Hay
Date
Dec. 5, 2024, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   29.674160] ==================================================================
[   29.675331] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.677486] Write of size 1 at addr fff00000c644e0c9 by task kunit_try_catch/151
[   29.678379] 
[   29.678706] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.680433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.681041] Hardware name: linux,dummy-virt (DT)
[   29.681625] Call trace:
[   29.682025]  show_stack+0x20/0x38 (C)
[   29.682544]  dump_stack_lvl+0x8c/0xd0
[   29.683085]  print_report+0x118/0x5e0
[   29.683683]  kasan_report+0xc8/0x118
[   29.684424]  __asan_report_store1_noabort+0x20/0x30
[   29.685514]  krealloc_less_oob_helper+0xa48/0xc50
[   29.686062]  krealloc_large_less_oob+0x20/0x38
[   29.686761]  kunit_try_run_case+0x14c/0x3d0
[   29.687423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.688203]  kthread+0x24c/0x2d0
[   29.688784]  ret_from_fork+0x10/0x20
[   29.689585] 
[   29.689927] The buggy address belongs to the physical page:
[   29.690616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.692028] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.692899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.693736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.694806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.695701] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.696956] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.697819] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.698768] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.700001] page dumped because: kasan: bad access detected
[   29.700722] 
[   29.701117] Memory state around the buggy address:
[   29.701954]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.702766]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.703689] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.704931]                                               ^
[   29.705646]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.706545]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.707555] ==================================================================
[   29.370784] ==================================================================
[   29.372699] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.373441] Write of size 1 at addr fff00000c09762c9 by task kunit_try_catch/147
[   29.374260] 
[   29.374669] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.375865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.376437] Hardware name: linux,dummy-virt (DT)
[   29.377202] Call trace:
[   29.377720]  show_stack+0x20/0x38 (C)
[   29.378325]  dump_stack_lvl+0x8c/0xd0
[   29.378857]  print_report+0x118/0x5e0
[   29.379523]  kasan_report+0xc8/0x118
[   29.380113]  __asan_report_store1_noabort+0x20/0x30
[   29.380870]  krealloc_less_oob_helper+0xa48/0xc50
[   29.381459]  krealloc_less_oob+0x20/0x38
[   29.382196]  kunit_try_run_case+0x14c/0x3d0
[   29.382794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.383607]  kthread+0x24c/0x2d0
[   29.384134]  ret_from_fork+0x10/0x20
[   29.384719] 
[   29.385048] Allocated by task 147:
[   29.385559]  kasan_save_stack+0x3c/0x68
[   29.386237]  kasan_save_track+0x20/0x40
[   29.386861]  kasan_save_alloc_info+0x40/0x58
[   29.387471]  __kasan_krealloc+0x118/0x178
[   29.388097]  krealloc_noprof+0x128/0x360
[   29.388641]  krealloc_less_oob_helper+0x168/0xc50
[   29.389305]  krealloc_less_oob+0x20/0x38
[   29.389902]  kunit_try_run_case+0x14c/0x3d0
[   29.390558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.391314]  kthread+0x24c/0x2d0
[   29.391845]  ret_from_fork+0x10/0x20
[   29.392422] 
[   29.392732] The buggy address belongs to the object at fff00000c0976200
[   29.392732]  which belongs to the cache kmalloc-256 of size 256
[   29.394121] The buggy address is located 0 bytes to the right of
[   29.394121]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.395561] 
[   29.395856] The buggy address belongs to the physical page:
[   29.396479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.397475] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.398522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.399388] page_type: f5(slab)
[   29.400110] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.401242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.402171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.403096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.404003] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.404902] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.405909] page dumped because: kasan: bad access detected
[   29.406663] 
[   29.407053] Memory state around the buggy address:
[   29.407668]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.408525]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.409437] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.410301]                                               ^
[   29.410982]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.411847]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.412736] ==================================================================
[   29.708911] ==================================================================
[   29.709604] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.711217] Write of size 1 at addr fff00000c644e0d0 by task kunit_try_catch/151
[   29.711971] 
[   29.713439] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.714592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.715179] Hardware name: linux,dummy-virt (DT)
[   29.715755] Call trace:
[   29.716270]  show_stack+0x20/0x38 (C)
[   29.716790]  dump_stack_lvl+0x8c/0xd0
[   29.717928]  print_report+0x118/0x5e0
[   29.718479]  kasan_report+0xc8/0x118
[   29.719132]  __asan_report_store1_noabort+0x20/0x30
[   29.720311]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.721034]  krealloc_large_less_oob+0x20/0x38
[   29.721723]  kunit_try_run_case+0x14c/0x3d0
[   29.722318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.723050]  kthread+0x24c/0x2d0
[   29.724149]  ret_from_fork+0x10/0x20
[   29.724809] 
[   29.725151] The buggy address belongs to the physical page:
[   29.725791] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.726704] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.727672] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.728812] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.730194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.731595] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.732559] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.733371] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.734349] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.735327] page dumped because: kasan: bad access detected
[   29.736432] 
[   29.736718] Memory state around the buggy address:
[   29.737206]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.737903]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.738743] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.740305]                                                  ^
[   29.741008]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.741891]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.742738] ==================================================================
[   29.814951] ==================================================================
[   29.816299] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.818143] Write of size 1 at addr fff00000c644e0eb by task kunit_try_catch/151
[   29.819120] 
[   29.819398] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.820802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.821362] Hardware name: linux,dummy-virt (DT)
[   29.821957] Call trace:
[   29.822482]  show_stack+0x20/0x38 (C)
[   29.823106]  dump_stack_lvl+0x8c/0xd0
