Hay
Date
Dec. 4, 2024, 3:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.569709] ==================================================================
[   31.571029] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.571980] Write of size 1 at addr fff00000c5e720d0 by task kunit_try_catch/150
[   31.573465] 
[   31.573967] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.575142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.575799] Hardware name: linux,dummy-virt (DT)
[   31.576549] Call trace:
[   31.577863]  show_stack+0x20/0x38 (C)
[   31.578528]  dump_stack_lvl+0x8c/0xd0
[   31.579222]  print_report+0x118/0x5e0
[   31.580301]  kasan_report+0xc8/0x118
[   31.581233]  __asan_report_store1_noabort+0x20/0x30
[   31.581970]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.582618]  krealloc_large_less_oob+0x20/0x38
[   31.583995]  kunit_try_run_case+0x14c/0x3d0
[   31.584603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.585458]  kthread+0x24c/0x2d0
[   31.586378]  ret_from_fork+0x10/0x20
[   31.587034] 
[   31.587453] The buggy address belongs to the physical page:
[   31.588902] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.589908] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.590931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.591838] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.592912] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.594011] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.594896] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.596173] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.597116] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.598593] page dumped because: kasan: bad access detected
[   31.599172] 
[   31.599502] Memory state around the buggy address:
[   31.600191]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.601060]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.602806] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.603594]                                                  ^
[   31.604608]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.606003]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.606971] ==================================================================
[   31.609281] ==================================================================
[   31.610480] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.611377] Write of size 1 at addr fff00000c5e720da by task kunit_try_catch/150
[   31.612706] 
[   31.613235] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.614963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.615751] Hardware name: linux,dummy-virt (DT)
[   31.616550] Call trace:
[   31.616815]  show_stack+0x20/0x38 (C)
[   31.617882]  dump_stack_lvl+0x8c/0xd0
[   31.619000]  print_report+0x118/0x5e0
[   31.619536]  kasan_report+0xc8/0x118
[   31.620169]  __asan_report_store1_noabort+0x20/0x30
[   31.620966]  krealloc_less_oob_helper+0xa80/0xc50
[   31.621927]  krealloc_large_less_oob+0x20/0x38
[   31.622594]  kunit_try_run_case+0x14c/0x3d0
[   31.624079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.624711]  kthread+0x24c/0x2d0
[   31.625351]  ret_from_fork+0x10/0x20
[   31.625984] 
[   31.626394] The buggy address belongs to the physical page:
[   31.627292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.628793] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.630607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.631470] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.632374] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.633391] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.634406] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.635395] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.636662] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.637527] page dumped because: kasan: bad access detected
[   31.638603] 
[   31.638886] Memory state around the buggy address:
[   31.639355]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.640050]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.640743] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.641750]                                                     ^
[   31.642929]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.643911]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.644903] ==================================================================
[   31.234737] ==================================================================
[   31.235719] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.236516] Write of size 1 at addr fff00000c09730d0 by task kunit_try_catch/146
[   31.237234] 
[   31.237582] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.239611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.240478] Hardware name: linux,dummy-virt (DT)
[   31.241090] Call trace:
[   31.241643]  show_stack+0x20/0x38 (C)
[   31.242570]  dump_stack_lvl+0x8c/0xd0
[   31.243292]  print_report+0x118/0x5e0
[   31.244119]  kasan_report+0xc8/0x118
[   31.244931]  __asan_report_store1_noabort+0x20/0x30
[   31.246116]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.246936]  krealloc_less_oob+0x20/0x38
[   31.247488]  kunit_try_run_case+0x14c/0x3d0
[   31.248015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.248717]  kthread+0x24c/0x2d0
[   31.249349]  ret_from_fork+0x10/0x20
[   31.250179] 
[   31.250578] Allocated by task 146:
[   31.251153]  kasan_save_stack+0x3c/0x68
[   31.251977]  kasan_save_track+0x20/0x40
[   31.252684]  kasan_save_alloc_info+0x40/0x58
[   31.253395]  __kasan_krealloc+0x118/0x178
[   31.254595]  krealloc_noprof+0x128/0x360
[   31.255500]  krealloc_less_oob_helper+0x168/0xc50
[   31.256197]  krealloc_less_oob+0x20/0x38
[   31.256769]  kunit_try_run_case+0x14c/0x3d0
[   31.257365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.258479]  kthread+0x24c/0x2d0
[   31.258989]  ret_from_fork+0x10/0x20
[   31.259503] 
[   31.259844] The buggy address belongs to the object at fff00000c0973000
[   31.259844]  which belongs to the cache kmalloc-256 of size 256
[   31.261973] The buggy address is located 7 bytes to the right of
[   31.261973]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.263811] 
[   31.264108] The buggy address belongs to the physical page:
[   31.264815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.265865] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.267461] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.268563] page_type: f5(slab)
[   31.269242] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.270684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.271562] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.272579] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.273520] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.274399] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.275693] page dumped because: kasan: bad access detected
[   31.276364] 
[   31.276867] Memory state around the buggy address:
[   31.277555]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.278966]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.281059] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.282850]                                                  ^
[   31.283576]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.284422]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.285355] ==================================================================
[   31.289305] ==================================================================
[   31.290554] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.291451] Write of size 1 at addr fff00000c09730da by task kunit_try_catch/146
[   31.292218] 
[   31.292528] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.293722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.294416] Hardware name: linux,dummy-virt (DT)
[   31.295461] Call trace:
[   31.295927]  show_stack+0x20/0x38 (C)
[   31.296499]  dump_stack_lvl+0x8c/0xd0
