Hay
Date
May 12, 2025, 11:48 a.m.

Environment
qemu-arm64
qemu-x86_64

[   16.476973] ==================================================================
[   16.477074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.477170] Write of size 1 at addr fff00000c450a4d0 by task kunit_try_catch/158
[   16.477273] 
[   16.477332] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.477503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.477558] Hardware name: linux,dummy-virt (DT)
[   16.477617] Call trace:
[   16.477660]  show_stack+0x20/0x38 (C)
[   16.477760]  dump_stack_lvl+0x8c/0xd0
[   16.477859]  print_report+0x118/0x608
[   16.477967]  kasan_report+0xdc/0x128
[   16.478092]  __asan_report_store1_noabort+0x20/0x30
[   16.478190]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.478287]  krealloc_less_oob+0x20/0x38
[   16.478387]  kunit_try_run_case+0x170/0x3f0
[   16.478480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.478577]  kthread+0x328/0x630
[   16.478668]  ret_from_fork+0x10/0x20
[   16.478774] 
[   16.478816] Allocated by task 158:
[   16.478879]  kasan_save_stack+0x3c/0x68
[   16.478955]  kasan_save_track+0x20/0x40
[   16.479035]  kasan_save_alloc_info+0x40/0x58
[   16.479167]  __kasan_krealloc+0x118/0x178
[   16.479250]  krealloc_noprof+0x128/0x360
[   16.479336]  krealloc_less_oob_helper+0x168/0xc50
[   16.479418]  krealloc_less_oob+0x20/0x38
[   16.479520]  kunit_try_run_case+0x170/0x3f0
[   16.479602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.479679]  kthread+0x328/0x630
[   16.479744]  ret_from_fork+0x10/0x20
[   16.479806] 
[   16.479840] The buggy address belongs to the object at fff00000c450a400
[   16.479840]  which belongs to the cache kmalloc-256 of size 256
[   16.479941] The buggy address is located 7 bytes to the right of
[   16.479941]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.480087] 
[   16.480130] The buggy address belongs to the physical page:
[   16.480187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.480290] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.480382] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.480483] page_type: f5(slab)
[   16.480599] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.480710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.480806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.480903] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.481008] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.481123] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.481217] page dumped because: kasan: bad access detected
[   16.481275] 
[   16.481310] Memory state around the buggy address:
[   16.481366]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481440]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.481529] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.481597]                                                  ^
[   16.481703]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481807]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481935] ==================================================================
[   16.555254] ==================================================================
[   16.555405] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.555555] Write of size 1 at addr fff00000c78e20da by task kunit_try_catch/162
[   16.555678] 
[   16.555742] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.555924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.555980] Hardware name: linux,dummy-virt (DT)
[   16.556051] Call trace:
[   16.556091]  show_stack+0x20/0x38 (C)
[   16.556176]  dump_stack_lvl+0x8c/0xd0
[   16.556301]  print_report+0x118/0x608
[   16.556413]  kasan_report+0xdc/0x128
[   16.556512]  __asan_report_store1_noabort+0x20/0x30
[   16.556606]  krealloc_less_oob_helper+0xa80/0xc50
[   16.556982]  krealloc_large_less_oob+0x20/0x38
[   16.557263]  kunit_try_run_case+0x170/0x3f0
[   16.557357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.557502]  kthread+0x328/0x630
[   16.557597]  ret_from_fork+0x10/0x20
[   16.557725] 
[   16.557761] The buggy address belongs to the physical page:
[   16.557833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.558304] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.558399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.558487] page_type: f8(unknown)
[   16.558527] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558583] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558632] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558676] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558720] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.558764] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.558801] page dumped because: kasan: bad access detected
[   16.558830] 
[   16.558848] Memory state around the buggy address:
[   16.558878]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.558918]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.558956] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.558990]                                                     ^
[   16.559024]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559086]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559122] ==================================================================
[   16.483220] ==================================================================
[   16.483315] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.483412] Write of size 1 at addr fff00000c450a4da by task kunit_try_catch/158
[   16.483514] 
[   16.483573] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.484189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.484269] Hardware name: linux,dummy-virt (DT)
[   16.484338] Call trace:
[   16.484388]  show_stack+0x20/0x38 (C)
[   16.484628]  dump_stack_lvl+0x8c/0xd0
[   16.484858]  print_report+0x118/0x608
[   16.485065]  kasan_report+0xdc/0x128
[   16.485485]  __asan_report_store1_noabort+0x20/0x30
[   16.485731]  krealloc_less_oob_helper+0xa80/0xc50
[   16.485948]  krealloc_less_oob+0x20/0x38
[   16.486031]  kunit_try_run_case+0x170/0x3f0
[   16.486137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.486323]  kthread+0x328/0x630
[   16.486663]  ret_from_fork+0x10/0x20
[   16.486766] 
[   16.486887] Allocated by task 158:
[   16.486950]  kasan_save_stack+0x3c/0x68
[   16.487089]  kasan_save_track+0x20/0x40
[   16.487189]  kasan_save_alloc_info+0x40/0x58
[   16.487310]  __kasan_krealloc+0x118/0x178
[   16.487388]  krealloc_noprof+0x128/0x360
[   16.487461]  krealloc_less_oob_helper+0x168/0xc50
[   16.487538]  krealloc_less_oob+0x20/0x38
[   16.487609]  kunit_try_run_case+0x170/0x3f0
[   16.487681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.487765]  kthread+0x328/0x630