[   29.823816]  print_report+0x118/0x5e0
[   29.824318]  kasan_report+0xc8/0x118
[   29.825437]  __asan_report_store1_noabort+0x20/0x30
[   29.826095]  krealloc_less_oob_helper+0xa58/0xc50
[   29.826751]  krealloc_large_less_oob+0x20/0x38
[   29.828015]  kunit_try_run_case+0x14c/0x3d0
[   29.828555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.829350]  kthread+0x24c/0x2d0
[   29.829846]  ret_from_fork+0x10/0x20
[   29.830507] 
[   29.830839] The buggy address belongs to the physical page:
[   29.832303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.833204] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.834139] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.834999] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.836256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.837462] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.838382] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.840104] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.841014] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.841836] page dumped because: kasan: bad access detected
[   29.842691] 
[   29.843048] Memory state around the buggy address:
[   29.844408]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.845303]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.846186] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.847069]                                                           ^
[   29.848396]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.849295]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.850168] ==================================================================
[   29.744669] ==================================================================
[   29.745743] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.747958] Write of size 1 at addr fff00000c644e0da by task kunit_try_catch/151
[   29.748698] 
[   29.749199] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.750426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.750903] Hardware name: linux,dummy-virt (DT)
[   29.752601] Call trace:
[   29.753008]  show_stack+0x20/0x38 (C)
[   29.753611]  dump_stack_lvl+0x8c/0xd0
[   29.754160]  print_report+0x118/0x5e0
[   29.754703]  kasan_report+0xc8/0x118
[   29.755346]  __asan_report_store1_noabort+0x20/0x30
[   29.756009]  krealloc_less_oob_helper+0xa80/0xc50
[   29.756730]  krealloc_large_less_oob+0x20/0x38
[   29.757803]  kunit_try_run_case+0x14c/0x3d0
[   29.758437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.759409]  kthread+0x24c/0x2d0
[   29.760399]  ret_from_fork+0x10/0x20
[   29.760974] 
[   29.761292] The buggy address belongs to the physical page:
[   29.761965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.762722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.764069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.765337] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.766177] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.767156] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.768197] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.769607] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.770908] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.771762] page dumped because: kasan: bad access detected
[   29.772443] 
[   29.772743] Memory state around the buggy address:
[   29.773803]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.774636]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.775931] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.776721]                                                     ^
[   29.777573]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.779068]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.780261] ==================================================================
[   29.549001] ==================================================================
[   29.549769] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.551577] Write of size 1 at addr fff00000c09762eb by task kunit_try_catch/147
[   29.553269] 
[   29.553806] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.554978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.555494] Hardware name: linux,dummy-virt (DT)
[   29.556079] Call trace:
[   29.556525]  show_stack+0x20/0x38 (C)
[   29.557264]  dump_stack_lvl+0x8c/0xd0
[   29.558010]  print_report+0x118/0x5e0
[   29.558581]  kasan_report+0xc8/0x118
[   29.559151]  __asan_report_store1_noabort+0x20/0x30
[   29.559707]  krealloc_less_oob_helper+0xa58/0xc50
[   29.560459]  krealloc_less_oob+0x20/0x38
[   29.561082]  kunit_try_run_case+0x14c/0x3d0
[   29.561781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.562518]  kthread+0x24c/0x2d0
[   29.563169]  ret_from_fork+0x10/0x20
[   29.563792] 
[   29.564126] Allocated by task 147:
[   29.564622]  kasan_save_stack+0x3c/0x68
[   29.565179]  kasan_save_track+0x20/0x40
[   29.565740]  kasan_save_alloc_info+0x40/0x58
[   29.566281]  __kasan_krealloc+0x118/0x178
[   29.566962]  krealloc_noprof+0x128/0x360
[   29.567543]  krealloc_less_oob_helper+0x168/0xc50
[   29.568227]  krealloc_less_oob+0x20/0x38
[   29.568799]  kunit_try_run_case+0x14c/0x3d0
[   29.569376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.570238]  kthread+0x24c/0x2d0
[   29.570724]  ret_from_fork+0x10/0x20
[   29.571374] 
[   29.571699] The buggy address belongs to the object at fff00000c0976200
[   29.571699]  which belongs to the cache kmalloc-256 of size 256
[   29.573176] The buggy address is located 34 bytes to the right of
[   29.573176]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.574468] 
[   29.574945] The buggy address belongs to the physical page:
[   29.575500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.576474] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.577380] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.578234] page_type: f5(slab)
[   29.578763] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.579749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.580746] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.581785] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.582636] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.583548] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.584426] page dumped because: kasan: bad access detected
[   29.585129] 
[   29.585442] Memory state around the buggy address:
[   29.586126]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.586992]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.587808] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.588619]                                                           ^
[   29.589477]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.590344]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.591187] ==================================================================
[   29.460976] ==================================================================
[   29.461681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.462296] Write of size 1 at addr fff00000c09762da by task kunit_try_catch/147
[   29.463105] 
[   29.463491] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.464606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.465310] Hardware name: linux,dummy-virt (DT)
[   29.466019] Call trace:
[   29.466401]  show_stack+0x20/0x38 (C)
[   29.467035]  dump_stack_lvl+0x8c/0xd0
[   29.467637]  print_report+0x118/0x5e0
[   29.468404]  kasan_report+0xc8/0x118
[   29.469000]  __asan_report_store1_noabort+0x20/0x30
[   29.469757]  krealloc_less_oob_helper+0xa80/0xc50
[   29.470480]  krealloc_less_oob+0x20/0x38
[   29.471184]  kunit_try_run_case+0x14c/0x3d0
[   29.471730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.472464]  kthread+0x24c/0x2d0
[   29.473079]  ret_from_fork+0x10/0x20
[   29.473702] 
[   29.474137] Allocated by task 147:
[   29.474685]  kasan_save_stack+0x3c/0x68
[   29.475322]  kasan_save_track+0x20/0x40
[   29.475813]  kasan_save_alloc_info+0x40/0x58