[   31.297072]  print_report+0x118/0x5e0
[   31.297736]  kasan_report+0xc8/0x118
[   31.298271]  __asan_report_store1_noabort+0x20/0x30
[   31.299170]  krealloc_less_oob_helper+0xa80/0xc50
[   31.300215]  krealloc_less_oob+0x20/0x38
[   31.300827]  kunit_try_run_case+0x14c/0x3d0
[   31.301477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.302333]  kthread+0x24c/0x2d0
[   31.302981]  ret_from_fork+0x10/0x20
[   31.303560] 
[   31.303943] Allocated by task 146:
[   31.304434]  kasan_save_stack+0x3c/0x68
[   31.305211]  kasan_save_track+0x20/0x40
[   31.305727]  kasan_save_alloc_info+0x40/0x58
[   31.306947]  __kasan_krealloc+0x118/0x178
[   31.307523]  krealloc_noprof+0x128/0x360
[   31.308194]  krealloc_less_oob_helper+0x168/0xc50
[   31.309424]  krealloc_less_oob+0x20/0x38
[   31.310459]  kunit_try_run_case+0x14c/0x3d0
[   31.311107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.311791]  kthread+0x24c/0x2d0
[   31.312404]  ret_from_fork+0x10/0x20
[   31.312970] 
[   31.313399] The buggy address belongs to the object at fff00000c0973000
[   31.313399]  which belongs to the cache kmalloc-256 of size 256
[   31.315049] The buggy address is located 17 bytes to the right of
[   31.315049]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.316595] 
[   31.316939] The buggy address belongs to the physical page:
[   31.317712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.319326] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.320213] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.321251] page_type: f5(slab)
[   31.322322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.323377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.324317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.325245] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.326265] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.327143] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.328080] page dumped because: kasan: bad access detected
[   31.328745] 
[   31.329122] Memory state around the buggy address:
[   31.330651]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.331852]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.332704] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.334182]                                                     ^
[   31.335004]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.335922]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.336824] ==================================================================
[   31.647247] ==================================================================
[   31.648219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.649075] Write of size 1 at addr fff00000c5e720ea by task kunit_try_catch/150
[   31.649777] 
[   31.650256] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.651477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.652130] Hardware name: linux,dummy-virt (DT)
[   31.653328] Call trace:
[   31.653659]  show_stack+0x20/0x38 (C)
[   31.654287]  dump_stack_lvl+0x8c/0xd0
[   31.654997]  print_report+0x118/0x5e0
[   31.655569]  kasan_report+0xc8/0x118
[   31.656720]  __asan_report_store1_noabort+0x20/0x30
[   31.657116]  krealloc_less_oob_helper+0xae4/0xc50
[   31.657447]  krealloc_large_less_oob+0x20/0x38
[   31.658269]  kunit_try_run_case+0x14c/0x3d0
[   31.659202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.659877]  kthread+0x24c/0x2d0
[   31.660503]  ret_from_fork+0x10/0x20
[   31.661232] 
[   31.661993] The buggy address belongs to the physical page:
[   31.662990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.663996] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.665069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.666932] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.668050] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.669029] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.670547] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.671738] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.672713] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.673556] page dumped because: kasan: bad access detected
[   31.674202] 
[   31.674540] Memory state around the buggy address:
[   31.675243]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.676601]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.677500] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.679079]                                                           ^
[   31.679665]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.680584]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.681400] ==================================================================
[   31.183468] ==================================================================
[   31.184777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.185798] Write of size 1 at addr fff00000c09730c9 by task kunit_try_catch/146
[   31.187150] 
[   31.187523] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.188721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.189482] Hardware name: linux,dummy-virt (DT)
[   31.190690] Call trace:
[   31.191104]  show_stack+0x20/0x38 (C)
[   31.191690]  dump_stack_lvl+0x8c/0xd0
[   31.192284]  print_report+0x118/0x5e0
[   31.192928]  kasan_report+0xc8/0x118
[   31.193527]  __asan_report_store1_noabort+0x20/0x30
[   31.194227]  krealloc_less_oob_helper+0xa48/0xc50
[   31.195345]  krealloc_less_oob+0x20/0x38
[   31.196039]  kunit_try_run_case+0x14c/0x3d0
[   31.196817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.197602]  kthread+0x24c/0x2d0
[   31.198405]  ret_from_fork+0x10/0x20
[   31.199011] 
[   31.199284] Allocated by task 146:
[   31.199884]  kasan_save_stack+0x3c/0x68
[   31.200544]  kasan_save_track+0x20/0x40
[   31.201127]  kasan_save_alloc_info+0x40/0x58
[   31.202120]  __kasan_krealloc+0x118/0x178
[   31.202574]  krealloc_noprof+0x128/0x360
[   31.203288]  krealloc_less_oob_helper+0x168/0xc50
[   31.203958]  krealloc_less_oob+0x20/0x38
[   31.204531]  kunit_try_run_case+0x14c/0x3d0
[   31.205143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.206425]  kthread+0x24c/0x2d0
[   31.207034]  ret_from_fork+0x10/0x20
[   31.207662] 
[   31.207988] The buggy address belongs to the object at fff00000c0973000
[   31.207988]  which belongs to the cache kmalloc-256 of size 256
[   31.209800] The buggy address is located 0 bytes to the right of
[   31.209800]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.212167] 
[   31.212549] The buggy address belongs to the physical page:
[   31.213180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.214438] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.215385] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.216188] page_type: f5(slab)
[   31.216729] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.217651] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.219075] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.220139] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.221075] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.222210] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.223398] page dumped because: kasan: bad access detected
[   31.223927] 
[   31.224393] Memory state around the buggy address:
[   31.225030]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.226175]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.227202] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.228659]                                               ^
[   31.229260]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.229889]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.231107] ==================================================================
[   31.386891] ==================================================================
[   31.387759] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.388471] Write of size 1 at addr fff00000c09730eb by task kunit_try_catch/146
[   31.389350] 