[   16.487831]  ret_from_fork+0x10/0x20
[   16.487900] 
[   16.487940] The buggy address belongs to the object at fff00000c450a400
[   16.487940]  which belongs to the cache kmalloc-256 of size 256
[   16.488068] The buggy address is located 17 bytes to the right of
[   16.488068]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.488206] 
[   16.488252] The buggy address belongs to the physical page:
[   16.488338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.488496] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.488593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.488704] page_type: f5(slab)
[   16.488811] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.488957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489067] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.489155] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489250] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.489344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.489412] page dumped because: kasan: bad access detected
[   16.489470] 
[   16.489501] Memory state around the buggy address:
[   16.489567]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.489655]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.489735] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.489812]                                                     ^
[   16.489901]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.489997]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490088] ==================================================================
[   16.559460] ==================================================================
[   16.559555] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.559661] Write of size 1 at addr fff00000c78e20ea by task kunit_try_catch/162
[   16.559768] 
[   16.559828] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.560002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.560067] Hardware name: linux,dummy-virt (DT)
[   16.560132] Call trace:
[   16.560179]  show_stack+0x20/0x38 (C)
[   16.560282]  dump_stack_lvl+0x8c/0xd0
[   16.560384]  print_report+0x118/0x608
[   16.560480]  kasan_report+0xdc/0x128
[   16.561090]  __asan_report_store1_noabort+0x20/0x30
[   16.562150]  krealloc_less_oob_helper+0xae4/0xc50
[   16.562538]  krealloc_large_less_oob+0x20/0x38
[   16.562651]  kunit_try_run_case+0x170/0x3f0
[   16.563381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.564090]  kthread+0x328/0x630
[   16.564616]  ret_from_fork+0x10/0x20
[   16.565091] 
[   16.565137] The buggy address belongs to the physical page:
[   16.565641] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.566242] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.566406] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.566569] page_type: f8(unknown)
[   16.566684] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.566957] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.567667] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.567806] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.567916] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.568024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.568125] page dumped because: kasan: bad access detected
[   16.568193] 
[   16.568712] Memory state around the buggy address:
[   16.568991]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.569794]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.570002] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.570304]                                                           ^
[   16.570400]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.570499]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.570581] ==================================================================
[   16.490863] ==================================================================
[   16.491211] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.491321] Write of size 1 at addr fff00000c450a4ea by task kunit_try_catch/158
[   16.491425] 
[   16.491483] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.491647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.491703] Hardware name: linux,dummy-virt (DT)
[   16.491843] Call trace:
[   16.491893]  show_stack+0x20/0x38 (C)
[   16.492068]  dump_stack_lvl+0x8c/0xd0
[   16.492264]  print_report+0x118/0x608
[   16.492365]  kasan_report+0xdc/0x128
[   16.492521]  __asan_report_store1_noabort+0x20/0x30
[   16.492634]  krealloc_less_oob_helper+0xae4/0xc50
[   16.492740]  krealloc_less_oob+0x20/0x38
[   16.493203]  kunit_try_run_case+0x170/0x3f0
[   16.493333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.493437]  kthread+0x328/0x630
[   16.493532]  ret_from_fork+0x10/0x20
[   16.493629] 
[   16.493667] Allocated by task 158:
[   16.493723]  kasan_save_stack+0x3c/0x68
[   16.493805]  kasan_save_track+0x20/0x40
[   16.493878]  kasan_save_alloc_info+0x40/0x58
[   16.493971]  __kasan_krealloc+0x118/0x178
[   16.494310]  krealloc_noprof+0x128/0x360
[   16.494501]  krealloc_less_oob_helper+0x168/0xc50
[   16.494550]  krealloc_less_oob+0x20/0x38
[   16.494598]  kunit_try_run_case+0x170/0x3f0
[   16.494656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.494758]  kthread+0x328/0x630
[   16.494854]  ret_from_fork+0x10/0x20
[   16.494929] 
[   16.494964] The buggy address belongs to the object at fff00000c450a400
[   16.494964]  which belongs to the cache kmalloc-256 of size 256
[   16.495109] The buggy address is located 33 bytes to the right of
[   16.495109]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.495233] 
[   16.495269] The buggy address belongs to the physical page:
[   16.495327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.495622] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.495733] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.495887] page_type: f5(slab)
[   16.495976] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.496092] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.496203] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.496312] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.496408] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.496513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.496601] page dumped because: kasan: bad access detected
[   16.496667] 
[   16.496706] Memory state around the buggy address:
[   16.496779]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.496867]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.496955] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.497259]                                                           ^