[   29.476448]  __kasan_krealloc+0x118/0x178
[   29.477141]  krealloc_noprof+0x128/0x360
[   29.477731]  krealloc_less_oob_helper+0x168/0xc50
[   29.478328]  krealloc_less_oob+0x20/0x38
[   29.478949]  kunit_try_run_case+0x14c/0x3d0
[   29.479568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.480325]  kthread+0x24c/0x2d0
[   29.480817]  ret_from_fork+0x10/0x20
[   29.481441] 
[   29.481890] The buggy address belongs to the object at fff00000c0976200
[   29.481890]  which belongs to the cache kmalloc-256 of size 256
[   29.483339] The buggy address is located 17 bytes to the right of
[   29.483339]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.484730] 
[   29.485048] The buggy address belongs to the physical page:
[   29.485811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.486742] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.487722] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.488573] page_type: f5(slab)
[   29.489044] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.489942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.490930] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.492040] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.492866] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.493751] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.494799] page dumped because: kasan: bad access detected
[   29.495473] 
[   29.495816] Memory state around the buggy address:
[   29.496471]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.497524]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.498591] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.499572]                                                     ^
[   29.500507]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.501479]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.502271] ==================================================================
[   29.503907] ==================================================================
[   29.505562] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.506665] Write of size 1 at addr fff00000c09762ea by task kunit_try_catch/147
[   29.507850] 
[   29.508294] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.509566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.510128] Hardware name: linux,dummy-virt (DT)
[   29.510682] Call trace:
[   29.511144]  show_stack+0x20/0x38 (C)
[   29.511702]  dump_stack_lvl+0x8c/0xd0
[   29.512820]  print_report+0x118/0x5e0
[   29.513687]  kasan_report+0xc8/0x118
[   29.514419]  __asan_report_store1_noabort+0x20/0x30
[   29.515264]  krealloc_less_oob_helper+0xae4/0xc50
[   29.516095]  krealloc_less_oob+0x20/0x38
[   29.516662]  kunit_try_run_case+0x14c/0x3d0
[   29.517236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.518084]  kthread+0x24c/0x2d0
[   29.518652]  ret_from_fork+0x10/0x20
[   29.519369] 
[   29.519609] Allocated by task 147:
[   29.520198]  kasan_save_stack+0x3c/0x68
[   29.520787]  kasan_save_track+0x20/0x40
[   29.521440]  kasan_save_alloc_info+0x40/0x58
[   29.522180]  __kasan_krealloc+0x118/0x178
[   29.522835]  krealloc_noprof+0x128/0x360
[   29.523447]  krealloc_less_oob_helper+0x168/0xc50
[   29.524121]  krealloc_less_oob+0x20/0x38
[   29.524724]  kunit_try_run_case+0x14c/0x3d0
[   29.525309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.526075]  kthread+0x24c/0x2d0
[   29.526653]  ret_from_fork+0x10/0x20
[   29.527182] 
[   29.527518] The buggy address belongs to the object at fff00000c0976200
[   29.527518]  which belongs to the cache kmalloc-256 of size 256
[   29.529020] The buggy address is located 33 bytes to the right of
[   29.529020]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.530431] 
[   29.530711] The buggy address belongs to the physical page:
[   29.531505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.532405] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.533331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.534153] page_type: f5(slab)
[   29.534684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.535563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.536583] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.537599] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.538535] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.539589] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.540541] page dumped because: kasan: bad access detected
[   29.541220] 
[   29.541555] Memory state around the buggy address:
[   29.542144]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.543059]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.543892] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.544734]                                                           ^
[   29.545639]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.546602]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.547513] ==================================================================
[   29.414662] ==================================================================
[   29.416408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.417304] Write of size 1 at addr fff00000c09762d0 by task kunit_try_catch/147
[   29.418103] 
[   29.419167] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.420541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.421096] Hardware name: linux,dummy-virt (DT)
[   29.421648] Call trace:
[   29.422781]  show_stack+0x20/0x38 (C)
[   29.423384]  dump_stack_lvl+0x8c/0xd0
[   29.423934]  print_report+0x118/0x5e0
[   29.424513]  kasan_report+0xc8/0x118
[   29.425394]  __asan_report_store1_noabort+0x20/0x30
[   29.426027]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.426663]  krealloc_less_oob+0x20/0x38
[   29.427682]  kunit_try_run_case+0x14c/0x3d0
[   29.428335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.429281]  kthread+0x24c/0x2d0
[   29.429997]  ret_from_fork+0x10/0x20
[   29.430650] 
[   29.431021] Allocated by task 147:
[   29.431712]  kasan_save_stack+0x3c/0x68
[   29.432900]  kasan_save_track+0x20/0x40
[   29.433518]  kasan_save_alloc_info+0x40/0x58
[   29.434205]  __kasan_krealloc+0x118/0x178
[   29.434841]  krealloc_noprof+0x128/0x360
[   29.435413]  krealloc_less_oob_helper+0x168/0xc50
[   29.436043]  krealloc_less_oob+0x20/0x38
[   29.436631]  kunit_try_run_case+0x14c/0x3d0
[   29.437223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.437978]  kthread+0x24c/0x2d0
[   29.438450]  ret_from_fork+0x10/0x20
[   29.439084] 
[   29.439491] The buggy address belongs to the object at fff00000c0976200
[   29.439491]  which belongs to the cache kmalloc-256 of size 256
[   29.440930] The buggy address is located 7 bytes to the right of
[   29.440930]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.442280] 
[   29.442652] The buggy address belongs to the physical page:
[   29.443355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.444293] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.445198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.446085] page_type: f5(slab)
[   29.446556] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.447428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.448446] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.449410] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.450359] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.451302] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.452190] page dumped because: kasan: bad access detected
[   29.452843] 
[   29.453197] Memory state around the buggy address:
[   29.453940]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.454898]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.455692] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.456608]                                                  ^
[   29.457307]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.458171]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.459132] ==================================================================