[   31.389769] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.390993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.391462] Hardware name: linux,dummy-virt (DT)
[   31.392312] Call trace:
[   31.392758]  show_stack+0x20/0x38 (C)
[   31.393278]  dump_stack_lvl+0x8c/0xd0
[   31.393870]  print_report+0x118/0x5e0
[   31.394526]  kasan_report+0xc8/0x118
[   31.395269]  __asan_report_store1_noabort+0x20/0x30
[   31.396081]  krealloc_less_oob_helper+0xa58/0xc50
[   31.396748]  krealloc_less_oob+0x20/0x38
[   31.397420]  kunit_try_run_case+0x14c/0x3d0
[   31.397999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.398833]  kthread+0x24c/0x2d0
[   31.399419]  ret_from_fork+0x10/0x20
[   31.400036] 
[   31.400449] Allocated by task 146:
[   31.401009]  kasan_save_stack+0x3c/0x68
[   31.401562]  kasan_save_track+0x20/0x40
[   31.402200]  kasan_save_alloc_info+0x40/0x58
[   31.402832]  __kasan_krealloc+0x118/0x178
[   31.403367]  krealloc_noprof+0x128/0x360
[   31.404051]  krealloc_less_oob_helper+0x168/0xc50
[   31.404716]  krealloc_less_oob+0x20/0x38
[   31.405265]  kunit_try_run_case+0x14c/0x3d0
[   31.405844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.406684]  kthread+0x24c/0x2d0
[   31.407211]  ret_from_fork+0x10/0x20
[   31.407741] 
[   31.408181] The buggy address belongs to the object at fff00000c0973000
[   31.408181]  which belongs to the cache kmalloc-256 of size 256
[   31.409670] The buggy address is located 34 bytes to the right of
[   31.409670]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.411121] 
[   31.411436] The buggy address belongs to the physical page:
[   31.412110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.413082] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.414066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.415051] page_type: f5(slab)
[   31.415534] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.416416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.417349] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.418281] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.419264] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.420165] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.421205] page dumped because: kasan: bad access detected
[   31.421884] 
[   31.422191] Memory state around the buggy address:
[   31.422841]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.423748]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.424590] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.425495]                                                           ^
[   31.426386]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.427296]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.428185] ==================================================================
[   31.529056] ==================================================================
[   31.530235] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.531506] Write of size 1 at addr fff00000c5e720c9 by task kunit_try_catch/150
[   31.532511] 
[   31.532965] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.534663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.535321] Hardware name: linux,dummy-virt (DT)
[   31.536227] Call trace:
[   31.536614]  show_stack+0x20/0x38 (C)
[   31.537226]  dump_stack_lvl+0x8c/0xd0
[   31.537808]  print_report+0x118/0x5e0
[   31.538792]  kasan_report+0xc8/0x118
[   31.539356]  __asan_report_store1_noabort+0x20/0x30
[   31.540056]  krealloc_less_oob_helper+0xa48/0xc50
[   31.540832]  krealloc_large_less_oob+0x20/0x38
[   31.541463]  kunit_try_run_case+0x14c/0x3d0
[   31.542403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.543175]  kthread+0x24c/0x2d0
[   31.543789]  ret_from_fork+0x10/0x20
[   31.544398] 
[   31.544733] The buggy address belongs to the physical page:
[   31.545475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.546979] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.547850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.548831] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.549670] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.551647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.552996] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.554023] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.555328] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.556248] page dumped because: kasan: bad access detected
[   31.556885] 
[   31.557252] Memory state around the buggy address:
[   31.557890]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.559114]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.559964] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.560940]                                               ^
[   31.561682]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.563153]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.564003] ==================================================================
[   31.683280] ==================================================================
[   31.685340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.687547] Write of size 1 at addr fff00000c5e720eb by task kunit_try_catch/150
[   31.690180] 
[   31.690977] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.692258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.692942] Hardware name: linux,dummy-virt (DT)
[   31.693535] Call trace:
[   31.694528]  show_stack+0x20/0x38 (C)
[   31.695013]  dump_stack_lvl+0x8c/0xd0
[   31.695490]  print_report+0x118/0x5e0
[   31.695837]  kasan_report+0xc8/0x118
[   31.696455]  __asan_report_store1_noabort+0x20/0x30
[   31.697687]  krealloc_less_oob_helper+0xa58/0xc50
[   31.698899]  krealloc_large_less_oob+0x20/0x38
[   31.699608]  kunit_try_run_case+0x14c/0x3d0
[   31.700430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.701261]  kthread+0x24c/0x2d0
[   31.701544]  ret_from_fork+0x10/0x20
[   31.702300] 
[   31.702788] The buggy address belongs to the physical page:
[   31.703930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.705237] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.706509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.707071] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.707518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.707992] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.708440] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.709298] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.710134] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.712293] page dumped because: kasan: bad access detected
[   31.712965] 
[   31.713212] Memory state around the buggy address:
[   31.714691]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.716078]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.716983] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.718082]                                                           ^
[   31.718753]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.719391]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.720313] ==================================================================
[   31.339516] ==================================================================
[   31.341151] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.341616] Write of size 1 at addr fff00000c09730ea by task kunit_try_catch/146
[   31.343799] 
[   31.344234] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.345491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.346315] Hardware name: linux,dummy-virt (DT)
[   31.346954] Call trace:
[   31.347472]  show_stack+0x20/0x38 (C)
[   31.348131]  dump_stack_lvl+0x8c/0xd0
[   31.348873]  print_report+0x118/0x5e0
[   31.349449]  kasan_report+0xc8/0x118
[   31.350023]  __asan_report_store1_noabort+0x20/0x30
[   31.350693]  krealloc_less_oob_helper+0xae4/0xc50
[   31.351482]  krealloc_less_oob+0x20/0x38
[   31.352026]  kunit_try_run_case+0x14c/0x3d0
[   31.352870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.353607]  kthread+0x24c/0x2d0