[   16.497455]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.497542]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.497653] ==================================================================
[   16.498631] ==================================================================
[   16.498730] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.498830] Write of size 1 at addr fff00000c450a4eb by task kunit_try_catch/158
[   16.498935] 
[   16.498994] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.499184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.499241] Hardware name: linux,dummy-virt (DT)
[   16.499303] Call trace:
[   16.499347]  show_stack+0x20/0x38 (C)
[   16.499450]  dump_stack_lvl+0x8c/0xd0
[   16.499552]  print_report+0x118/0x608
[   16.499646]  kasan_report+0xdc/0x128
[   16.499739]  __asan_report_store1_noabort+0x20/0x30
[   16.499843]  krealloc_less_oob_helper+0xa58/0xc50
[   16.499943]  krealloc_less_oob+0x20/0x38
[   16.500038]  kunit_try_run_case+0x170/0x3f0
[   16.500786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.500934]  kthread+0x328/0x630
[   16.501835]  ret_from_fork+0x10/0x20
[   16.501968] 
[   16.502024] Allocated by task 158:
[   16.502118]  kasan_save_stack+0x3c/0x68
[   16.502212]  kasan_save_track+0x20/0x40
[   16.502288]  kasan_save_alloc_info+0x40/0x58
[   16.502365]  __kasan_krealloc+0x118/0x178
[   16.502440]  krealloc_noprof+0x128/0x360
[   16.502512]  krealloc_less_oob_helper+0x168/0xc50
[   16.502598]  krealloc_less_oob+0x20/0x38
[   16.502664]  kunit_try_run_case+0x170/0x3f0
[   16.502724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.502796]  kthread+0x328/0x630
[   16.502862]  ret_from_fork+0x10/0x20
[   16.503301] 
[   16.503356] The buggy address belongs to the object at fff00000c450a400
[   16.503356]  which belongs to the cache kmalloc-256 of size 256
[   16.503927] The buggy address is located 34 bytes to the right of
[   16.503927]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.504201] 
[   16.504252] The buggy address belongs to the physical page:
[   16.504315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.504759] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.504948] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.505164] page_type: f5(slab)
[   16.505274] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.505552] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.505755] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.506269] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.506395] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.506544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.506681] page dumped because: kasan: bad access detected
[   16.506778] 
[   16.506966] Memory state around the buggy address:
[   16.507072]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507163]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.507242] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.507312]                                                           ^
[   16.507814]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.508154]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.508275] ==================================================================
[   16.549211] ==================================================================
[   16.549422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.549633] Write of size 1 at addr fff00000c78e20d0 by task kunit_try_catch/162
[   16.549739] 
[   16.549827] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.550023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.550122] Hardware name: linux,dummy-virt (DT)
[   16.550207] Call trace:
[   16.550249]  show_stack+0x20/0x38 (C)
[   16.550364]  dump_stack_lvl+0x8c/0xd0
[   16.550506]  print_report+0x118/0x608
[   16.550618]  kasan_report+0xdc/0x128
[   16.550798]  __asan_report_store1_noabort+0x20/0x30
[   16.550894]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.550991]  krealloc_large_less_oob+0x20/0x38
[   16.551138]  kunit_try_run_case+0x170/0x3f0
[   16.551252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.551634]  kthread+0x328/0x630
[   16.551726]  ret_from_fork+0x10/0x20
[   16.551817] 
[   16.551851] The buggy address belongs to the physical page:
[   16.551927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.552053] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.552194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.552345] page_type: f8(unknown)
[   16.552455] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.552607] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.552731] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.552874] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.552989] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.553101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.553184] page dumped because: kasan: bad access detected
[   16.553288] 
[   16.553324] Memory state around the buggy address:
[   16.553526]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.553655]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.553916] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.554035]                                                  ^
[   16.554211]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.554307]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.554393] ==================================================================
[   16.571798] ==================================================================
[   16.571892] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.571992] Write of size 1 at addr fff00000c78e20eb by task kunit_try_catch/162
[   16.572108] 
[   16.572170] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.572344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.572401] Hardware name: linux,dummy-virt (DT)
[   16.572468] Call trace:
[   16.572515]  show_stack+0x20/0x38 (C)
[   16.572616]  dump_stack_lvl+0x8c/0xd0
[   16.572716]  print_report+0x118/0x608
[   16.572811]  kasan_report+0xdc/0x128
[   16.572910]  __asan_report_store1_noabort+0x20/0x30
[   16.573019]  krealloc_less_oob_helper+0xa58/0xc50
[   16.573136]  krealloc_large_less_oob+0x20/0x38
[   16.573237]  kunit_try_run_case+0x170/0x3f0
[   16.573336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.573450]  kthread+0x328/0x630
[   16.573553]  ret_from_fork+0x10/0x20
[   16.573648] 
[   16.573687] The buggy address belongs to the physical page:
[   16.573786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.573967] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.574125] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.574279] page_type: f8(unknown)