[   29.781608] ==================================================================
[   29.782433] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.784090] Write of size 1 at addr fff00000c644e0ea by task kunit_try_catch/151
[   29.785052] 
[   29.785422] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.786600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.787130] Hardware name: linux,dummy-virt (DT)
[   29.788128] Call trace:
[   29.788449]  show_stack+0x20/0x38 (C)
[   29.789161]  dump_stack_lvl+0x8c/0xd0
[   29.789702]  print_report+0x118/0x5e0
[   29.790312]  kasan_report+0xc8/0x118
[   29.790863]  __asan_report_store1_noabort+0x20/0x30
[   29.792334]  krealloc_less_oob_helper+0xae4/0xc50
[   29.793028]  krealloc_large_less_oob+0x20/0x38
[   29.793657]  kunit_try_run_case+0x14c/0x3d0
[   29.794336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.795526]  kthread+0x24c/0x2d0
[   29.796163]  ret_from_fork+0x10/0x20
[   29.796740] 
[   29.797117] The buggy address belongs to the physical page:
[   29.797862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.798766] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.800001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.801040] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.801841] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.803057] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.804216] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.805412] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.806321] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.807120] page dumped because: kasan: bad access detected
[   29.807891] 
[   29.808190] Memory state around the buggy address:
[   29.809546]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.810183]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.810612] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.811035]                                                           ^
[   29.811416]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.811819]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.813448] ==================================================================

[   27.124896] ==================================================================
[   27.126159] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   27.127570] Write of size 1 at addr ffff8881009ab0ea by task kunit_try_catch/165
[   27.129550] 
[   27.130074] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.131413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.132658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.134073] Call Trace:
[   27.134400]  <TASK>
[   27.134872]  dump_stack_lvl+0x73/0xb0
[   27.135829]  print_report+0xd1/0x640
[   27.136310]  ? __virt_addr_valid+0x1db/0x2d0
[   27.137349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.137919]  kasan_report+0x102/0x140
[   27.139018]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.139483]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.140781]  __asan_report_store1_noabort+0x1b/0x30
[   27.141405]  krealloc_less_oob_helper+0xe92/0x11d0
[   27.142004]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.142665]  ? finish_task_switch.isra.0+0x153/0x700
[   27.144059]  ? __switch_to+0x5d9/0xf60
[   27.144617]  ? __schedule+0xc70/0x27e0
[   27.145480]  ? __pfx_read_tsc+0x10/0x10
[   27.146497]  krealloc_less_oob+0x1c/0x30
[   27.147879]  kunit_try_run_case+0x1b3/0x490
[   27.148904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.150331]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.151405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.152621]  ? __kthread_parkme+0x82/0x160
[   27.154312]  ? preempt_count_sub+0x50/0x80
[   27.155172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.155724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.157263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.157956]  kthread+0x257/0x310
[   27.158395]  ? __pfx_kthread+0x10/0x10
[   27.159141]  ret_from_fork+0x41/0x80
[   27.159450]  ? __pfx_kthread+0x10/0x10
[   27.160353]  ret_from_fork_asm+0x1a/0x30
[   27.160910]  </TASK>
[   27.161355] 
[   27.161557] Allocated by task 165:
[   27.162589]  kasan_save_stack+0x3d/0x60
[   27.163343]  kasan_save_track+0x18/0x40
[   27.164362]  kasan_save_alloc_info+0x3b/0x50
[   27.165416]  __kasan_krealloc+0x190/0x1f0
[   27.166481]  krealloc_noprof+0xf3/0x340
[   27.167207]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.167588]  krealloc_less_oob+0x1c/0x30
[   27.167971]  kunit_try_run_case+0x1b3/0x490
[   27.168350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.169031]  kthread+0x257/0x310
[   27.170446]  ret_from_fork+0x41/0x80
[   27.171381]  ret_from_fork_asm+0x1a/0x30
[   27.172395] 
[   27.172796] The buggy address belongs to the object at ffff8881009ab000
[   27.172796]  which belongs to the cache kmalloc-256 of size 256
[   27.174619] The buggy address is located 33 bytes to the right of
[   27.174619]  allocated 201-byte region [ffff8881009ab000, ffff8881009ab0c9)
[   27.177509] 
[   27.177790] The buggy address belongs to the physical page:
[   27.178406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009aa
[   27.180251] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.181756] flags: 0x200000000000040(head|node=0|zone=2)
[   27.182660] page_type: f5(slab)
[   27.183465] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.184721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.186320] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.188161] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.190045] head: 0200000000000001 ffffea0004026a81 ffffffffffffffff 0000000000000000
[   27.191456] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.192584] page dumped because: kasan: bad access detected
[   27.194553] 
[   27.195757] Memory state around the buggy address:
[   27.196122]  ffff8881009aaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.197493]  ffff8881009ab000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.198502] >ffff8881009ab080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.199119]                                                           ^
[   27.200294]  ffff8881009ab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.202133]  ffff8881009ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.203342] ==================================================================
[   27.205071] ==================================================================
[   27.205888] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   27.206473] Write of size 1 at addr ffff8881009ab0eb by task kunit_try_catch/165
[   27.207440] 
[   27.207626] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.209413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.209996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.210640] Call Trace:
[   27.211126]  <TASK>
[   27.211658]  dump_stack_lvl+0x73/0xb0
[   27.212461]  print_report+0xd1/0x640
[   27.212770]  ? __virt_addr_valid+0x1db/0x2d0
[   27.213830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.214805]  kasan_report+0x102/0x140
[   27.215093]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.215959]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.216651]  __asan_report_store1_noabort+0x1b/0x30
[   27.217722]  krealloc_less_oob_helper+0xd49/0x11d0
[   27.218963]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.219975]  ? finish_task_switch.isra.0+0x153/0x700
[   27.220767]  ? __switch_to+0x5d9/0xf60
[   27.221595]  ? __schedule+0xc70/0x27e0
[   27.222070]  ? __pfx_read_tsc+0x10/0x10
[   27.222499]  krealloc_less_oob+0x1c/0x30
[   27.223379]  kunit_try_run_case+0x1b3/0x490
[   27.223817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.224434]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.225425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.226206]  ? __kthread_parkme+0x82/0x160
