     ^
[   29.803368]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.804414]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.805305] ==================================================================
[   29.702514] ==================================================================
[   29.703112] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.704165] Write of size 1 at addr fff00000c09752d0 by task kunit_try_catch/147
[   29.705174] 
[   29.705669] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.707212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.708392] Hardware name: linux,dummy-virt (DT)
[   29.709407] Call trace:
[   29.710432]  show_stack+0x20/0x38 (C)
[   29.711249]  dump_stack_lvl+0x8c/0xd0
[   29.712113]  print_report+0x118/0x5e0
[   29.712712]  kasan_report+0xc8/0x118
[   29.713221]  __asan_report_store1_noabort+0x20/0x30
[   29.713942]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.714682]  krealloc_less_oob+0x20/0x38
[   29.715398]  kunit_try_run_case+0x14c/0x3d0
[   29.716815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717191]  kthread+0x24c/0x2d0
[   29.717841]  ret_from_fork+0x10/0x20
[   29.718378] 
[   29.718770] Allocated by task 147:
[   29.719859]  kasan_save_stack+0x3c/0x68
[   29.720431]  kasan_save_track+0x20/0x40
[   29.721072]  kasan_save_alloc_info+0x40/0x58
[   29.721774]  __kasan_krealloc+0x118/0x178
[   29.722375]  krealloc_noprof+0x128/0x360
[   29.722998]  krealloc_less_oob_helper+0x168/0xc50
[   29.724163]  krealloc_less_oob+0x20/0x38
[   29.724688]  kunit_try_run_case+0x14c/0x3d0
[   29.725585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.726493]  kthread+0x24c/0x2d0
[   29.727145]  ret_from_fork+0x10/0x20
[   29.727994] 
[   29.728362] The buggy address belongs to the object at fff00000c0975200
[   29.728362]  which belongs to the cache kmalloc-256 of size 256
[   29.729821] The buggy address is located 7 bytes to the right of
[   29.729821]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.731393] 
[   29.732068] The buggy address belongs to the physical page:
[   29.732922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.733969] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.735238] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.736195] page_type: f5(slab)
[   29.736705] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.737811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.738941] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.740372] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.741531] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.742727] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.744098] page dumped because: kasan: bad access detected
[   29.745103] 
[   29.745437] Memory state around the buggy address:
[   29.745984]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746882]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.748484] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.749719]                                                  ^
[   29.750386]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.752202]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.753894] ==================================================================
[   29.646498] ==================================================================
[   29.647733] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.649605] Write of size 1 at addr fff00000c09752c9 by task kunit_try_catch/147
[   29.650548] 
[   29.650845] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.652198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.653109] Hardware name: linux,dummy-virt (DT)
[   29.653715] Call trace:
[   29.654160]  show_stack+0x20/0x38 (C)
[   29.654899]  dump_stack_lvl+0x8c/0xd0
[   29.655482]  print_report+0x118/0x5e0
[   29.656096]  kasan_report+0xc8/0x118
[   29.656655]  __asan_report_store1_noabort+0x20/0x30
[   29.657252]  krealloc_less_oob_helper+0xa48/0xc50
[   29.658909]  krealloc_less_oob+0x20/0x38
[   29.660183]  kunit_try_run_case+0x14c/0x3d0
[   29.661637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.662807]  kthread+0x24c/0x2d0
[   29.663448]  ret_from_fork+0x10/0x20
[   29.664671] 
[   29.664927] Allocated by task 147:
[   29.665243]  kasan_save_stack+0x3c/0x68
[   29.665786]  kasan_save_track+0x20/0x40
[   29.666956]  kasan_save_alloc_info+0x40/0x58
[   29.667723]  __kasan_krealloc+0x118/0x178
[   29.668297]  krealloc_noprof+0x128/0x360
[   29.668775]  krealloc_less_oob_helper+0x168/0xc50
[   29.669568]  krealloc_less_oob+0x20/0x38
[   29.670052]  kunit_try_run_case+0x14c/0x3d0
[   29.670756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.671806]  kthread+0x24c/0x2d0
[   29.672233]  ret_from_fork+0x10/0x20
[   29.673833] 
[   29.674092] The buggy address belongs to the object at fff00000c0975200
[   29.674092]  which belongs to the cache kmalloc-256 of size 256
[   29.675994] The buggy address is located 0 bytes to the right of
[   29.675994]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.678178] 
[   29.678505] The buggy address belongs to the physical page:
[   29.679283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.680399] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.681387] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.682223] page_type: f5(slab)
[   29.683104] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.684097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.685472] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.686298] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.687355] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.688346] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.689261] page dumped because: kasan: bad access detected
[   29.690195] 
[   29.690695] Memory state around the buggy address:
[   29.692157]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.694029]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.695959] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.697700]                                               ^
[   29.698564]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.699917]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700855] ==================================================================
[   30.066437] ==================================================================
[   30.067304] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.068523] Write of size 1 at addr fff00000c65520da by task kunit_try_catch/151
[   30.069353] 
[   30.069814] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.071072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.072381] Hardware name: linux,dummy-virt (DT)
[   30.072997] Call trace:
[   30.073432]  show_stack+0x20/0x38 (C)
[   30.074138]  dump_stack_lvl+0x8c/0xd0
[   30.075708]  print_report+0x118/0x5e0
[   30.076784]  kasan_report+0xc8/0x118
[   30.077112]  __asan_report_store1_noabort+0x20/0x30
[   30.077575]  krealloc_less_oob_helper+0xa80/0xc50
[   30.078631]  krealloc_large_less_oob+0x20/0x38
[   30.079402]  kunit_try_run_case+0x14c/0x3d0
[   30.080234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.081005]  kthread+0x24c/0x2d0
[   30.081939]  ret_from_fork+0x10/0x20
[   30.082421] 
[   30.082700] The buggy address belongs to the physical page:
[   30.084165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.085104] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.085971] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.086915] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.087859] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.088806] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.090001] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.090875] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.092181] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.093392] page dumped because: kasan: bad access detected
[   30.093994] 
[   30.094363] Memory state around the buggy address:
[   30.094941]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.095877]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.096783] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.098361]                                                     ^
[   30.099081]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.099739]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.100894] ==================================================================
[   29.989973] ==================================================================
[   29.991671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.992869] Write of size 1 at addr fff00000c65520c9 by task kunit_try_catch/151
[   29.994232] 
[   29.994601] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.996017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.996320] Hardware name: linux,dummy-virt (DT)
[   29.996937] Call trace:
[   29.997360]  show_stack+0x20/0x38 (C)
[   29.997888]  dump_stack_lvl+0x8c/0xd0
[   29.998631]  print_report+0x118/0x5e0
[   29.999717]  kasan_report+0xc8/0x118
[   30.000801]  __asan_report_store1_noabort+0x20/0x30
[   30.001514]  krealloc_less_oob_helper+0xa48/0xc50
[   30.002156]  krealloc_large_less_oob+0x20/0x38
[   30.002854]  kunit_try_run_case+0x14c/0x3d0
[   30.003629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.004436]  kthread+0x24c/0x2d0
[   30.005171]  ret_from_fork+0x10/0x20
[   30.005972] 
[   30.006278] The buggy address belongs to the physical page:
[   30.007316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.008955] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.009499] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.010726] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.012171] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.013204] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.014216] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.015207] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.016531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.017468] page dumped because: kasan: bad access detected
[   30.018203] 
[   30.018559] Memory state around the buggy address:
[   30.019420]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.020601]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.021178] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.022072]                                               ^
[   30.023021]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.024202]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.025137] ==================================================================
[   29.809682] ==================================================================
[   29.810530] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.811607] Write of size 1 at addr fff00000c09752ea by task kunit_try_catch/147
[   29.812708] 
[   29.813048] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.814461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.815136] Hardware name: linux,dummy-virt (DT)
[   29.815733] Call trace:
[   29.815958]  show_stack+0x20/0x38 (C)
[   29.816257]  dump_stack_lvl+0x8c/0xd0
[   29.816896]  print_report+0x118/0x5e0
[   29.817572]  kasan_report+0xc8/0x118
[   29.818374]  __asan_report_store1_noabort+0x20/0x30
[   29.819262]  krealloc_less_oob_helper+0xae4/0xc50
[   29.820185]  krealloc_less_oob+0x20/0x38
[   29.821213]  kunit_try_run_case+0x14c/0x3d0
[   29.821690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.822259]  kthread+0x24c/0x2d0
[   29.822893]  ret_from_fork+0x10/0x20
[   29.823836] 
[   29.824243] Allocated by task 147:
[   29.824906]  kasan_save_stack+0x3c/0x68
[   29.825575]  kasan_save_track+0x20/0x40
[   29.826279]  kasan_save_alloc_info+0x40/0x58
[   29.827004]  __kasan_krealloc+0x118/0x178
[   29.827693]  krealloc_noprof+0x128/0x360
[   29.828481]  krealloc_less_oob_helper+0x168/0xc50
[   29.829105]  krealloc_less_oob+0x20/0x38
[   29.829682]  kunit_try_run_case+0x14c/0x3d0
[   29.830371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.831085]  kthread+0x24c/0x2d0
[   29.831664]  ret_from_fork+0x10/0x20
[   29.832203] 
[   29.832585] The buggy address belongs to the object at fff00000c0975200
[   29.832585]  which belongs to the cache kmalloc-256 of size 256
[   29.834038] The buggy address is located 33 bytes to the right of
[   29.834038]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.835642] 
[   29.836089] The buggy address belongs to the physical page:
[   29.836870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.837974] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.838928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.839816] page_type: f5(slab)
[   29.840429] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.841435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.842484] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.843502] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.844283] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.845272] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.846244] page dumped because: kasan: bad access detected
[   29.847004] 
[   29.847402] Memory state around the buggy address:
[   29.848129]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.849096]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.850027] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.850959]                                                           ^
[   29.851819]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.852783]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.853691] ==================================================================
[   29.855723] ==================================================================
[   29.856607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.857579] Write of size 1 at addr fff00000c09752eb by task kunit_try_catch/147
[   29.858643] 
[   29.859177] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.861246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.861895] Hardware name: linux,dummy-virt (DT)
[   29.862685] Call trace:
[   29.863101]  show_stack+0x20/0x38 (C)
[   29.863876]  dump_stack_lvl+0x8c/0xd0
[   29.864531]  print_report+0x118/0x5e0
[   29.865151]  kasan_report+0xc8/0x118
[   29.865752]  __asan_report_store1_noabort+0x20/0x30
[   29.866529]  krealloc_less_oob_helper+0xa58/0xc50
[   29.867389]  krealloc_less_oob+0x20/0x38
[   29.868040]  kunit_try_run_case+0x14c/0x3d0
[   29.868805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.869604]  kthread+0x24c/0x2d0
[   29.870253]  ret_from_fork+0x10/0x20
[   29.870936] 
[   29.871210] Allocated by task 147:
[   29.871800]  kasan_save_stack+0x3c/0x68