[   16.574377] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.574466] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.574554] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.574651] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.574752] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.574885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.574958] page dumped because: kasan: bad access detected
[   16.575021] 
[   16.575519] Memory state around the buggy address:
[   16.575639]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.575870]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.576066] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.576191]                                                           ^
[   16.576280]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.576372]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.576455] ==================================================================
[   16.539885] ==================================================================
[   16.539997] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.540118] Write of size 1 at addr fff00000c78e20c9 by task kunit_try_catch/162
[   16.540212] 
[   16.540647] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.541156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.541227] Hardware name: linux,dummy-virt (DT)
[   16.541285] Call trace:
[   16.541336]  show_stack+0x20/0x38 (C)
[   16.541483]  dump_stack_lvl+0x8c/0xd0
[   16.541616]  print_report+0x118/0x608
[   16.541745]  kasan_report+0xdc/0x128
[   16.541867]  __asan_report_store1_noabort+0x20/0x30
[   16.542151]  krealloc_less_oob_helper+0xa48/0xc50
[   16.542545]  krealloc_large_less_oob+0x20/0x38
[   16.542645]  kunit_try_run_case+0x170/0x3f0
[   16.542877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.543207]  kthread+0x328/0x630
[   16.543394]  ret_from_fork+0x10/0x20
[   16.543514] 
[   16.543674] The buggy address belongs to the physical page:
[   16.543763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.543874] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.544238] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.544495] page_type: f8(unknown)
[   16.544735] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.544916] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.545096] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.545545] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.547117] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.547201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.547240] page dumped because: kasan: bad access detected
[   16.547274] 
[   16.547293] Memory state around the buggy address:
[   16.547332]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.547403]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.547645] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.547875]                                               ^
[   16.548020]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.548309]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.548426] ==================================================================
[   16.471012] ==================================================================
[   16.471172] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.471306] Write of size 1 at addr fff00000c450a4c9 by task kunit_try_catch/158
[   16.471436] 
[   16.471521] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.471704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.471754] Hardware name: linux,dummy-virt (DT)
[   16.471811] Call trace:
[   16.471855]  show_stack+0x20/0x38 (C)
[   16.471937]  dump_stack_lvl+0x8c/0xd0
[   16.472022]  print_report+0x118/0x608
[   16.472121]  kasan_report+0xdc/0x128
[   16.472223]  __asan_report_store1_noabort+0x20/0x30
[   16.472342]  krealloc_less_oob_helper+0xa48/0xc50
[   16.472474]  krealloc_less_oob+0x20/0x38
[   16.472587]  kunit_try_run_case+0x170/0x3f0
[   16.472701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.472876]  kthread+0x328/0x630
[   16.472941]  ret_from_fork+0x10/0x20
[   16.472988] 
[   16.473007] Allocated by task 158:
[   16.473034]  kasan_save_stack+0x3c/0x68
[   16.473128]  kasan_save_track+0x20/0x40
[   16.473202]  kasan_save_alloc_info+0x40/0x58
[   16.473280]  __kasan_krealloc+0x118/0x178
[   16.473382]  krealloc_noprof+0x128/0x360
[   16.473491]  krealloc_less_oob_helper+0x168/0xc50
[   16.473569]  krealloc_less_oob+0x20/0x38
[   16.473639]  kunit_try_run_case+0x170/0x3f0
[   16.473711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.473795]  kthread+0x328/0x630
[   16.473866]  ret_from_fork+0x10/0x20
[   16.473976] 
[   16.474014] The buggy address belongs to the object at fff00000c450a400
[   16.474014]  which belongs to the cache kmalloc-256 of size 256
[   16.474139] The buggy address is located 0 bytes to the right of
[   16.474139]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.474248] 
[   16.474285] The buggy address belongs to the physical page:
[   16.474343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.474453] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.474583] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.474712] page_type: f5(slab)
[   16.474823] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.474952] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.475100] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.475203] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.475293] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.475373] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.475473] page dumped because: kasan: bad access detected
[   16.475534] 
[   16.475568] Memory state around the buggy address:
[   16.475621]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.475699]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.475774] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.475848]                                               ^
[   16.475913]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.476008]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.476101] ==================================================================

[   16.090709] ==================================================================
[   16.091567] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   16.092663] Write of size 1 at addr ffff888100a35ec9 by task kunit_try_catch/175
[   16.093207] 
[   16.093488] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.093622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.093652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.093731] Call Trace:
[   16.093764]  <TASK>
[   16.093805]  dump_stack_lvl+0x73/0xb0
[   16.093883]  print_report+0xd1/0x650
[   16.093936]  ? __virt_addr_valid+0x1db/0x2d0