[   31.354142]  ret_from_fork+0x10/0x20
[   31.354703] 
[   31.355055] Allocated by task 146:
[   31.355649]  kasan_save_stack+0x3c/0x68
[   31.356265]  kasan_save_track+0x20/0x40
[   31.356940]  kasan_save_alloc_info+0x40/0x58
[   31.357613]  __kasan_krealloc+0x118/0x178
[   31.358149]  krealloc_noprof+0x128/0x360
[   31.358826]  krealloc_less_oob_helper+0x168/0xc50
[   31.359598]  krealloc_less_oob+0x20/0x38
[   31.360171]  kunit_try_run_case+0x14c/0x3d0
[   31.360831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.361477]  kthread+0x24c/0x2d0
[   31.362077]  ret_from_fork+0x10/0x20
[   31.362729] 
[   31.363069] The buggy address belongs to the object at fff00000c0973000
[   31.363069]  which belongs to the cache kmalloc-256 of size 256
[   31.364559] The buggy address is located 33 bytes to the right of
[   31.364559]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.366123] 
[   31.366420] The buggy address belongs to the physical page:
[   31.367229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.368154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.369065] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.369927] page_type: f5(slab)
[   31.370490] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.371438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.372426] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.373439] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.374342] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.375372] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.376287] page dumped because: kasan: bad access detected
[   31.376962] 
[   31.377292] Memory state around the buggy address:
[   31.377874]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.378797]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.379752] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.380683]                                                           ^
[   31.381517]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.382492]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.383321] ==================================================================

[   22.350701] ==================================================================
[   22.352294] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   22.353301] Write of size 1 at addr ffff888102c3a0d0 by task kunit_try_catch/170
[   22.354728] 
[   22.355008] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.357209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.357879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.358322] Call Trace:
[   22.358893]  <TASK>
[   22.359568]  dump_stack_lvl+0x73/0xb0
[   22.359979]  print_report+0xd1/0x640
[   22.361110]  ? __virt_addr_valid+0x1db/0x2d0
[   22.361700]  ? kasan_addr_to_slab+0x11/0xa0
[   22.362216]  kasan_report+0x102/0x140
[   22.362616]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   22.363066]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   22.363689]  __asan_report_store1_noabort+0x1b/0x30
[   22.364511]  krealloc_less_oob_helper+0xe25/0x11d0
[   22.365068]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.365518]  ? finish_task_switch.isra.0+0x153/0x700
[   22.366238]  ? __switch_to+0x5d9/0xf60
[   22.367033]  ? __schedule+0xc3e/0x2790
[   22.367401]  ? __pfx_read_tsc+0x10/0x10
[   22.367820]  krealloc_large_less_oob+0x1c/0x30
[   22.368901]  kunit_try_run_case+0x1b3/0x490
[   22.369254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.369573]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.370189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.370996]  ? __kthread_parkme+0x82/0x160
[   22.371314]  ? preempt_count_sub+0x50/0x80
[   22.372119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.372690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.373345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.373719]  kthread+0x257/0x310
[   22.374152]  ? __pfx_kthread+0x10/0x10
[   22.374675]  ret_from_fork+0x41/0x80
[   22.375269]  ? __pfx_kthread+0x10/0x10
[   22.376007]  ret_from_fork_asm+0x1a/0x30
[   22.376608]  </TASK>
[   22.376900] 
[   22.377110] The buggy address belongs to the physical page:
[   22.377658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c38
[   22.378493] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.378999] flags: 0x200000000000040(head|node=0|zone=2)
[   22.379904] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.380638] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.381186] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.381889] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.382660] head: 0200000000000002 ffffea00040b0e01 ffffffffffffffff 0000000000000000
[   22.383261] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.384026] page dumped because: kasan: bad access detected
[   22.384615] 
[   22.384793] Memory state around the buggy address:
[   22.385269]  ffff888102c39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.386407]  ffff888102c3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.387011] >ffff888102c3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.387904]                                                  ^
[   22.388496]  ffff888102c3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.389556]  ffff888102c3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.390026] ==================================================================
[   21.991688] ==================================================================
[   21.992348] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   21.992846] Write of size 1 at addr ffff8881003940d0 by task kunit_try_catch/166
[   21.994625] 
[   21.994917] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   21.995881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.996902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.998124] Call Trace:
[   21.998819]  <TASK>
[   21.999060]  dump_stack_lvl+0x73/0xb0
[   21.999564]  print_report+0xd1/0x640
[   21.999936]  ? __virt_addr_valid+0x1db/0x2d0
[   22.001070]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.001722]  kasan_report+0x102/0x140
[   22.002214]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   22.002741]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   22.003507]  __asan_report_store1_noabort+0x1b/0x30
[   22.003945]  krealloc_less_oob_helper+0xe25/0x11d0
[   22.005167]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.005651]  ? finish_task_switch.isra.0+0x153/0x700
[   22.006293]  ? __switch_to+0x5d9/0xf60
[   22.006670]  ? __schedule+0xc3e/0x2790
[   22.007480]  ? __pfx_read_tsc+0x10/0x10
[   22.007865]  krealloc_less_oob+0x1c/0x30
[   22.008853]  kunit_try_run_case+0x1b3/0x490
[   22.009454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.009906]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.010380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.010928]  ? __kthread_parkme+0x82/0x160
[   22.011546]  ? preempt_count_sub+0x50/0x80
[   22.011923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.012890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.013519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.014147]  kthread+0x257/0x310
[   22.014730]  ? __pfx_kthread+0x10/0x10
[   22.015097]  ret_from_fork+0x41/0x80
[   22.015820]  ? __pfx_kthread+0x10/0x10
[   22.016116]  ret_from_fork_asm+0x1a/0x30
[   22.016652]  </TASK>
[   22.016884] 
[   22.017113] Allocated by task 166:
[   22.017476]  kasan_save_stack+0x3d/0x60
[   22.017765]  kasan_save_track+0x18/0x40
[   22.019479]  kasan_save_alloc_info+0x3b/0x50
[   22.019835]  __kasan_krealloc+0x190/0x1f0
[   22.020477]  krealloc_noprof+0xf3/0x340
[   22.020888]  krealloc_less_oob_helper+0x1ab/0x11d0
[   22.021740]  krealloc_less_oob+0x1c/0x30
[   22.022105]  kunit_try_run_case+0x1b3/0x490
[   22.023110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.023692]  kthread+0x257/0x310
[   22.024060]  ret_from_fork+0x41/0x80