[   29.872394]  kasan_save_track+0x20/0x40
[   29.872890]  kasan_save_alloc_info+0x40/0x58
[   29.873629]  __kasan_krealloc+0x118/0x178
[   29.874344]  krealloc_noprof+0x128/0x360
[   29.875017]  krealloc_less_oob_helper+0x168/0xc50
[   29.875746]  krealloc_less_oob+0x20/0x38
[   29.876385]  kunit_try_run_case+0x14c/0x3d0
[   29.877075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.877931]  kthread+0x24c/0x2d0
[   29.878559]  ret_from_fork+0x10/0x20
[   29.879141] 
[   29.879489] The buggy address belongs to the object at fff00000c0975200
[   29.879489]  which belongs to the cache kmalloc-256 of size 256
[   29.880949] The buggy address is located 34 bytes to the right of
[   29.880949]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.882524] 
[   29.883018] The buggy address belongs to the physical page:
[   29.883793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.884876] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.885849] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.886771] page_type: f5(slab)
[   29.887322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.888387] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.889392] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.890392] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.891355] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.892345] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.893292] page dumped because: kasan: bad access detected
[   29.894074] 
[   29.894429] Memory state around the buggy address:
[   29.895168]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.896179]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.897051] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.897969]                                                           ^
[   29.898863]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.899888]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.900846] ==================================================================
[   30.140666] ==================================================================
[   30.141972] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.142829] Write of size 1 at addr fff00000c65520eb by task kunit_try_catch/151
[   30.144241] 
[   30.144664] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.145867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.146572] Hardware name: linux,dummy-virt (DT)
[   30.147627] Call trace:
[   30.147989]  show_stack+0x20/0x38 (C)
[   30.149273]  dump_stack_lvl+0x8c/0xd0
[   30.149884]  print_report+0x118/0x5e0
[   30.150451]  kasan_report+0xc8/0x118
[   30.150974]  __asan_report_store1_noabort+0x20/0x30
[   30.152033]  krealloc_less_oob_helper+0xa58/0xc50
[   30.152716]  krealloc_large_less_oob+0x20/0x38
[   30.153424]  kunit_try_run_case+0x14c/0x3d0
[   30.154104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.154823]  kthread+0x24c/0x2d0
[   30.156161]  ret_from_fork+0x10/0x20
[   30.156767] 
[   30.157089] The buggy address belongs to the physical page:
[   30.157877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.158823] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.160197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.161237] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.162263] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.163342] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.164733] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.165682] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.166674] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.168149] page dumped because: kasan: bad access detected
[   30.168767] 
[   30.169080] Memory state around the buggy address:
[   30.169616]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.170655]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.171948] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.172986]                                                           ^
[   30.173794]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.174860]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.176281] ==================================================================
[   30.026775] ==================================================================
[   30.028311] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.030817] Write of size 1 at addr fff00000c65520d0 by task kunit_try_catch/151
[   30.032048] 
[   30.032470] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.034444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.035783] Hardware name: linux,dummy-virt (DT)
[   30.036912] Call trace:
[   30.037227]  show_stack+0x20/0x38 (C)
[   30.038063]  dump_stack_lvl+0x8c/0xd0
[   30.038894]  print_report+0x118/0x5e0
[   30.039589]  kasan_report+0xc8/0x118
[   30.040307]  __asan_report_store1_noabort+0x20/0x30
[   30.041169]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.041949]  krealloc_large_less_oob+0x20/0x38
[   30.042740]  kunit_try_run_case+0x14c/0x3d0
[   30.043491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.044438]  kthread+0x24c/0x2d0
[   30.045129]  ret_from_fork+0x10/0x20
[   30.045589] 
[   30.045981] The buggy address belongs to the physical page:
[   30.046832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.047855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.049127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.050094] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.051134] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.052149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.053284] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.054349] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.055261] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.056730] page dumped because: kasan: bad access detected
[   30.057123] 
[   30.057289] Memory state around the buggy address:
[   30.058417]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.059198]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.060301] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.061197]                                                  ^
[   30.061936]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.062800]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.064483] ==================================================================

[   25.407450] ==================================================================
[   25.408249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   25.410138] Write of size 1 at addr ffff8881009a3eea by task kunit_try_catch/167
[   25.411314] 
[   25.412025] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.412908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.413428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.414683] Call Trace:
[   25.414881]  <TASK>
[   25.415094]  dump_stack_lvl+0x73/0xb0
[   25.415512]  print_report+0xd1/0x640
[   25.416945]  ? __virt_addr_valid+0x1db/0x2d0
[   25.417328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.418305]  kasan_report+0x102/0x140
[   25.418646]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   25.419560]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   25.420124]  __asan_report_store1_noabort+0x1b/0x30
[   25.420521]  krealloc_less_oob_helper+0xe92/0x11d0
[   25.421677]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.422087]  ? finish_task_switch.isra.0+0x153/0x700