[   27.226936]  ? preempt_count_sub+0x50/0x80
[   27.227559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.228603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.229264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.230015]  kthread+0x257/0x310
[   27.230667]  ? __pfx_kthread+0x10/0x10
[   27.231541]  ret_from_fork+0x41/0x80
[   27.232204]  ? __pfx_kthread+0x10/0x10
[   27.232853]  ret_from_fork_asm+0x1a/0x30
[   27.233344]  </TASK>
[   27.233584] 
[   27.233806] Allocated by task 165:
[   27.234156]  kasan_save_stack+0x3d/0x60
[   27.234540]  kasan_save_track+0x18/0x40
[   27.235583]  kasan_save_alloc_info+0x3b/0x50
[   27.236537]  __kasan_krealloc+0x190/0x1f0
[   27.237638]  krealloc_noprof+0xf3/0x340
[   27.238223]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.238484]  krealloc_less_oob+0x1c/0x30
[   27.238672]  kunit_try_run_case+0x1b3/0x490
[   27.239192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.240220]  kthread+0x257/0x310
[   27.240976]  ret_from_fork+0x41/0x80
[   27.241443]  ret_from_fork_asm+0x1a/0x30
[   27.242162] 
[   27.242500] The buggy address belongs to the object at ffff8881009ab000
[   27.242500]  which belongs to the cache kmalloc-256 of size 256
[   27.244439] The buggy address is located 34 bytes to the right of
[   27.244439]  allocated 201-byte region [ffff8881009ab000, ffff8881009ab0c9)
[   27.245779] 
[   27.246284] The buggy address belongs to the physical page:
[   27.246821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009aa
[   27.247552] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.248856] flags: 0x200000000000040(head|node=0|zone=2)
[   27.249457] page_type: f5(slab)
[   27.250503] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.251542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.252319] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.252979] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.253863] head: 0200000000000001 ffffea0004026a81 ffffffffffffffff 0000000000000000
[   27.254560] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.255622] page dumped because: kasan: bad access detected
[   27.256397] 
[   27.256546] Memory state around the buggy address:
[   27.257081]  ffff8881009aaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.258120]  ffff8881009ab000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.259222] >ffff8881009ab080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.260142]                                                           ^
[   27.261416]  ffff8881009ab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.262502]  ffff8881009ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.263408] ==================================================================
[   27.365533] ==================================================================
[   27.366852] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   27.367562] Write of size 1 at addr ffff8881027aa0c9 by task kunit_try_catch/169
[   27.368417] 
[   27.368866] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.370748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.371573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.372325] Call Trace:
[   27.372628]  <TASK>
[   27.373435]  dump_stack_lvl+0x73/0xb0
[   27.373991]  print_report+0xd1/0x640
[   27.374920]  ? __virt_addr_valid+0x1db/0x2d0
[   27.375560]  ? kasan_addr_to_slab+0x11/0xa0
[   27.376607]  kasan_report+0x102/0x140
[   27.377155]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   27.378277]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   27.378721]  __asan_report_store1_noabort+0x1b/0x30
[   27.379549]  krealloc_less_oob_helper+0xd72/0x11d0
[   27.380397]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.380751]  ? finish_task_switch.isra.0+0x153/0x700
[   27.382121]  ? __switch_to+0x5d9/0xf60
[   27.382479]  ? __schedule+0xc70/0x27e0
[   27.382917]  ? __pfx_read_tsc+0x10/0x10
[   27.383846]  krealloc_large_less_oob+0x1c/0x30
[   27.385162]  kunit_try_run_case+0x1b3/0x490
[   27.385620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.386702]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.386983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.388067]  ? __kthread_parkme+0x82/0x160
[   27.388556]  ? preempt_count_sub+0x50/0x80
[   27.389398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.390331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.391132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.392101]  kthread+0x257/0x310
[   27.392992]  ? __pfx_kthread+0x10/0x10
[   27.393412]  ret_from_fork+0x41/0x80
[   27.394053]  ? __pfx_kthread+0x10/0x10
[   27.394598]  ret_from_fork_asm+0x1a/0x30
[   27.395120]  </TASK>
[   27.395447] 
[   27.395672] The buggy address belongs to the physical page:
[   27.396390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a8
[   27.397729] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.398512] flags: 0x200000000000040(head|node=0|zone=2)
[   27.399738] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.400515] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.401341] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.402610] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.403408] head: 0200000000000002 ffffea000409ea01 ffffffffffffffff 0000000000000000
[   27.404541] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.405495] page dumped because: kasan: bad access detected
[   27.406477] 
[   27.406937] Memory state around the buggy address:
[   27.407450]  ffff8881027a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.408643]  ffff8881027aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.409606] >ffff8881027aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.410454]                                               ^
[   27.411487]  ffff8881027aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.412319]  ffff8881027aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.413125] ==================================================================
[   27.461318] ==================================================================
[   27.461930] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   27.463885] Write of size 1 at addr ffff8881027aa0da by task kunit_try_catch/169
[   27.464611] 
[   27.465361] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.467343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.467749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.468641] Call Trace:
[   27.469239]  <TASK>
[   27.469545]  dump_stack_lvl+0x73/0xb0
[   27.470195]  print_report+0xd1/0x640
[   27.470567]  ? __virt_addr_valid+0x1db/0x2d0
[   27.471197]  ? kasan_addr_to_slab+0x11/0xa0
[   27.471542]  kasan_report+0x102/0x140
[   27.472322]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.472986]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.473721]  __asan_report_store1_noabort+0x1b/0x30
[   27.474243]  krealloc_less_oob_helper+0xec8/0x11d0
[   27.474748]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.475499]  ? finish_task_switch.isra.0+0x153/0x700
[   27.476174]  ? __switch_to+0x5d9/0xf60
[   27.476772]  ? __schedule+0xc70/0x27e0
[   27.477407]  ? __pfx_read_tsc+0x10/0x10
[   27.478143]  krealloc_large_less_oob+0x1c/0x30
[   27.479300]  kunit_try_run_case+0x1b3/0x490
[   27.479961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.480631]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.481511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.482316]  ? __kthread_parkme+0x82/0x160
[   27.483294]  ? preempt_count_sub+0x50/0x80
[   27.483716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.484440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.485493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.486216]  kthread+0x257/0x310
[   27.486919]  ? __pfx_kthread+0x10/0x10
[   27.487502]  ret_from_fork+0x41/0x80
[   27.487801]  ? __pfx_kthread+0x10/0x10
[   27.488354]  ret_from_fork_asm+0x1a/0x30
[   27.489254]  </TASK>