[   22.024523]  ret_from_fork_asm+0x1a/0x30
[   22.025239] 
[   22.025624] The buggy address belongs to the object at ffff888100394000
[   22.025624]  which belongs to the cache kmalloc-256 of size 256
[   22.026625] The buggy address is located 7 bytes to the right of
[   22.026625]  allocated 201-byte region [ffff888100394000, ffff8881003940c9)
[   22.027622] 
[   22.028614] The buggy address belongs to the physical page:
[   22.028971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394
[   22.029843] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.031291] flags: 0x200000000000040(head|node=0|zone=2)
[   22.032189] page_type: f5(slab)
[   22.033054] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.033664] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.034508] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.035246] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.036402] head: 0200000000000001 ffffea000400e501 ffffffffffffffff 0000000000000000
[   22.036821] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.037685] page dumped because: kasan: bad access detected
[   22.038684] 
[   22.039135] Memory state around the buggy address:
[   22.040097]  ffff888100393f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.041502]  ffff888100394000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.042369] >ffff888100394080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.042962]                                                  ^
[   22.043517]  ffff888100394100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.045038]  ffff888100394180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.045873] ==================================================================
[   22.484446] ==================================================================
[   22.485575] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   22.487483] Write of size 1 at addr ffff888102c3a0eb by task kunit_try_catch/170
[   22.488040] 
[   22.488295] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.489414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.489822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.490593] Call Trace:
[   22.491217]  <TASK>
[   22.491677]  dump_stack_lvl+0x73/0xb0
[   22.492016]  print_report+0xd1/0x640
[   22.492635]  ? __virt_addr_valid+0x1db/0x2d0
[   22.493102]  ? kasan_addr_to_slab+0x11/0xa0
[   22.493740]  kasan_report+0x102/0x140
[   22.494090]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   22.495148]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   22.496035]  __asan_report_store1_noabort+0x1b/0x30
[   22.496700]  krealloc_less_oob_helper+0xd49/0x11d0
[   22.497156]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.497886]  ? finish_task_switch.isra.0+0x153/0x700
[   22.498239]  ? __switch_to+0x5d9/0xf60
[   22.499112]  ? __schedule+0xc3e/0x2790
[   22.499544]  ? __pfx_read_tsc+0x10/0x10
[   22.500105]  krealloc_large_less_oob+0x1c/0x30
[   22.501523]  kunit_try_run_case+0x1b3/0x490
[   22.502035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.503010]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.503515]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.504103]  ? __kthread_parkme+0x82/0x160
[   22.504509]  ? preempt_count_sub+0x50/0x80
[   22.505067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.506051]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.507185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.508293]  kthread+0x257/0x310
[   22.509097]  ? __pfx_kthread+0x10/0x10
[   22.509483]  ret_from_fork+0x41/0x80
[   22.509823]  ? __pfx_kthread+0x10/0x10
[   22.510623]  ret_from_fork_asm+0x1a/0x30
[   22.511393]  </TASK>
[   22.511684] 
[   22.511874] The buggy address belongs to the physical page:
[   22.512441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c38
[   22.513578] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.514151] flags: 0x200000000000040(head|node=0|zone=2)
[   22.515143] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.516739] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.517745] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.518827] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.519790] head: 0200000000000002 ffffea00040b0e01 ffffffffffffffff 0000000000000000
[   22.520433] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.522020] page dumped because: kasan: bad access detected
[   22.522739] 
[   22.522955] Memory state around the buggy address:
[   22.525008]  ffff888102c39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.526043]  ffff888102c3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.526914] >ffff888102c3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.527534]                                                           ^
[   22.528577]  ffff888102c3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.529669]  ffff888102c3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.531071] ==================================================================
[   21.919143] ==================================================================
[   21.920681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   21.922142] Write of size 1 at addr ffff8881003940c9 by task kunit_try_catch/166
[   21.923264] 
[   21.923468] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   21.924324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.925312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.926269] Call Trace:
[   21.926597]  <TASK>
[   21.926887]  dump_stack_lvl+0x73/0xb0
[   21.927296]  print_report+0xd1/0x640
[   21.928099]  ? __virt_addr_valid+0x1db/0x2d0
[   21.928423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.929112]  kasan_report+0x102/0x140
[   21.929543]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   21.930549]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   21.931094]  __asan_report_store1_noabort+0x1b/0x30
[   21.932230]  krealloc_less_oob_helper+0xd72/0x11d0
[   21.932814]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.933560]  ? finish_task_switch.isra.0+0x153/0x700
[   21.934481]  ? __switch_to+0x5d9/0xf60
[   21.935089]  ? __schedule+0xc3e/0x2790
[   21.935991]  ? __pfx_read_tsc+0x10/0x10
[   21.936948]  krealloc_less_oob+0x1c/0x30
[   21.937605]  kunit_try_run_case+0x1b3/0x490
[   21.937942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.938989]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.939605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.940467]  ? __kthread_parkme+0x82/0x160
[   21.940940]  ? preempt_count_sub+0x50/0x80
[   21.941981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.942679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.943587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.943981]  kthread+0x257/0x310
[   21.944267]  ? __pfx_kthread+0x10/0x10
[   21.944830]  ret_from_fork+0x41/0x80
[   21.946317]  ? __pfx_kthread+0x10/0x10
[   21.947306]  ret_from_fork_asm+0x1a/0x30
[   21.948680]  </TASK>
[   21.949356] 
[   21.949841] Allocated by task 166:
[   21.950172]  kasan_save_stack+0x3d/0x60
[   21.951939]  kasan_save_track+0x18/0x40
[   21.952806]  kasan_save_alloc_info+0x3b/0x50
[   21.953272]  __kasan_krealloc+0x190/0x1f0
[   21.953732]  krealloc_noprof+0xf3/0x340
[   21.954068]  krealloc_less_oob_helper+0x1ab/0x11d0
[   21.954652]  krealloc_less_oob+0x1c/0x30
[   21.955917]  kunit_try_run_case+0x1b3/0x490
[   21.956338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.957290]  kthread+0x257/0x310
[   21.958018]  ret_from_fork+0x41/0x80
[   21.959208]  ret_from_fork_asm+0x1a/0x30
[   21.960189] 
[   21.961390] The buggy address belongs to the object at ffff888100394000
[   21.961390]  which belongs to the cache kmalloc-256 of size 256
[   21.963503] The buggy address is located 0 bytes to the right of
[   21.963503]  allocated 201-byte region [ffff888100394000, ffff8881003940c9)
[   21.965714] 
[   21.966034] The buggy address belongs to the physical page:
[   21.967148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394
[   21.968683] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.969840] flags: 0x200000000000040(head|node=0|zone=2)
[   21.970867] page_type: f5(slab)
[   21.971257] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.972832] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.974015] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.975371] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.976863] head: 0200000000000001 ffffea000400e501 ffffffffffffffff 0000000000000000
[   21.978109] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   21.979446] page dumped because: kasan: bad access detected
[   21.979892] 
[   21.980080] Memory state around the buggy address:
[   21.980475]  ffff888100393f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.981325]  ffff888100394000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.983118] >ffff888100394080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.983919]                                               ^
[   21.984445]  ffff888100394100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985502]  ffff888100394180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.987520] ==================================================================
[   22.099617] ==================================================================
[   22.100172] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   22.101110] Write of size 1 at addr ffff8881003940ea by task kunit_try_catch/166
[   22.101990] 
[   22.102212] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.103655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.104151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.104936] Call Trace:
[   22.105198]  <TASK>
[   22.105517]  dump_stack_lvl+0x73/0xb0
[   22.106879]  print_report+0xd1/0x640
[   22.107150]  ? __virt_addr_valid+0x1db/0x2d0
[   22.107910]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.108589]  kasan_report+0x102/0x140
[   22.108981]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   22.109847]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   22.110403]  __asan_report_store1_noabort+0x1b/0x30
[   22.110770]  krealloc_less_oob_helper+0xe92/0x11d0
[   22.111282]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.111712]  ? finish_task_switch.isra.0+0x153/0x700
[   22.112993]  ? __switch_to+0x5d9/0xf60
[   22.113538]  ? __schedule+0xc3e/0x2790
[   22.114186]  ? __pfx_read_tsc+0x10/0x10
[   22.114670]  krealloc_less_oob+0x1c/0x30
[   22.115105]  kunit_try_run_case+0x1b3/0x490
[   22.116246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.116725]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.117499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.117901]  ? __kthread_parkme+0x82/0x160
[   22.118458]  ? preempt_count_sub+0x50/0x80
[   22.118845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.120070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.120574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.121139]  kthread+0x257/0x310
[   22.121420]  ? __pfx_kthread+0x10/0x10
[   22.122155]  ret_from_fork+0x41/0x80
[   22.122741]  ? __pfx_kthread+0x10/0x10
[   22.123060]  ret_from_fork_asm+0x1a/0x30
[   22.124543]  </TASK>
[   22.124874] 
[   22.125033] Allocated by task 166:
[   22.125456]  kasan_save_stack+0x3d/0x60
[   22.125878]  kasan_save_track+0x18/0x40
[   22.126299]  kasan_save_alloc_info+0x3b/0x50
[   22.126882]  __kasan_krealloc+0x190/0x1f0
[   22.128157]  krealloc_noprof+0xf3/0x340
[   22.128786]  krealloc_less_oob_helper+0x1ab/0x11d0
[   22.129254]  krealloc_less_oob+0x1c/0x30
[   22.129869]  kunit_try_run_case+0x1b3/0x490
[   22.130165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.130874]  kthread+0x257/0x310
[   22.131277]  ret_from_fork+0x41/0x80
[   22.132541]  ret_from_fork_asm+0x1a/0x30
[   22.133066] 
[   22.133235] The buggy address belongs to the object at ffff888100394000
[   22.133235]  which belongs to the cache kmalloc-256 of size 256
[   22.134729] The buggy address is located 33 bytes to the right of
[   22.134729]  allocated 201-byte region [ffff888100394000, ffff8881003940c9)
[   22.136390] 
[   22.136642] The buggy address belongs to the physical page:
[   22.137210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394
[   22.138041] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.138890] flags: 0x200000000000040(head|node=0|zone=2)
[   22.139401] page_type: f5(slab)
[   22.140247] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.141191] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.142224] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.142969] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.143598] head: 0200000000000001 ffffea000400e501 ffffffffffffffff 0000000000000000
[   22.144296] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.145470] page dumped because: kasan: bad access detected
[   22.146057] 
[   22.146480] Memory state around the buggy address:
[   22.147505]  ffff888100393f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.148837]  ffff888100394000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.150238] >ffff888100394080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.151700]                                                           ^
[   22.152458]  ffff888100394100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.153654]  ffff888100394180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.154298] ==================================================================
[   22.391370] ==================================================================
[   22.392041] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   22.393153] Write of size 1 at addr ffff888102c3a0da by task kunit_try_catch/170
[   22.393999] 
[   22.394212] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.395375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.395879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.396378] Call Trace:
[   22.396739]  <TASK>
[   22.397283]  dump_stack_lvl+0x73/0xb0
[   22.397737]  print_report+0xd1/0x640
[   22.398084]  ? __virt_addr_valid+0x1db/0x2d0
[   22.398477]  ? kasan_addr_to_slab+0x11/0xa0
[   22.399473]  kasan_report+0x102/0x140
[   22.399848]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   22.400188]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   22.401126]  __asan_report_store1_noabort+0x1b/0x30
[   22.401745]  krealloc_less_oob_helper+0xec8/0x11d0
[   22.402117]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.402653]  ? finish_task_switch.isra.0+0x153/0x700
[   22.403214]  ? __switch_to+0x5d9/0xf60
[   22.403629]  ? __schedule+0xc3e/0x2790
[   22.404158]  ? __pfx_read_tsc+0x10/0x10
[   22.404630]  krealloc_large_less_oob+0x1c/0x30
[   22.405150]  kunit_try_run_case+0x1b3/0x490
[   22.405884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.406588]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.407032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.407658]  ? __kthread_parkme+0x82/0x160
[   22.408115]  ? preempt_count_sub+0x50/0x80
[   22.408425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.409423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.409799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.410744]  kthread+0x257/0x310
[   22.411213]  ? __pfx_kthread+0x10/0x10
[   22.411794]  ret_from_fork+0x41/0x80
[   22.412095]  ? __pfx_kthread+0x10/0x10
[   22.412545]  ret_from_fork_asm+0x1a/0x30
[   22.412957]  </TASK>
[   22.413141] 
[   22.413513] The buggy address belongs to the physical page:
[   22.416031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c38
[   22.416647] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.417324] flags: 0x200000000000040(head|node=0|zone=2)
[   22.418167] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.418926] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.420467] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.421247] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.422292] head: 0200000000000002 ffffea00040b0e01 ffffffffffffffff 0000000000000000