[   25.422488]  ? __switch_to+0x5d9/0xf60
[   25.423405]  ? __schedule+0xc3e/0x2790
[   25.424200]  ? __pfx_read_tsc+0x10/0x10
[   25.424566]  krealloc_less_oob+0x1c/0x30
[   25.425656]  kunit_try_run_case+0x1b3/0x490
[   25.426002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.426399]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.427432]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.427962]  ? __kthread_parkme+0x82/0x160
[   25.428306]  ? preempt_count_sub+0x50/0x80
[   25.428737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.429600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.429939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.430461]  kthread+0x257/0x310
[   25.431539]  ? __pfx_kthread+0x10/0x10
[   25.432008]  ret_from_fork+0x41/0x80
[   25.432344]  ? __pfx_kthread+0x10/0x10
[   25.432787]  ret_from_fork_asm+0x1a/0x30
[   25.434153]  </TASK>
[   25.434321] 
[   25.434435] Allocated by task 167:
[   25.434742]  kasan_save_stack+0x3d/0x60
[   25.435848]  kasan_save_track+0x18/0x40
[   25.436526]  kasan_save_alloc_info+0x3b/0x50
[   25.437297]  __kasan_krealloc+0x190/0x1f0
[   25.437587]  krealloc_noprof+0xf3/0x340
[   25.437904]  krealloc_less_oob_helper+0x1ab/0x11d0
[   25.438378]  krealloc_less_oob+0x1c/0x30
[   25.439216]  kunit_try_run_case+0x1b3/0x490
[   25.440036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.440864]  kthread+0x257/0x310
[   25.441233]  ret_from_fork+0x41/0x80
[   25.441482]  ret_from_fork_asm+0x1a/0x30
[   25.442039] 
[   25.442270] The buggy address belongs to the object at ffff8881009a3e00
[   25.442270]  which belongs to the cache kmalloc-256 of size 256
[   25.443787] The buggy address is located 33 bytes to the right of
[   25.443787]  allocated 201-byte region [ffff8881009a3e00, ffff8881009a3ec9)
[   25.444563] 
[   25.444832] The buggy address belongs to the physical page:
[   25.445582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2
[   25.446175] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.447483] flags: 0x200000000000040(head|node=0|zone=2)
[   25.448124] page_type: f5(slab)
[   25.448522] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.449195] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.449995] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.450509] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.451779] head: 0200000000000001 ffffea0004026881 ffffffffffffffff 0000000000000000
[   25.452331] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   25.453184] page dumped because: kasan: bad access detected
[   25.453783] 
[   25.453994] Memory state around the buggy address:
[   25.454313]  ffff8881009a3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.454970]  ffff8881009a3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.455419] >ffff8881009a3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.455982]                                                           ^
[   25.457462]  ffff8881009a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.458189]  ffff8881009a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.458902] ==================================================================
[   25.591904] ==================================================================
[   25.592615] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   25.593379] Write of size 1 at addr ffff8881022560c9 by task kunit_try_catch/171
[   25.594029] 
[   25.594282] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.594968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.595331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.596233] Call Trace:
[   25.596491]  <TASK>
[   25.596878]  dump_stack_lvl+0x73/0xb0
[   25.597384]  print_report+0xd1/0x640
[   25.597849]  ? __virt_addr_valid+0x1db/0x2d0
[   25.598298]  ? kasan_addr_to_slab+0x11/0xa0
[   25.598698]  kasan_report+0x102/0x140
[   25.599212]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   25.599741]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   25.600143]  __asan_report_store1_noabort+0x1b/0x30
[   25.600705]  krealloc_less_oob_helper+0xd72/0x11d0
[   25.601032]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.601524]  ? finish_task_switch.isra.0+0x153/0x700
[   25.602169]  ? __switch_to+0x5d9/0xf60
[   25.602610]  ? __schedule+0xc3e/0x2790
[   25.603038]  ? __pfx_read_tsc+0x10/0x10
[   25.603387]  krealloc_large_less_oob+0x1c/0x30
[   25.603915]  kunit_try_run_case+0x1b3/0x490
[   25.604259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.604622]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.604935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.605263]  ? __kthread_parkme+0x82/0x160
[   25.605720]  ? preempt_count_sub+0x50/0x80
[   25.606185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.606719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.607271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.607971]  kthread+0x257/0x310
[   25.608323]  ? __pfx_kthread+0x10/0x10
[   25.608845]  ret_from_fork+0x41/0x80
[   25.609277]  ? __pfx_kthread+0x10/0x10
[   25.609780]  ret_from_fork_asm+0x1a/0x30
[   25.610030]  </TASK>
[   25.610298] 
[   25.610551] The buggy address belongs to the physical page:
[   25.610985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102254
[   25.611401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.611799] flags: 0x200000000000040(head|node=0|zone=2)
[   25.612167] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.612848] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.613996] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.614827] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.616248] head: 0200000000000002 ffffea0004089501 ffffffffffffffff 0000000000000000
[   25.617878] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.619519] page dumped because: kasan: bad access detected
[   25.619937] 
[   25.620671] Memory state around the buggy address:
[   25.621713]  ffff888102255f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.622318]  ffff888102256000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.622780] >ffff888102256080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.623351]                                               ^
[   25.623942]  ffff888102256100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.624406]  ffff888102256180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.625016] ==================================================================
[   25.695025] ==================================================================
[   25.696190] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   25.696839] Write of size 1 at addr ffff8881022560ea by task kunit_try_catch/171
[   25.697352] 
[   25.697599] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.698220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.698607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.699498] Call Trace:
[   25.699874]  <TASK>
[   25.700084]  dump_stack_lvl+0x73/0xb0
[   25.700549]  print_report+0xd1/0x640
[   25.701079]  ? __virt_addr_valid+0x1db/0x2d0
[   25.701563]  ? kasan_addr_to_slab+0x11/0xa0
[   25.702039]  kasan_report+0x102/0x140
[   25.702480]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   25.703555]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   25.703970]  __asan_report_store1_noabort+0x1b/0x30