[   27.489627] 
[   27.490086] The buggy address belongs to the physical page:
[   27.490601] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a8
[   27.491400] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.492303] flags: 0x200000000000040(head|node=0|zone=2)
[   27.493025] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.493854] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.494712] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.495645] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.496737] head: 0200000000000002 ffffea000409ea01 ffffffffffffffff 0000000000000000
[   27.497740] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.498434] page dumped because: kasan: bad access detected
[   27.499226] 
[   27.499468] Memory state around the buggy address:
[   27.500342]  ffff8881027a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.501128]  ffff8881027aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.502049] >ffff8881027aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.503264]                                                     ^
[   27.503888]  ffff8881027aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.504510]  ffff8881027aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.505283] ==================================================================
[   27.006390] ==================================================================
[   27.007645] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   27.008868] Write of size 1 at addr ffff8881009ab0d0 by task kunit_try_catch/165
[   27.010260] 
[   27.010511] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.011944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.012712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.014018] Call Trace:
[   27.014335]  <TASK>
[   27.014610]  dump_stack_lvl+0x73/0xb0
[   27.015028]  print_report+0xd1/0x640
[   27.015400]  ? __virt_addr_valid+0x1db/0x2d0
[   27.016439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.017048]  kasan_report+0x102/0x140
[   27.017419]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.017981]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.018540]  __asan_report_store1_noabort+0x1b/0x30
[   27.020198]  krealloc_less_oob_helper+0xe25/0x11d0
[   27.020802]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.021655]  ? finish_task_switch.isra.0+0x153/0x700
[   27.022159]  ? __switch_to+0x5d9/0xf60
[   27.022519]  ? __schedule+0xc70/0x27e0
[   27.022926]  ? __pfx_read_tsc+0x10/0x10
[   27.023302]  krealloc_less_oob+0x1c/0x30
[   27.024645]  kunit_try_run_case+0x1b3/0x490
[   27.025287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.025955]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.026798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.027631]  ? __kthread_parkme+0x82/0x160
[   27.028727]  ? preempt_count_sub+0x50/0x80
[   27.029142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.029543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.030924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.031703]  kthread+0x257/0x310
[   27.032226]  ? __pfx_kthread+0x10/0x10
[   27.032810]  ret_from_fork+0x41/0x80
[   27.033720]  ? __pfx_kthread+0x10/0x10
[   27.034410]  ret_from_fork_asm+0x1a/0x30
[   27.035194]  </TASK>
[   27.035779] 
[   27.036279] Allocated by task 165:
[   27.036468]  kasan_save_stack+0x3d/0x60
[   27.036656]  kasan_save_track+0x18/0x40
[   27.037300]  kasan_save_alloc_info+0x3b/0x50
[   27.038067]  __kasan_krealloc+0x190/0x1f0
[   27.038843]  krealloc_noprof+0xf3/0x340
[   27.039733]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.040560]  krealloc_less_oob+0x1c/0x30
[   27.041253]  kunit_try_run_case+0x1b3/0x490
[   27.041719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.042261]  kthread+0x257/0x310
[   27.042821]  ret_from_fork+0x41/0x80
[   27.043138]  ret_from_fork_asm+0x1a/0x30
[   27.043821] 
[   27.044235] The buggy address belongs to the object at ffff8881009ab000
[   27.044235]  which belongs to the cache kmalloc-256 of size 256
[   27.045342] The buggy address is located 7 bytes to the right of
[   27.045342]  allocated 201-byte region [ffff8881009ab000, ffff8881009ab0c9)
[   27.047154] 
[   27.047467] The buggy address belongs to the physical page:
[   27.048179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009aa
[   27.048922] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.049730] flags: 0x200000000000040(head|node=0|zone=2)
[   27.050232] page_type: f5(slab)
[   27.050751] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.051484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.052724] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.053507] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.054561] head: 0200000000000001 ffffea0004026a81 ffffffffffffffff 0000000000000000
[   27.055471] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.056230] page dumped because: kasan: bad access detected
[   27.057157] 
[   27.057431] Memory state around the buggy address:
[   27.057849]  ffff8881009aaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.058656]  ffff8881009ab000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.059404] >ffff8881009ab080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.060485]                                                  ^
[   27.060967]  ffff8881009ab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.062069]  ffff8881009ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.062702] ==================================================================
[   27.506103] ==================================================================
[   27.507150] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   27.508357] Write of size 1 at addr ffff8881027aa0ea by task kunit_try_catch/169
[   27.509095] 
[   27.509400] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.510329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.510960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.511857] Call Trace:
[   27.512459]  <TASK>
[   27.512752]  dump_stack_lvl+0x73/0xb0
[   27.513513]  print_report+0xd1/0x640
[   27.513907]  ? __virt_addr_valid+0x1db/0x2d0
[   27.514626]  ? kasan_addr_to_slab+0x11/0xa0
[   27.514971]  kasan_report+0x102/0x140
[   27.515791]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.516515]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.517415]  __asan_report_store1_noabort+0x1b/0x30
[   27.518060]  krealloc_less_oob_helper+0xe92/0x11d0
[   27.518566]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.519667]  ? finish_task_switch.isra.0+0x153/0x700
[   27.520399]  ? __switch_to+0x5d9/0xf60
[   27.520776]  ? __schedule+0xc70/0x27e0
[   27.521298]  ? __pfx_read_tsc+0x10/0x10
[   27.521903]  krealloc_large_less_oob+0x1c/0x30
[   27.522268]  kunit_try_run_case+0x1b3/0x490
[   27.522963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.523811]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.524638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.525021]  ? __kthread_parkme+0x82/0x160
[   27.525545]  ? preempt_count_sub+0x50/0x80
[   27.526085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.526562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.526969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.527674]  kthread+0x257/0x310
[   27.528573]  ? __pfx_kthread+0x10/0x10
[   27.529186]  ret_from_fork+0x41/0x80
[   27.529629]  ? __pfx_kthread+0x10/0x10
[   27.530249]  ret_from_fork_asm+0x1a/0x30
[   27.530667]  </TASK>
[   27.531020] 
[   27.531353] The buggy address belongs to the physical page:
[   27.531997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a8
[   27.532459] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.533710] flags: 0x200000000000040(head|node=0|zone=2)
[   27.534589] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.535482] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.536731] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.537979] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.538841] head: 0200000000000002 ffffea000409ea01 ffffffffffffffff 0000000000000000