[   22.423669] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.425036] page dumped because: kasan: bad access detected
[   22.425260] 
[   22.426047] Memory state around the buggy address:
[   22.427621]  ffff888102c39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.429002]  ffff888102c3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.430153] >ffff888102c3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.430702]                                                     ^
[   22.431413]  ffff888102c3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.432185]  ffff888102c3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.433719] ==================================================================
[   22.047452] ==================================================================
[   22.049432] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   22.050990] Write of size 1 at addr ffff8881003940da by task kunit_try_catch/166
[   22.051520] 
[   22.051716] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.052592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.052968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.053638] Call Trace:
[   22.055059]  <TASK>
[   22.055609]  dump_stack_lvl+0x73/0xb0
[   22.056136]  print_report+0xd1/0x640
[   22.056793]  ? __virt_addr_valid+0x1db/0x2d0
[   22.057613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.058872]  kasan_report+0x102/0x140
[   22.059329]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   22.059850]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   22.060275]  __asan_report_store1_noabort+0x1b/0x30
[   22.061158]  krealloc_less_oob_helper+0xec8/0x11d0
[   22.061683]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.062633]  ? finish_task_switch.isra.0+0x153/0x700
[   22.063202]  ? __switch_to+0x5d9/0xf60
[   22.063569]  ? __schedule+0xc3e/0x2790
[   22.064004]  ? __pfx_read_tsc+0x10/0x10
[   22.064501]  krealloc_less_oob+0x1c/0x30
[   22.065350]  kunit_try_run_case+0x1b3/0x490
[   22.065772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.066152]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.067167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.067859]  ? __kthread_parkme+0x82/0x160
[   22.068261]  ? preempt_count_sub+0x50/0x80
[   22.068959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.069399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.069974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.070432]  kthread+0x257/0x310
[   22.071545]  ? __pfx_kthread+0x10/0x10
[   22.071931]  ret_from_fork+0x41/0x80
[   22.072425]  ? __pfx_kthread+0x10/0x10
[   22.072816]  ret_from_fork_asm+0x1a/0x30
[   22.073356]  </TASK>
[   22.073576] 
[   22.073836] Allocated by task 166:
[   22.074106]  kasan_save_stack+0x3d/0x60
[   22.075010]  kasan_save_track+0x18/0x40
[   22.075534]  kasan_save_alloc_info+0x3b/0x50
[   22.075996]  __kasan_krealloc+0x190/0x1f0
[   22.076570]  krealloc_noprof+0xf3/0x340
[   22.076960]  krealloc_less_oob_helper+0x1ab/0x11d0
[   22.077564]  krealloc_less_oob+0x1c/0x30
[   22.077923]  kunit_try_run_case+0x1b3/0x490
[   22.079045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.079519]  kthread+0x257/0x310
[   22.079994]  ret_from_fork+0x41/0x80
[   22.080582]  ret_from_fork_asm+0x1a/0x30
[   22.080937] 
[   22.081168] The buggy address belongs to the object at ffff888100394000
[   22.081168]  which belongs to the cache kmalloc-256 of size 256
[   22.082053] The buggy address is located 17 bytes to the right of
[   22.082053]  allocated 201-byte region [ffff888100394000, ffff8881003940c9)
[   22.083636] 
[   22.083866] The buggy address belongs to the physical page:
[   22.084530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394
[   22.085346] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.085917] flags: 0x200000000000040(head|node=0|zone=2)
[   22.086846] page_type: f5(slab)
[   22.087141] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.088004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.088849] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.089666] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.090771] head: 0200000000000001 ffffea000400e501 ffffffffffffffff 0000000000000000
[   22.091460] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.092034] page dumped because: kasan: bad access detected
[   22.092696] 
[   22.092974] Memory state around the buggy address:
[   22.093462]  ffff888100393f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.094046]  ffff888100394000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.095272] >ffff888100394080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.095792]                                                     ^
[   22.096394]  ffff888100394100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.097375]  ffff888100394180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.097947] ==================================================================
[   22.434881] ==================================================================
[   22.436591] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   22.437245] Write of size 1 at addr ffff888102c3a0ea by task kunit_try_catch/170
[   22.438708] 
[   22.438906] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.441018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.441905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.442803] Call Trace:
[   22.443020]  <TASK>
[   22.443898]  dump_stack_lvl+0x73/0xb0
[   22.444452]  print_report+0xd1/0x640
[   22.444881]  ? __virt_addr_valid+0x1db/0x2d0
[   22.445358]  ? kasan_addr_to_slab+0x11/0xa0
[   22.446351]  kasan_report+0x102/0x140
[   22.447121]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   22.447650]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   22.448705]  __asan_report_store1_noabort+0x1b/0x30
[   22.449548]  krealloc_less_oob_helper+0xe92/0x11d0
[   22.450048]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.450561]  ? finish_task_switch.isra.0+0x153/0x700
[   22.452135]  ? __switch_to+0x5d9/0xf60
[   22.453520]  ? __schedule+0xc3e/0x2790
[   22.453914]  ? __pfx_read_tsc+0x10/0x10
[   22.454883]  krealloc_large_less_oob+0x1c/0x30
[   22.455490]  kunit_try_run_case+0x1b3/0x490
[   22.457211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.457713]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.458188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.459064]  ? __kthread_parkme+0x82/0x160
[   22.459913]  ? preempt_count_sub+0x50/0x80
[   22.461365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.461825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.462787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.463893]  kthread+0x257/0x310
[   22.464547]  ? __pfx_kthread+0x10/0x10
[   22.465561]  ret_from_fork+0x41/0x80
[   22.465966]  ? __pfx_kthread+0x10/0x10
[   22.467097]  ret_from_fork_asm+0x1a/0x30
[   22.467604]  </TASK>
[   22.467728] 
[   22.467822] The buggy address belongs to the physical page:
[   22.468773] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c38
[   22.469812] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.470204] flags: 0x200000000000040(head|node=0|zone=2)
[   22.470562] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.471894] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.472665] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.474109] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.474936] head: 0200000000000002 ffffea00040b0e01 ffffffffffffffff 0000000000000000
[   22.475802] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.476559] page dumped because: kasan: bad access detected
[   22.477100] 
[   22.477667] Memory state around the buggy address:
[   22.478618]  ffff888102c39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.479228]  ffff888102c3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.480142] >ffff888102c3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.481016]                                                           ^
[   22.482057]  ffff888102c3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.483078]  ffff888102c3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.483734] ==================================================================
[   22.305420] ==================================================================
[   22.306380] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   22.307267] Write of size 1 at addr ffff888102c3a0c9 by task kunit_try_catch/170
[   22.308160] 
[   22.308578] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.309902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.310247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.310928] Call Trace:
[   22.311192]  <TASK>
[   22.311422]  dump_stack_lvl+0x73/0xb0
[   22.311810]  print_report+0xd1/0x640
[   22.312572]  ? __virt_addr_valid+0x1db/0x2d0
[   22.313914]  ? kasan_addr_to_slab+0x11/0xa0
[   22.314843]  kasan_report+0x102/0x140
[   22.315367]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   22.315857]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   22.316338]  __asan_report_store1_noabort+0x1b/0x30
[   22.317217]  krealloc_less_oob_helper+0xd72/0x11d0
[   22.318038]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.318768]  ? finish_task_switch.isra.0+0x153/0x700
[   22.319495]  ? __switch_to+0x5d9/0xf60
[   22.320017]  ? __schedule+0xc3e/0x2790
[   22.320606]  ? __pfx_read_tsc+0x10/0x10
[   22.321150]  krealloc_large_less_oob+0x1c/0x30
[   22.321873]  kunit_try_run_case+0x1b3/0x490
[   22.322579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.323132]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.323840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.324260]  ? __kthread_parkme+0x82/0x160
[   22.325032]  ? preempt_count_sub+0x50/0x80
[   22.326026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.326924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.327533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.328664]  kthread+0x257/0x310
[   22.328986]  ? __pfx_kthread+0x10/0x10
[   22.329703]  ret_from_fork+0x41/0x80
[   22.330350]  ? __pfx_kthread+0x10/0x10
[   22.330901]  ret_from_fork_asm+0x1a/0x30
[   22.331817]  </TASK>
[   22.332175] 
[   22.332379] The buggy address belongs to the physical page:
[   22.332894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c38
[   22.333993] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.334964] flags: 0x200000000000040(head|node=0|zone=2)
[   22.336100] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.337342] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.338209] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.339338] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.340627] head: 0200000000000002 ffffea00040b0e01 ffffffffffffffff 0000000000000000
[   22.341564] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.342634] page dumped because: kasan: bad access detected
[   22.343199] 
[   22.343523] Memory state around the buggy address:
[   22.344087]  ffff888102c39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.345154]  ffff888102c3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.346143] >ffff888102c3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.346963]                                               ^
[   22.347711]  ffff888102c3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.348534]  ffff888102c3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.349246] ==================================================================
[   22.155797] ==================================================================
[   22.156383] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   22.157472] Write of size 1 at addr ffff8881003940eb by task kunit_try_catch/166
[   22.158119] 
[   22.158346] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.159342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.160159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.160974] Call Trace:
[   22.161484]  <TASK>
[   22.161697]  dump_stack_lvl+0x73/0xb0
[   22.162263]  print_report+0xd1/0x640
[   22.162841]  ? __virt_addr_valid+0x1db/0x2d0
[   22.163483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.163940]  kasan_report+0x102/0x140
[   22.164383]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   22.165032]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   22.166279]  __asan_report_store1_noabort+0x1b/0x30
[   22.166952]  krealloc_less_oob_helper+0xd49/0x11d0
[   22.167426]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.168222]  ? finish_task_switch.isra.0+0x153/0x700
[   22.168894]  ? __switch_to+0x5d9/0xf60
[   22.169959]  ? __schedule+0xc3e/0x2790
[   22.171198]  ? __pfx_read_tsc+0x10/0x10
[   22.171834]  krealloc_less_oob+0x1c/0x30
[   22.172862]  kunit_try_run_case+0x1b3/0x490
[   22.173329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.174727]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.175135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.176091]  ? __kthread_parkme+0x82/0x160
[   22.176895]  ? preempt_count_sub+0x50/0x80
[   22.177280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.177783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.178438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.179615]  kthread+0x257/0x310
[   22.179880]  ? __pfx_kthread+0x10/0x10
[   22.180623]  ret_from_fork+0x41/0x80
[   22.181162]  ? __pfx_kthread+0x10/0x10
[   22.181844]  ret_from_fork_asm+0x1a/0x30
[   22.182725]  </TASK>
[   22.183148] 
[   22.183563] Allocated by task 166:
[   22.184047]  kasan_save_stack+0x3d/0x60
[   22.184725]  kasan_save_track+0x18/0x40
[   22.185232]  kasan_save_alloc_info+0x3b/0x50
[   22.185692]  __kasan_krealloc+0x190/0x1f0
[   22.186197]  krealloc_noprof+0xf3/0x340
[   22.186589]  krealloc_less_oob_helper+0x1ab/0x11d0
[   22.187574]  krealloc_less_oob+0x1c/0x30
[   22.188028]  kunit_try_run_case+0x1b3/0x490
[   22.188767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.189599]  kthread+0x257/0x310
[   22.190036]  ret_from_fork+0x41/0x80
[   22.190876]  ret_from_fork_asm+0x1a/0x30
[   22.191170] 
[   22.191628] The buggy address belongs to the object at ffff888100394000
[   22.191628]  which belongs to the cache kmalloc-256 of size 256
[   22.192999] The buggy address is located 34 bytes to the right of
[   22.192999]  allocated 201-byte region [ffff888100394000, ffff8881003940c9)
[   22.194032] 
[   22.194585] The buggy address belongs to the physical page:
[   22.194963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100394
[   22.196842] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.197962] flags: 0x200000000000040(head|node=0|zone=2)
[   22.198693] page_type: f5(slab)
[   22.198941] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.199231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.200350] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.201951] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.203747] head: 0200000000000001 ffffea000400e501 ffffffffffffffff 0000000000000000
[   22.204541] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.205130] page dumped because: kasan: bad access detected
[   22.206008] 
[   22.206226] Memory state around the buggy address:
[   22.206621]  ffff888100393f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.208298]  ffff888100394000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.209245] >ffff888100394080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.209940]                                                           ^
[   22.211096]  ffff888100394100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.211799]  ffff888100394180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.212715] ==================================================================