[   25.704823]  krealloc_less_oob_helper+0xe92/0x11d0
[   25.705292]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.705823]  ? finish_task_switch.isra.0+0x153/0x700
[   25.706301]  ? __switch_to+0x5d9/0xf60
[   25.706873]  ? __schedule+0xc3e/0x2790
[   25.707238]  ? __pfx_read_tsc+0x10/0x10
[   25.707513]  krealloc_large_less_oob+0x1c/0x30
[   25.708600]  kunit_try_run_case+0x1b3/0x490
[   25.709168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.709772]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.710232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.710765]  ? __kthread_parkme+0x82/0x160
[   25.711260]  ? preempt_count_sub+0x50/0x80
[   25.711836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.712214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.712775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.713869]  kthread+0x257/0x310
[   25.714184]  ? __pfx_kthread+0x10/0x10
[   25.714768]  ret_from_fork+0x41/0x80
[   25.715156]  ? __pfx_kthread+0x10/0x10
[   25.715410]  ret_from_fork_asm+0x1a/0x30
[   25.715702]  </TASK>
[   25.715877] 
[   25.716018] The buggy address belongs to the physical page:
[   25.716322] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102254
[   25.717333] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.718190] flags: 0x200000000000040(head|node=0|zone=2)
[   25.720172] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.721540] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.722421] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.723177] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.724558] head: 0200000000000002 ffffea0004089501 ffffffffffffffff 0000000000000000
[   25.725234] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.726310] page dumped because: kasan: bad access detected
[   25.726632] 
[   25.726849] Memory state around the buggy address:
[   25.727656]  ffff888102255f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.728193]  ffff888102256000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.729240] >ffff888102256080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.729714]                                                           ^
[   25.730200]  ffff888102256100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.731113]  ffff888102256180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.732391] ==================================================================
[   25.358196] ==================================================================
[   25.358968] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   25.359809] Write of size 1 at addr ffff8881009a3eda by task kunit_try_catch/167
[   25.360634] 
[   25.361101] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.362234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.362686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.363449] Call Trace:
[   25.363946]  <TASK>
[   25.364520]  dump_stack_lvl+0x73/0xb0
[   25.365078]  print_report+0xd1/0x640
[   25.365412]  ? __virt_addr_valid+0x1db/0x2d0
[   25.366277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.366687]  kasan_report+0x102/0x140
[   25.367384]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   25.368282]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   25.368706]  __asan_report_store1_noabort+0x1b/0x30
[   25.369175]  krealloc_less_oob_helper+0xec8/0x11d0
[   25.369493]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.369988]  ? finish_task_switch.isra.0+0x153/0x700
[   25.371189]  ? __switch_to+0x5d9/0xf60
[   25.372003]  ? __schedule+0xc3e/0x2790
[   25.372301]  ? __pfx_read_tsc+0x10/0x10
[   25.373101]  krealloc_less_oob+0x1c/0x30
[   25.373568]  kunit_try_run_case+0x1b3/0x490
[   25.374219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.375424]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.375879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.376315]  ? __kthread_parkme+0x82/0x160
[   25.376782]  ? preempt_count_sub+0x50/0x80
[   25.377706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.378100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.379043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.379426]  kthread+0x257/0x310
[   25.379774]  ? __pfx_kthread+0x10/0x10
[   25.381159]  ret_from_fork+0x41/0x80
[   25.381481]  ? __pfx_kthread+0x10/0x10
[   25.382084]  ret_from_fork_asm+0x1a/0x30
[   25.382456]  </TASK>
[   25.382866] 
[   25.383029] Allocated by task 167:
[   25.383371]  kasan_save_stack+0x3d/0x60
[   25.383682]  kasan_save_track+0x18/0x40
[   25.383977]  kasan_save_alloc_info+0x3b/0x50
[   25.384415]  __kasan_krealloc+0x190/0x1f0
[   25.385372]  krealloc_noprof+0xf3/0x340
[   25.385740]  krealloc_less_oob_helper+0x1ab/0x11d0
[   25.386098]  krealloc_less_oob+0x1c/0x30
[   25.386785]  kunit_try_run_case+0x1b3/0x490
[   25.387229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.387780]  kthread+0x257/0x310
[   25.388022]  ret_from_fork+0x41/0x80
[   25.388419]  ret_from_fork_asm+0x1a/0x30
[   25.388680] 
[   25.388891] The buggy address belongs to the object at ffff8881009a3e00
[   25.388891]  which belongs to the cache kmalloc-256 of size 256
[   25.390903] The buggy address is located 17 bytes to the right of
[   25.390903]  allocated 201-byte region [ffff8881009a3e00, ffff8881009a3ec9)
[   25.391518] 
[   25.391734] The buggy address belongs to the physical page:
[   25.392288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2
[   25.393001] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.393571] flags: 0x200000000000040(head|node=0|zone=2)
[   25.394171] page_type: f5(slab)
[   25.394405] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.395996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.396421] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.397212] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.397798] head: 0200000000000001 ffffea0004026881 ffffffffffffffff 0000000000000000
[   25.398455] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   25.399264] page dumped because: kasan: bad access detected
[   25.399642] 
[   25.399829] Memory state around the buggy address:
[   25.400110]  ffff8881009a3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.400756]  ffff8881009a3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.401297] >ffff8881009a3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.404116]                                                     ^
[   25.404598]  ffff8881009a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.405399]  ffff8881009a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.406611] ==================================================================
[   25.734164] ==================================================================
[   25.735103] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   25.735812] Write of size 1 at addr ffff8881022560eb by task kunit_try_catch/171
[   25.736821] 
[   25.737011] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.737642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.737971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.739188] Call Trace:
[   25.739443]  <TASK>
[   25.740574]  dump_stack_lvl+0x73/0xb0
[   25.740890]  print_report+0xd1/0x640
[   25.741214]  ? __virt_addr_valid+0x1db/0x2d0