[   27.539850] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.540868] page dumped because: kasan: bad access detected
[   27.541561] 
[   27.541843] Memory state around the buggy address:
[   27.542453]  ffff8881027a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.543234]  ffff8881027aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.544180] >ffff8881027aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.545307]                                                           ^
[   27.545988]  ffff8881027aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.547019]  ffff8881027aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.547858] ==================================================================
[   27.414446] ==================================================================
[   27.414893] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   27.417311] Write of size 1 at addr ffff8881027aa0d0 by task kunit_try_catch/169
[   27.418258] 
[   27.418484] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.419398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.420459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.421338] Call Trace:
[   27.421589]  <TASK>
[   27.421799]  dump_stack_lvl+0x73/0xb0
[   27.422150]  print_report+0xd1/0x640
[   27.422855]  ? __virt_addr_valid+0x1db/0x2d0
[   27.423756]  ? kasan_addr_to_slab+0x11/0xa0
[   27.424612]  kasan_report+0x102/0x140
[   27.425427]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.426664]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.427926]  __asan_report_store1_noabort+0x1b/0x30
[   27.428573]  krealloc_less_oob_helper+0xe25/0x11d0
[   27.429735]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.430593]  ? finish_task_switch.isra.0+0x153/0x700
[   27.431395]  ? __switch_to+0x5d9/0xf60
[   27.431809]  ? __schedule+0xc70/0x27e0
[   27.432221]  ? __pfx_read_tsc+0x10/0x10
[   27.432739]  krealloc_large_less_oob+0x1c/0x30
[   27.433406]  kunit_try_run_case+0x1b3/0x490
[   27.434029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.434381]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.435019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.435624]  ? __kthread_parkme+0x82/0x160
[   27.436542]  ? preempt_count_sub+0x50/0x80
[   27.437166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.437713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.438504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.439207]  kthread+0x257/0x310
[   27.439641]  ? __pfx_kthread+0x10/0x10
[   27.440304]  ret_from_fork+0x41/0x80
[   27.441099]  ? __pfx_kthread+0x10/0x10
[   27.441462]  ret_from_fork_asm+0x1a/0x30
[   27.442176]  </TASK>
[   27.442441] 
[   27.442913] The buggy address belongs to the physical page:
[   27.443482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a8
[   27.444441] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.445664] flags: 0x200000000000040(head|node=0|zone=2)
[   27.446782] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.448284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.448584] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.449521] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.450188] head: 0200000000000002 ffffea000409ea01 ffffffffffffffff 0000000000000000
[   27.450839] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.451466] page dumped because: kasan: bad access detected
[   27.452542] 
[   27.452750] Memory state around the buggy address:
[   27.453934]  ffff8881027a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.455103]  ffff8881027aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.456425] >ffff8881027aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.457333]                                                  ^
[   27.458147]  ffff8881027aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.458903]  ffff8881027aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.459914] ==================================================================
[   26.951801] ==================================================================
[   26.953176] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   26.953968] Write of size 1 at addr ffff8881009ab0c9 by task kunit_try_catch/165
[   26.954807] 
[   26.955100] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   26.956421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.956958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.957660] Call Trace:
[   26.958299]  <TASK>
[   26.958663]  dump_stack_lvl+0x73/0xb0
[   26.959195]  print_report+0xd1/0x640
[   26.959623]  ? __virt_addr_valid+0x1db/0x2d0
[   26.960490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.961391]  kasan_report+0x102/0x140
[   26.962462]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   26.963066]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   26.963587]  __asan_report_store1_noabort+0x1b/0x30
[   26.964110]  krealloc_less_oob_helper+0xd72/0x11d0
[   26.964656]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.965692]  ? finish_task_switch.isra.0+0x153/0x700
[   26.966452]  ? __switch_to+0x5d9/0xf60
[   26.966947]  ? __schedule+0xc70/0x27e0
[   26.967636]  ? __pfx_read_tsc+0x10/0x10
[   26.968155]  krealloc_less_oob+0x1c/0x30
[   26.968900]  kunit_try_run_case+0x1b3/0x490
[   26.969626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.970302]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.971141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.971721]  ? __kthread_parkme+0x82/0x160
[   26.972375]  ? preempt_count_sub+0x50/0x80
[   26.972975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.973651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.974555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.975143]  kthread+0x257/0x310
[   26.975737]  ? __pfx_kthread+0x10/0x10
[   26.976386]  ret_from_fork+0x41/0x80
[   26.976821]  ? __pfx_kthread+0x10/0x10
[   26.977510]  ret_from_fork_asm+0x1a/0x30
[   26.978120]  </TASK>
[   26.978354] 
[   26.978615] Allocated by task 165:
[   26.978999]  kasan_save_stack+0x3d/0x60
[   26.979354]  kasan_save_track+0x18/0x40
[   26.980309]  kasan_save_alloc_info+0x3b/0x50
[   26.981094]  __kasan_krealloc+0x190/0x1f0
[   26.981656]  krealloc_noprof+0xf3/0x340
[   26.982321]  krealloc_less_oob_helper+0x1ab/0x11d0
[   26.983089]  krealloc_less_oob+0x1c/0x30
[   26.983610]  kunit_try_run_case+0x1b3/0x490
[   26.984432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.984859]  kthread+0x257/0x310
[   26.985467]  ret_from_fork+0x41/0x80
[   26.985971]  ret_from_fork_asm+0x1a/0x30
[   26.986475] 
[   26.986718] The buggy address belongs to the object at ffff8881009ab000
[   26.986718]  which belongs to the cache kmalloc-256 of size 256
[   26.988270] The buggy address is located 0 bytes to the right of
[   26.988270]  allocated 201-byte region [ffff8881009ab000, ffff8881009ab0c9)
[   26.989811] 
[   26.990080] The buggy address belongs to the physical page:
[   26.990559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009aa
[   26.991511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.992520] flags: 0x200000000000040(head|node=0|zone=2)
[   26.993032] page_type: f5(slab)
[   26.993362] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.994098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.994768] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   26.995434] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.996490] head: 0200000000000001 ffffea0004026a81 ffffffffffffffff 0000000000000000
[   26.996970] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   26.997877] page dumped because: kasan: bad access detected
[   26.998505] 
[   26.999103] Memory state around the buggy address:
[   26.999750]  ffff8881009aaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.000425]  ffff8881009ab000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.001667] >ffff8881009ab080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.002302]                                               ^
[   27.002805]  ffff8881009ab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.003394]  ffff8881009ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.004651] ==================================================================
[   27.064967] ==================================================================
[   27.065389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   27.065720] Write of size 1 at addr ffff8881009ab0da by task kunit_try_catch/165
[   27.066731] 
[   27.067129] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.069246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.069656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.070976] Call Trace:
[   27.071379]  <TASK>
[   27.071890]  dump_stack_lvl+0x73/0xb0
[   27.072462]  print_report+0xd1/0x640
[   27.073457]  ? __virt_addr_valid+0x1db/0x2d0
[   27.074221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.074909]  kasan_report+0x102/0x140
[   27.075761]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.076539]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.077953]  __asan_report_store1_noabort+0x1b/0x30
[   27.078543]  krealloc_less_oob_helper+0xec8/0x11d0
[   27.079333]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.080157]  ? finish_task_switch.isra.0+0x153/0x700
[   27.081424]  ? __switch_to+0x5d9/0xf60
[   27.081796]  ? __schedule+0xc70/0x27e0
[   27.082434]  ? __pfx_read_tsc+0x10/0x10
[   27.083083]  krealloc_less_oob+0x1c/0x30
[   27.083867]  kunit_try_run_case+0x1b3/0x490
[   27.084727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.085533]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.086229]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.086981]  ? __kthread_parkme+0x82/0x160
[   27.087445]  ? preempt_count_sub+0x50/0x80
[   27.088505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.089419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.090015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.090765]  kthread+0x257/0x310
[   27.091431]  ? __pfx_kthread+0x10/0x10
[   27.091804]  ret_from_fork+0x41/0x80
[   27.092863]  ? __pfx_kthread+0x10/0x10
[   27.093138]  ret_from_fork_asm+0x1a/0x30
[   27.093693]  </TASK>
[   27.094271] 
[   27.094631] Allocated by task 165:
[   27.095301]  kasan_save_stack+0x3d/0x60
[   27.096009]  kasan_save_track+0x18/0x40
[   27.096538]  kasan_save_alloc_info+0x3b/0x50
[   27.097130]  __kasan_krealloc+0x190/0x1f0
[   27.097702]  krealloc_noprof+0xf3/0x340
[   27.098829]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.100015]  krealloc_less_oob+0x1c/0x30
[   27.100404]  kunit_try_run_case+0x1b3/0x490
[   27.100908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.101572]  kthread+0x257/0x310
[   27.101944]  ret_from_fork+0x41/0x80
[   27.102505]  ret_from_fork_asm+0x1a/0x30
[   27.103232] 
[   27.103592] The buggy address belongs to the object at ffff8881009ab000
[   27.103592]  which belongs to the cache kmalloc-256 of size 256
[   27.105040] The buggy address is located 17 bytes to the right of
[   27.105040]  allocated 201-byte region [ffff8881009ab000, ffff8881009ab0c9)
[   27.106199] 
[   27.106615] The buggy address belongs to the physical page:
[   27.107656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009aa
[   27.108631] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.109296] flags: 0x200000000000040(head|node=0|zone=2)
[   27.110199] page_type: f5(slab)
[   27.110500] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.111442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.112708] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.113366] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.114093] head: 0200000000000001 ffffea0004026a81 ffffffffffffffff 0000000000000000
[   27.114985] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.116017] page dumped because: kasan: bad access detected
[   27.116400] 
[   27.116701] Memory state around the buggy address:
[   27.117714]  ffff8881009aaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.118642]  ffff8881009ab000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.119210] >ffff8881009ab080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.120562]                                                     ^
[   27.121371]  ffff8881009ab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.122410]  ffff8881009ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.123386] ==================================================================
[   27.548776] ==================================================================
[   27.549620] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   27.550413] Write of size 1 at addr ffff8881027aa0eb by task kunit_try_catch/169
[   27.551369] 
[   27.551786] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   27.553094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.553695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.555177] Call Trace:
[   27.555414]  <TASK>
[   27.555617]  dump_stack_lvl+0x73/0xb0
[   27.556483]  print_report+0xd1/0x640
[   27.556984]  ? __virt_addr_valid+0x1db/0x2d0
[   27.557640]  ? kasan_addr_to_slab+0x11/0xa0
[   27.558732]  kasan_report+0x102/0x140
[   27.559621]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.560662]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.561636]  __asan_report_store1_noabort+0x1b/0x30
[   27.562630]  krealloc_less_oob_helper+0xd49/0x11d0
[   27.563472]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.564435]  ? finish_task_switch.isra.0+0x153/0x700
[   27.565042]  ? __switch_to+0x5d9/0xf60
[   27.565638]  ? __schedule+0xc70/0x27e0
[   27.566547]  ? __pfx_read_tsc+0x10/0x10
[   27.566955]  krealloc_large_less_oob+0x1c/0x30
[   27.567591]  kunit_try_run_case+0x1b3/0x490
[   27.568446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.569182]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.569655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.570338]  ? __kthread_parkme+0x82/0x160
[   27.570771]  ? preempt_count_sub+0x50/0x80
[   27.571268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.571788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.572505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.573579]  kthread+0x257/0x310
[   27.573910]  ? __pfx_kthread+0x10/0x10
[   27.574542]  ret_from_fork+0x41/0x80
[   27.575198]  ? __pfx_kthread+0x10/0x10
[   27.575574]  ret_from_fork_asm+0x1a/0x30
[   27.576122]  </TASK>
[   27.576625] 
[   27.576941] The buggy address belongs to the physical page:
[   27.577698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a8
[   27.578643] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.579377] flags: 0x200000000000040(head|node=0|zone=2)
[   27.580212] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.581106] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.582044] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.582776] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.583747] head: 0200000000000002 ffffea000409ea01 ffffffffffffffff 0000000000000000
[   27.584426] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.585668] page dumped because: kasan: bad access detected
[   27.586443] 
[   27.586752] Memory state around the buggy address:
[   27.587310]  ffff8881027a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.588414]  ffff8881027aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.589032] >ffff8881027aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.589813]                                                           ^
[   27.590560]  ffff8881027aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.591675]  ffff8881027aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.592717] ==================================================================