[   16.093982]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   16.094023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.094075]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   16.094113]  kasan_report+0x141/0x180
[   16.094148]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   16.094192]  __asan_report_store1_noabort+0x1b/0x30
[   16.094218]  krealloc_less_oob_helper+0xd70/0x11d0
[   16.094245]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.094290]  ? irqentry_exit+0x2a/0x60
[   16.094319]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.094348]  ? __pfx_krealloc_less_oob+0x10/0x10
[   16.094375]  krealloc_less_oob+0x1c/0x30
[   16.094399]  kunit_try_run_case+0x1a5/0x480
[   16.094428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.094452]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.094478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.094501]  ? __kthread_parkme+0x82/0x180
[   16.094524]  ? preempt_count_sub+0x50/0x80
[   16.094550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.094575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.094623]  kthread+0x337/0x6f0
[   16.094645]  ? trace_preempt_on+0x20/0xc0
[   16.094683]  ? __pfx_kthread+0x10/0x10
[   16.094709]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.094730]  ? calculate_sigpending+0x7b/0xa0
[   16.094756]  ? __pfx_kthread+0x10/0x10
[   16.094778]  ret_from_fork+0x116/0x1d0
[   16.094799]  ? __pfx_kthread+0x10/0x10
[   16.094820]  ret_from_fork_asm+0x1a/0x30
[   16.094852]  </TASK>
[   16.094867] 
[   16.108284] Allocated by task 175:
[   16.108672]  kasan_save_stack+0x45/0x70
[   16.109296]  kasan_save_track+0x18/0x40
[   16.109693]  kasan_save_alloc_info+0x3b/0x50
[   16.110118]  __kasan_krealloc+0x190/0x1f0
[   16.110497]  krealloc_noprof+0xf3/0x340
[   16.110923]  krealloc_less_oob_helper+0x1aa/0x11d0
[   16.111363]  krealloc_less_oob+0x1c/0x30
[   16.111920]  kunit_try_run_case+0x1a5/0x480
[   16.112453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.112910]  kthread+0x337/0x6f0
[   16.113397]  ret_from_fork+0x116/0x1d0
[   16.113763]  ret_from_fork_asm+0x1a/0x30
[   16.114341] 
[   16.114570] The buggy address belongs to the object at ffff888100a35e00
[   16.114570]  which belongs to the cache kmalloc-256 of size 256
[   16.115418] The buggy address is located 0 bytes to the right of
[   16.115418]  allocated 201-byte region [ffff888100a35e00, ffff888100a35ec9)
[   16.116507] 
[   16.116771] The buggy address belongs to the physical page:
[   16.117357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a34
[   16.117555] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.117779] flags: 0x200000000000040(head|node=0|zone=2)
[   16.118338] page_type: f5(slab)
[   16.118824] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.119838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.120530] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.121154] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.121718] head: 0200000000000001 ffffea0004028d01 00000000ffffffff 00000000ffffffff
[   16.122449] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.123280] page dumped because: kasan: bad access detected
[   16.123554] 
[   16.123666] Memory state around the buggy address:
[   16.124033]  ffff888100a35d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.124788]  ffff888100a35e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.125055] >ffff888100a35e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.125605]                                               ^
[   16.125849]  ffff888100a35f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127052]  ffff888100a35f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127705] ==================================================================
[   16.394812] ==================================================================
[   16.395243] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   16.395992] Write of size 1 at addr ffff8881029960da by task kunit_try_catch/179
[   16.396631] 
[   16.396951] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.397060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.397086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.397130] Call Trace:
[   16.397161]  <TASK>
[   16.397198]  dump_stack_lvl+0x73/0xb0
[   16.397277]  print_report+0xd1/0x650
[   16.397332]  ? __virt_addr_valid+0x1db/0x2d0
[   16.397384]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   16.397434]  ? kasan_addr_to_slab+0x11/0xa0
[   16.397471]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   16.397515]  kasan_report+0x141/0x180
[   16.397558]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   16.397646]  __asan_report_store1_noabort+0x1b/0x30
[   16.397756]  krealloc_less_oob_helper+0xec6/0x11d0
[   16.397803]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.397856]  ? irqentry_exit+0x2a/0x60
[   16.397913]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.397956]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   16.397995]  krealloc_large_less_oob+0x1c/0x30
[   16.398028]  kunit_try_run_case+0x1a5/0x480
[   16.398092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.398133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.398178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.398218]  ? __kthread_parkme+0x82/0x180
[   16.398254]  ? preempt_count_sub+0x50/0x80
[   16.398312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.398357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.398488]  kthread+0x337/0x6f0
[   16.398548]  ? trace_preempt_on+0x20/0xc0
[   16.398601]  ? __pfx_kthread+0x10/0x10
[   16.398647]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.398729]  ? calculate_sigpending+0x7b/0xa0
[   16.398767]  ? __pfx_kthread+0x10/0x10
[   16.398800]  ret_from_fork+0x116/0x1d0
[   16.398828]  ? __pfx_kthread+0x10/0x10
[   16.398860]  ret_from_fork_asm+0x1a/0x30
[   16.398908]  </TASK>
[   16.398945] 
[   16.409415] The buggy address belongs to the physical page:
[   16.409920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994
[   16.410505] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.411017] flags: 0x200000000000040(head|node=0|zone=2)
[   16.411461] page_type: f8(unknown)
[   16.411833] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.412299] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.412610] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.412937] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.413558] head: 0200000000000002 ffffea00040a6501 00000000ffffffff 00000000ffffffff
[   16.414177] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.414798] page dumped because: kasan: bad access detected
[   16.415142] 
[   16.415353] Memory state around the buggy address:
[   16.415619]  ffff888102995f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.415929]  ffff888102996000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.416504] >ffff888102996080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.417075]                                                     ^
[   16.417455]  ffff888102996100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.417926]  ffff888102996180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.418355] ==================================================================
[   16.241088] ==================================================================
[   16.241740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   16.242439] Write of size 1 at addr ffff888100a35eeb by task kunit_try_catch/175
[   16.243249] 
[   16.243501] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.243609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.243633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.243702] Call Trace:
[   16.243743]  <TASK>
[   16.243781]  dump_stack_lvl+0x73/0xb0
[   16.243852]  print_report+0xd1/0x650
[   16.243898]  ? __virt_addr_valid+0x1db/0x2d0
[   16.243942]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   16.243989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.244031]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   16.244114]  kasan_report+0x141/0x180
[   16.244159]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   16.244213]  __asan_report_store1_noabort+0x1b/0x30
[   16.244252]  krealloc_less_oob_helper+0xd47/0x11d0
[   16.244313]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.244358]  ? irqentry_exit+0x2a/0x60
[   16.244401]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.244461]  ? __pfx_krealloc_less_oob+0x10/0x10
[   16.244515]  krealloc_less_oob+0x1c/0x30
[   16.244551]  kunit_try_run_case+0x1a5/0x480
[   16.244592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.244627]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.244682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.244732]  ? __kthread_parkme+0x82/0x180
[   16.244756]  ? preempt_count_sub+0x50/0x80
[   16.244781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.244806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.244832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.244856]  kthread+0x337/0x6f0
[   16.244877]  ? trace_preempt_on+0x20/0xc0
[   16.244905]  ? __pfx_kthread+0x10/0x10
[   16.244928]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.244949]  ? calculate_sigpending+0x7b/0xa0
[   16.244975]  ? __pfx_kthread+0x10/0x10
[   16.244998]  ret_from_fork+0x116/0x1d0
[   16.245019]  ? __pfx_kthread+0x10/0x10
[   16.245048]  ret_from_fork_asm+0x1a/0x30
[   16.245113]  </TASK>
[   16.245134] 
[   16.256825] Allocated by task 175:
[   16.257046]  kasan_save_stack+0x45/0x70
[   16.257283]  kasan_save_track+0x18/0x40
[   16.257620]  kasan_save_alloc_info+0x3b/0x50
[   16.258797]  __kasan_krealloc+0x190/0x1f0
[   16.259381]  krealloc_noprof+0xf3/0x340
[   16.259720]  krealloc_less_oob_helper+0x1aa/0x11d0
[   16.260290]  krealloc_less_oob+0x1c/0x30
[   16.260600]  kunit_try_run_case+0x1a5/0x480
[   16.260976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.261659]  kthread+0x337/0x6f0
[   16.261870]  ret_from_fork+0x116/0x1d0
[   16.262307]  ret_from_fork_asm+0x1a/0x30
[   16.262509] 
[   16.262643] The buggy address belongs to the object at ffff888100a35e00
[   16.262643]  which belongs to the cache kmalloc-256 of size 256
[   16.264145] The buggy address is located 34 bytes to the right of
[   16.264145]  allocated 201-byte region [ffff888100a35e00, ffff888100a35ec9)
[   16.264892] 
[   16.265131] The buggy address belongs to the physical page:
[   16.265391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a34
[   16.265881] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.266381] flags: 0x200000000000040(head|node=0|zone=2)
[   16.266784] page_type: f5(slab)
[   16.267106] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.267512] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.267977] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.268269] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.269454] head: 0200000000000001 ffffea0004028d01 00000000ffffffff 00000000ffffffff
[   16.269989] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.270385] page dumped because: kasan: bad access detected
[   16.270615] 
[   16.270726] Memory state around the buggy address:
[   16.270932]  ffff888100a35d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.271204]  ffff888100a35e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.271759] >ffff888100a35e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.272532]                                                           ^
[   16.273786]  ffff888100a35f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275578]  ffff888100a35f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275861] ==================================================================
[   16.203243] ==================================================================
[   16.204340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   16.204911] Write of size 1 at addr ffff888100a35eea by task kunit_try_catch/175
[   16.205598] 
[   16.205810] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.205915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.205942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.205987] Call Trace:
[   16.206026]  <TASK>
[   16.206235]  dump_stack_lvl+0x73/0xb0
[   16.206332]  print_report+0xd1/0x650
[   16.206380]  ? __virt_addr_valid+0x1db/0x2d0
[   16.206428]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   16.206470]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.206509]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   16.206553]  kasan_report+0x141/0x180
[   16.206613]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   16.206713]  __asan_report_store1_noabort+0x1b/0x30
[   16.206757]  krealloc_less_oob_helper+0xe90/0x11d0
[   16.206807]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.206855]  ? irqentry_exit+0x2a/0x60
[   16.206894]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.206948]  ? __pfx_krealloc_less_oob+0x10/0x10
[   16.207009]  krealloc_less_oob+0x1c/0x30
[   16.207071]  kunit_try_run_case+0x1a5/0x480
[   16.207122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207194]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.207238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.207290]  ? __kthread_parkme+0x82/0x180
[   16.207326]  ? preempt_count_sub+0x50/0x80
[   16.207364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.207442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.207480]  kthread+0x337/0x6f0