[   25.742101]  ? kasan_addr_to_slab+0x11/0xa0
[   25.742940]  kasan_report+0x102/0x140
[   25.743151]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   25.743430]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   25.744285]  __asan_report_store1_noabort+0x1b/0x30
[   25.744702]  krealloc_less_oob_helper+0xd49/0x11d0
[   25.745177]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.745615]  ? finish_task_switch.isra.0+0x153/0x700
[   25.746010]  ? __switch_to+0x5d9/0xf60
[   25.746373]  ? __schedule+0xc3e/0x2790
[   25.747514]  ? __pfx_read_tsc+0x10/0x10
[   25.747857]  krealloc_large_less_oob+0x1c/0x30
[   25.748117]  kunit_try_run_case+0x1b3/0x490
[   25.748377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.748735]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.749650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.750105]  ? __kthread_parkme+0x82/0x160
[   25.751010]  ? preempt_count_sub+0x50/0x80
[   25.751428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.752165]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.752965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.753414]  kthread+0x257/0x310
[   25.754232]  ? __pfx_kthread+0x10/0x10
[   25.754759]  ret_from_fork+0x41/0x80
[   25.755766]  ? __pfx_kthread+0x10/0x10
[   25.756110]  ret_from_fork_asm+0x1a/0x30
[   25.756446]  </TASK>
[   25.757510] 
[   25.757683] The buggy address belongs to the physical page:
[   25.757981] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102254
[   25.758371] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.759144] flags: 0x200000000000040(head|node=0|zone=2)
[   25.760239] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.760785] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.761485] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.762211] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.763023] head: 0200000000000002 ffffea0004089501 ffffffffffffffff 0000000000000000
[   25.763590] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.764668] page dumped because: kasan: bad access detected
[   25.765310] 
[   25.765516] Memory state around the buggy address:
[   25.766500]  ffff888102255f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.767279]  ffff888102256000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.768620] >ffff888102256080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.768964]                                                           ^
[   25.769271]  ffff888102256100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.769844]  ffff888102256180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.770173] ==================================================================
[   25.661128] ==================================================================
[   25.661683] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   25.662138] Write of size 1 at addr ffff8881022560da by task kunit_try_catch/171
[   25.662493] 
[   25.662660] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.663763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.664175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.665088] Call Trace:
[   25.665295]  <TASK>
[   25.665606]  dump_stack_lvl+0x73/0xb0
[   25.666162]  print_report+0xd1/0x640
[   25.666579]  ? __virt_addr_valid+0x1db/0x2d0
[   25.667097]  ? kasan_addr_to_slab+0x11/0xa0
[   25.667445]  kasan_report+0x102/0x140
[   25.668463]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   25.668874]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   25.669455]  __asan_report_store1_noabort+0x1b/0x30
[   25.670009]  krealloc_less_oob_helper+0xec8/0x11d0
[   25.670397]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.670731]  ? finish_task_switch.isra.0+0x153/0x700
[   25.671229]  ? __switch_to+0x5d9/0xf60
[   25.671641]  ? __schedule+0xc3e/0x2790
[   25.672045]  ? __pfx_read_tsc+0x10/0x10
[   25.672750]  krealloc_large_less_oob+0x1c/0x30
[   25.673214]  kunit_try_run_case+0x1b3/0x490
[   25.674222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.674782]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.675165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.675566]  ? __kthread_parkme+0x82/0x160
[   25.676104]  ? preempt_count_sub+0x50/0x80
[   25.676579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.677190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.677584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.678244]  kthread+0x257/0x310
[   25.679210]  ? __pfx_kthread+0x10/0x10
[   25.679612]  ret_from_fork+0x41/0x80
[   25.680032]  ? __pfx_kthread+0x10/0x10
[   25.680484]  ret_from_fork_asm+0x1a/0x30
[   25.681001]  </TASK>
[   25.681201] 
[   25.681412] The buggy address belongs to the physical page:
[   25.681797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102254
[   25.682207] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.682776] flags: 0x200000000000040(head|node=0|zone=2)
[   25.683465] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.684241] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.685495] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.686217] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.686844] head: 0200000000000002 ffffea0004089501 ffffffffffffffff 0000000000000000
[   25.687475] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.688246] page dumped because: kasan: bad access detected
[   25.688674] 
[   25.688855] Memory state around the buggy address:
[   25.689396]  ffff888102255f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.690847]  ffff888102256000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.691497] >ffff888102256080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.692046]                                                     ^
[   25.692765]  ffff888102256100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.693526]  ffff888102256180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.694186] ==================================================================
[   25.253013] ==================================================================
[   25.253936] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   25.255151] Write of size 1 at addr ffff8881009a3ec9 by task kunit_try_catch/167
[   25.256938] 
[   25.257144] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.257828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.258500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.259370] Call Trace:
[   25.260089]  <TASK>
[   25.260865]  dump_stack_lvl+0x73/0xb0
[   25.261148]  print_report+0xd1/0x640
[   25.261461]  ? __virt_addr_valid+0x1db/0x2d0
[   25.262354]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.263304]  kasan_report+0x102/0x140
[   25.263802]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   25.264340]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   25.265029]  __asan_report_store1_noabort+0x1b/0x30
[   25.266235]  krealloc_less_oob_helper+0xd72/0x11d0
[   25.266941]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.267439]  ? finish_task_switch.isra.0+0x153/0x700
[   25.268255]  ? __switch_to+0x5d9/0xf60
[   25.269160]  ? __schedule+0xc3e/0x2790
[   25.269712]  ? __pfx_read_tsc+0x10/0x10
[   25.270024]  krealloc_less_oob+0x1c/0x30
[   25.270400]  kunit_try_run_case+0x1b3/0x490
[   25.271348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.271717]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.271990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.272846]  ? __kthread_parkme+0x82/0x160
[   25.273446]  ? preempt_count_sub+0x50/0x80
[   25.274386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.274859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.275227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.275758]  kthread+0x257/0x310
[   25.276217]  ? __pfx_kthread+0x10/0x10
[   25.276984]  ret_from_fork+0x41/0x80
[   25.277350]  ? __pfx_kthread+0x10/0x10
[   25.278312]  ret_from_fork_asm+0x1a/0x30
[   25.278898]  </TASK>
[   25.279179] 
[   25.279362] Allocated by task 167:
[   25.279682]  kasan_save_stack+0x3d/0x60
[   25.280094]  kasan_save_track+0x18/0x40
[   25.280422]  kasan_save_alloc_info+0x3b/0x50
[   25.281479]  __kasan_krealloc+0x190/0x1f0
[   25.281881]  krealloc_noprof+0xf3/0x340
[   25.282271]  krealloc_less_oob_helper+0x1ab/0x11d0
[   25.282797]  krealloc_less_oob+0x1c/0x30
[   25.283514]  kunit_try_run_case+0x1b3/0x490
[   25.284128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.284830]  kthread+0x257/0x310
[   25.285255]  ret_from_fork+0x41/0x80
[   25.285862]  ret_from_fork_asm+0x1a/0x30
[   25.286118] 
[   25.286267] The buggy address belongs to the object at ffff8881009a3e00
[   25.286267]  which belongs to the cache kmalloc-256 of size 256
[   25.287555] The buggy address is located 0 bytes to the right of
[   25.287555]  allocated 201-byte region [ffff8881009a3e00, ffff8881009a3ec9)
[   25.288842] 
[   25.289412] The buggy address belongs to the physical page:
[   25.289856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2
[   25.290453] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.290967] flags: 0x200000000000040(head|node=0|zone=2)
[   25.292028] page_type: f5(slab)
[   25.292259] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.292988] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.294169] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.295159] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.296170] head: 0200000000000001 ffffea0004026881 ffffffffffffffff 0000000000000000
[   25.296648] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   25.297908] page dumped because: kasan: bad access detected
[   25.298213] 
[   25.298682] Memory state around the buggy address:
[   25.299632]  ffff8881009a3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.300271]  ffff8881009a3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.301446] >ffff8881009a3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.302186]                                               ^
[   25.302871]  ffff8881009a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.303981]  ffff8881009a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.305289] ==================================================================
[   25.626571] ==================================================================
[   25.627261] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   25.627902] Write of size 1 at addr ffff8881022560d0 by task kunit_try_catch/171
[   25.628548] 
[   25.628915] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.629749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.630116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.630566] Call Trace:
[   25.630986]  <TASK>
[   25.631268]  dump_stack_lvl+0x73/0xb0
[   25.632367]  print_report+0xd1/0x640
[   25.632780]  ? __virt_addr_valid+0x1db/0x2d0
[   25.633351]  ? kasan_addr_to_slab+0x11/0xa0
[   25.633936]  kasan_report+0x102/0x140
[   25.634341]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   25.634959]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   25.635408]  __asan_report_store1_noabort+0x1b/0x30
[   25.635997]  krealloc_less_oob_helper+0xe25/0x11d0
[   25.636515]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.637632]  ? finish_task_switch.isra.0+0x153/0x700
[   25.638126]  ? __switch_to+0x5d9/0xf60
[   25.638426]  ? __schedule+0xc3e/0x2790
[   25.638826]  ? __pfx_read_tsc+0x10/0x10
[   25.639406]  krealloc_large_less_oob+0x1c/0x30
[   25.640003]  kunit_try_run_case+0x1b3/0x490
[   25.640342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.640911]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.641369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.641991]  ? __kthread_parkme+0x82/0x160
[   25.642357]  ? preempt_count_sub+0x50/0x80
[   25.643456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.643786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.644388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.645119]  kthread+0x257/0x310
[   25.645479]  ? __pfx_kthread+0x10/0x10
[   25.645937]  ret_from_fork+0x41/0x80
[   25.646324]  ? __pfx_kthread+0x10/0x10
[   25.646868]  ret_from_fork_asm+0x1a/0x30
[   25.647302]  </TASK>
[   25.647603] 
[   25.648456] The buggy address belongs to the physical page:
[   25.648855] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102254
[   25.649805] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.650205] flags: 0x200000000000040(head|node=0|zone=2)
[   25.650788] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.651472] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.652079] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.652731] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.653195] head: 0200000000000002 ffffea0004089501 ffffffffffffffff 0000000000000000
[   25.654897] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.655433] page dumped because: kasan: bad access detected
[   25.656133] 
[   25.656288] Memory state around the buggy address:
[   25.656585]  ffff888102255f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.656939]  ffff888102256000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.657401] >ffff888102256080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.657847]                                                  ^
[   25.658417]  ffff888102256100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.659161]  ffff888102256180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.660351] ==================================================================
[   25.306893] ==================================================================
[   25.307423] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   25.308518] Write of size 1 at addr ffff8881009a3ed0 by task kunit_try_catch/167
[   25.308771] 
[   25.308867] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.309307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.309753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.310895] Call Trace:
[   25.311240]  <TASK>
[   25.311550]  dump_stack_lvl+0x73/0xb0
[   25.312209]  print_report+0xd1/0x640
[   25.312661]  ? __virt_addr_valid+0x1db/0x2d0
[   25.313125]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.313826]  kasan_report+0x102/0x140
[   25.314477]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   25.315100]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   25.315681]  __asan_report_store1_noabort+0x1b/0x30
[   25.315991]  krealloc_less_oob_helper+0xe25/0x11d0
[   25.317119]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.318068]  ? finish_task_switch.isra.0+0x153/0x700
[   25.318909]  ? __switch_to+0x5d9/0xf60
[   25.319614]  ? __schedule+0xc3e/0x2790
[   25.320386]  ? __pfx_read_tsc+0x10/0x10
[   25.321136]  krealloc_less_oob+0x1c/0x30
[   25.321417]  kunit_try_run_case+0x1b3/0x490
[   25.321723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.322191]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.322523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.323002]  ? __kthread_parkme+0x82/0x160
[   25.324130]  ? preempt_count_sub+0x50/0x80
[   25.324754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.325274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.326031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.326544]  kthread+0x257/0x310
[   25.327187]  ? __pfx_kthread+0x10/0x10
[   25.327410]  ret_from_fork+0x41/0x80
[   25.327627]  ? __pfx_kthread+0x10/0x10
[   25.327991]  ret_from_fork_asm+0x1a/0x30
[   25.328388]  </TASK>
[   25.329685] 
[   25.330043] Allocated by task 167:
[   25.330635]  kasan_save_stack+0x3d/0x60
[   25.330874]  kasan_save_track+0x18/0x40
[   25.331099]  kasan_save_alloc_info+0x3b/0x50
[   25.331265]  __kasan_krealloc+0x190/0x1f0
[   25.331406]  krealloc_noprof+0xf3/0x340
[   25.331779]  krealloc_less_oob_helper+0x1ab/0x11d0
[   25.332250]  krealloc_less_oob+0x1c/0x30
[   25.332659]  kunit_try_run_case+0x1b3/0x490
[   25.333496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.334588]  kthread+0x257/0x310
[   25.335495]  ret_from_fork+0x41/0x80
[   25.336131]  ret_from_fork_asm+0x1a/0x30
[   25.336597] 
[   25.337128] The buggy address belongs to the object at ffff8881009a3e00
[   25.337128]  which belongs to the cache kmalloc-256 of size 256
[   25.338271] The buggy address is located 7 bytes to the right of
[   25.338271]  allocated 201-byte region [ffff8881009a3e00, ffff8881009a3ec9)
[   25.339826] 
[   25.340019] The buggy address belongs to the physical page:
[   25.340411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2
[   25.341027] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.342066] flags: 0x200000000000040(head|node=0|zone=2)
[   25.342752] page_type: f5(slab)
[   25.343204] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.344121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.345026] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.346200] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.346867] head: 0200000000000001 ffffea0004026881 ffffffffffffffff 0000000000000000
[   25.347427] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   25.348749] page dumped because: kasan: bad access detected
[   25.349140] 
[   25.349332] Memory state around the buggy address:
[   25.349716]  ffff8881009a3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.350240]  ffff8881009a3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.350817] >ffff8881009a3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.351442]                                                  ^
[   25.353095]  ffff8881009a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.353600]  ffff8881009a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.354246] ==================================================================
[   25.460217] ==================================================================
[   25.461470] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   25.462143] Write of size 1 at addr ffff8881009a3eeb by task kunit_try_catch/167
[   25.462881] 
[   25.463075] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   25.463926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.464270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.464823] Call Trace:
[   25.466288]  <TASK>
[   25.466673]  dump_stack_lvl+0x73/0xb0
[   25.467361]  print_report+0xd1/0x640
[   25.467966]  ? __virt_addr_valid+0x1db/0x2d0
[   25.468366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.469227]  kasan_report+0x102/0x140
[   25.469963]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   25.470393]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   25.471129]  __asan_report_store1_noabort+0x1b/0x30
[   25.471610]  krealloc_less_oob_helper+0xd49/0x11d0
[   25.472620]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.473390]  ? finish_task_switch.isra.0+0x153/0x700
[   25.474369]  ? __switch_to+0x5d9/0xf60
[   25.475192]  ? __schedule+0xc3e/0x2790
[   25.475535]  ? __pfx_read_tsc+0x10/0x10
[   25.475994]  krealloc_less_oob+0x1c/0x30
[   25.476404]  kunit_try_run_case+0x1b3/0x490
[   25.477492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.478270]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.478654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.479123]  ? __kthread_parkme+0x82/0x160
[   25.479465]  ? preempt_count_sub+0x50/0x80
[   25.479856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.480239]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.481201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.482097]  kthread+0x257/0x310
[   25.482582]  ? __pfx_kthread+0x10/0x10
[   25.483132]  ret_from_fork+0x41/0x80
[   25.483670]  ? __pfx_kthread+0x10/0x10
[   25.483957]  ret_from_fork_asm+0x1a/0x30
[   25.484666]  </TASK>
[   25.485079] 
[   25.485286] Allocated by task 167:
[   25.485874]  kasan_save_stack+0x3d/0x60
[   25.486400]  kasan_save_track+0x18/0x40
[   25.486806]  kasan_save_alloc_info+0x3b/0x50
[   25.487095]  __kasan_krealloc+0x190/0x1f0
[   25.487559]  krealloc_noprof+0xf3/0x340
[   25.488117]  krealloc_less_oob_helper+0x1ab/0x11d0
[   25.488734]  krealloc_less_oob+0x1c/0x30
[   25.489344]  kunit_try_run_case+0x1b3/0x490
[   25.489914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.490563]  kthread+0x257/0x310
[   25.491006]  ret_from_fork+0x41/0x80
[   25.491556]  ret_from_fork_asm+0x1a/0x30
[   25.492130] 
[   25.492493] The buggy address belongs to the object at ffff8881009a3e00
[   25.492493]  which belongs to the cache kmalloc-256 of size 256
[   25.493850] The buggy address is located 34 bytes to the right of
[   25.493850]  allocated 201-byte region [ffff8881009a3e00, ffff8881009a3ec9)
[   25.494658] 
[   25.494930] The buggy address belongs to the physical page:
[   25.495408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2
[   25.496351] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.497228] flags: 0x200000000000040(head|node=0|zone=2)
[   25.497869] page_type: f5(slab)
[   25.498268] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.498901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.499913] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   25.500762] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.501603] head: 0200000000000001 ffffea0004026881 ffffffffffffffff 0000000000000000
[   25.502239] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   25.503039] page dumped because: kasan: bad access detected
[   25.503584] 
[   25.503837] Memory state around the buggy address:
[   25.504353]  ffff8881009a3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.505072]  ffff8881009a3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.506047] >ffff8881009a3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   25.506801]                                                           ^
[   25.507323]  ffff8881009a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.508044]  ffff8881009a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.508425] ==================================================================