[   16.207514]  ? trace_preempt_on+0x20/0xc0
[   16.207555]  ? __pfx_kthread+0x10/0x10
[   16.207590]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.207618]  ? calculate_sigpending+0x7b/0xa0
[   16.207645]  ? __pfx_kthread+0x10/0x10
[   16.207692]  ret_from_fork+0x116/0x1d0
[   16.207730]  ? __pfx_kthread+0x10/0x10
[   16.207752]  ret_from_fork_asm+0x1a/0x30
[   16.207785]  </TASK>
[   16.207799] 
[   16.219611] Allocated by task 175:
[   16.220001]  kasan_save_stack+0x45/0x70
[   16.220548]  kasan_save_track+0x18/0x40
[   16.220988]  kasan_save_alloc_info+0x3b/0x50
[   16.221412]  __kasan_krealloc+0x190/0x1f0
[   16.221757]  krealloc_noprof+0xf3/0x340
[   16.222125]  krealloc_less_oob_helper+0x1aa/0x11d0
[   16.222639]  krealloc_less_oob+0x1c/0x30
[   16.223076]  kunit_try_run_case+0x1a5/0x480
[   16.223441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.223834]  kthread+0x337/0x6f0
[   16.224191]  ret_from_fork+0x116/0x1d0
[   16.224505]  ret_from_fork_asm+0x1a/0x30
[   16.224771] 
[   16.224948] The buggy address belongs to the object at ffff888100a35e00
[   16.224948]  which belongs to the cache kmalloc-256 of size 256
[   16.226359] The buggy address is located 33 bytes to the right of
[   16.226359]  allocated 201-byte region [ffff888100a35e00, ffff888100a35ec9)
[   16.227414] 
[   16.227559] The buggy address belongs to the physical page:
[   16.228137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a34
[   16.229039] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.229761] flags: 0x200000000000040(head|node=0|zone=2)
[   16.230297] page_type: f5(slab)
[   16.230680] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.231172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.231897] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.232497] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.233402] head: 0200000000000001 ffffea0004028d01 00000000ffffffff 00000000ffffffff
[   16.233934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.234676] page dumped because: kasan: bad access detected
[   16.235197] 
[   16.235416] Memory state around the buggy address:
[   16.235888]  ffff888100a35d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.236713]  ffff888100a35e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.237345] >ffff888100a35e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.237886]                                                           ^
[   16.238452]  ffff888100a35f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.239235]  ffff888100a35f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.239814] ==================================================================
[   16.419629] ==================================================================
[   16.420024] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   16.421293] Write of size 1 at addr ffff8881029960ea by task kunit_try_catch/179
[   16.421964] 
[   16.422249] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.422395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.422449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.422493] Call Trace:
[   16.422532]  <TASK>
[   16.422583]  dump_stack_lvl+0x73/0xb0
[   16.422695]  print_report+0xd1/0x650
[   16.422750]  ? __virt_addr_valid+0x1db/0x2d0
[   16.422812]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   16.422874]  ? kasan_addr_to_slab+0x11/0xa0
[   16.422919]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   16.422972]  kasan_report+0x141/0x180
[   16.423027]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   16.423080]  __asan_report_store1_noabort+0x1b/0x30
[   16.423120]  krealloc_less_oob_helper+0xe90/0x11d0
[   16.423183]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.423246]  ? irqentry_exit+0x2a/0x60
[   16.423304]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.423365]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   16.423424]  krealloc_large_less_oob+0x1c/0x30
[   16.423475]  kunit_try_run_case+0x1a5/0x480
[   16.423530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.423578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.423629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.423709]  ? __kthread_parkme+0x82/0x180
[   16.423841]  ? preempt_count_sub+0x50/0x80
[   16.423881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.424331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.424391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.424432]  kthread+0x337/0x6f0
[   16.424464]  ? trace_preempt_on+0x20/0xc0
[   16.424492]  ? __pfx_kthread+0x10/0x10
[   16.424514]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.424538]  ? calculate_sigpending+0x7b/0xa0
[   16.424564]  ? __pfx_kthread+0x10/0x10
[   16.424586]  ret_from_fork+0x116/0x1d0
[   16.424607]  ? __pfx_kthread+0x10/0x10
[   16.424628]  ret_from_fork_asm+0x1a/0x30
[   16.424682]  </TASK>
[   16.424721] 
[   16.437084] The buggy address belongs to the physical page:
[   16.437517] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994
[   16.438023] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.438415] flags: 0x200000000000040(head|node=0|zone=2)
[   16.438776] page_type: f8(unknown)
[   16.439115] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.439608] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.440002] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.440604] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.440963] head: 0200000000000002 ffffea00040a6501 00000000ffffffff 00000000ffffffff
[   16.441508] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.442074] page dumped because: kasan: bad access detected
[   16.442379] 
[   16.442498] Memory state around the buggy address:
[   16.442868]  ffff888102995f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.443294]  ffff888102996000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.443722] >ffff888102996080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.444190]                                                           ^
[   16.444552]  ffff888102996100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.445088]  ffff888102996180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.445375] ==================================================================
[   16.128806] ==================================================================
[   16.129458] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   16.130504] Write of size 1 at addr ffff888100a35ed0 by task kunit_try_catch/175
[   16.131535] 
[   16.131717] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.131810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.131835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.131877] Call Trace:
[   16.131900]  <TASK>
[   16.132117]  dump_stack_lvl+0x73/0xb0
[   16.132197]  print_report+0xd1/0x650
[   16.132239]  ? __virt_addr_valid+0x1db/0x2d0
[   16.132293]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   16.132331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.132365]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   16.132403]  kasan_report+0x141/0x180
[   16.132439]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   16.132481]  __asan_report_store1_noabort+0x1b/0x30
[   16.132514]  krealloc_less_oob_helper+0xe23/0x11d0
[   16.132555]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.132589]  ? irqentry_exit+0x2a/0x60
[   16.132623]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.132669]  ? __pfx_krealloc_less_oob+0x10/0x10
[   16.132903]  krealloc_less_oob+0x1c/0x30
[   16.133001]  kunit_try_run_case+0x1a5/0x480
[   16.133036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.133135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.133168]  ? __kthread_parkme+0x82/0x180
[   16.133200]  ? preempt_count_sub+0x50/0x80
[   16.133236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.133324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.133358]  kthread+0x337/0x6f0
[   16.133389]  ? trace_preempt_on+0x20/0xc0
[   16.133430]  ? __pfx_kthread+0x10/0x10
[   16.133461]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.133493]  ? calculate_sigpending+0x7b/0xa0
[   16.133526]  ? __pfx_kthread+0x10/0x10
[   16.133549]  ret_from_fork+0x116/0x1d0
[   16.133569]  ? __pfx_kthread+0x10/0x10
[   16.133591]  ret_from_fork_asm+0x1a/0x30
[   16.133622]  </TASK>
[   16.133635] 
[   16.147523] Allocated by task 175:
[   16.148153]  kasan_save_stack+0x45/0x70
[   16.148446]  kasan_save_track+0x18/0x40
[   16.148651]  kasan_save_alloc_info+0x3b/0x50
[   16.149393]  __kasan_krealloc+0x190/0x1f0
[   16.150010]  krealloc_noprof+0xf3/0x340
[   16.150577]  krealloc_less_oob_helper+0x1aa/0x11d0
[   16.150925]  krealloc_less_oob+0x1c/0x30
[   16.151446]  kunit_try_run_case+0x1a5/0x480
[   16.151924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.152255]  kthread+0x337/0x6f0
[   16.152782]  ret_from_fork+0x116/0x1d0
[   16.153145]  ret_from_fork_asm+0x1a/0x30
[   16.153547] 
[   16.153805] The buggy address belongs to the object at ffff888100a35e00
[   16.153805]  which belongs to the cache kmalloc-256 of size 256
[   16.154552] The buggy address is located 7 bytes to the right of
[   16.154552]  allocated 201-byte region [ffff888100a35e00, ffff888100a35ec9)
[   16.155348] 
[   16.155662] The buggy address belongs to the physical page:
[   16.156089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a34
[   16.157710] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.158249] flags: 0x200000000000040(head|node=0|zone=2)
[   16.158655] page_type: f5(slab)
[   16.159171] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.160006] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.160642] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.161106] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.161967] head: 0200000000000001 ffffea0004028d01 00000000ffffffff 00000000ffffffff
[   16.162842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.163341] page dumped because: kasan: bad access detected
[   16.163561] 
[   16.163760] Memory state around the buggy address:
[   16.164212]  ffff888100a35d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.164618]  ffff888100a35e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.165223] >ffff888100a35e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.165620]                                                  ^
[   16.166141]  ffff888100a35f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.166677]  ffff888100a35f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.166907] ==================================================================
[   16.168371] ==================================================================
[   16.168970] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   16.169506] Write of size 1 at addr ffff888100a35eda by task kunit_try_catch/175
[   16.170000] 
[   16.170321] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.170448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.170476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.170518] Call Trace:
[   16.170548]  <TASK>
[   16.170603]  dump_stack_lvl+0x73/0xb0
[   16.170713]  print_report+0xd1/0x650
[   16.170764]  ? __virt_addr_valid+0x1db/0x2d0
[   16.170807]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   16.170854]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.170901]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   16.170953]  kasan_report+0x141/0x180
[   16.171011]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   16.171106]  __asan_report_store1_noabort+0x1b/0x30
[   16.171154]  krealloc_less_oob_helper+0xec6/0x11d0
[   16.171209]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.171269]  ? irqentry_exit+0x2a/0x60
[   16.171320]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.171372]  ? __pfx_krealloc_less_oob+0x10/0x10
[   16.171435]  krealloc_less_oob+0x1c/0x30
[   16.171470]  kunit_try_run_case+0x1a5/0x480
[   16.171511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.171547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.171589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.171632]  ? __kthread_parkme+0x82/0x180
[   16.171726]  ? preempt_count_sub+0x50/0x80
[   16.171779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.171837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.171882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.171920]  kthread+0x337/0x6f0
[   16.171956]  ? trace_preempt_on+0x20/0xc0
[   16.172001]  ? __pfx_kthread+0x10/0x10
[   16.172074]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.172112]  ? calculate_sigpending+0x7b/0xa0
[   16.172151]  ? __pfx_kthread+0x10/0x10
[   16.172191]  ret_from_fork+0x116/0x1d0
[   16.172233]  ? __pfx_kthread+0x10/0x10
[   16.172285]  ret_from_fork_asm+0x1a/0x30
[   16.172350]  </TASK>
[   16.172379] 
[   16.183894] Allocated by task 175:
[   16.184181]  kasan_save_stack+0x45/0x70
[   16.184561]  kasan_save_track+0x18/0x40
[   16.184823]  kasan_save_alloc_info+0x3b/0x50
[   16.185019]  __kasan_krealloc+0x190/0x1f0
[   16.185207]  krealloc_noprof+0xf3/0x340
[   16.185555]  krealloc_less_oob_helper+0x1aa/0x11d0
[   16.185953]  krealloc_less_oob+0x1c/0x30
[   16.186189]  kunit_try_run_case+0x1a5/0x480
[   16.186925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.187399]  kthread+0x337/0x6f0
[   16.187630]  ret_from_fork+0x116/0x1d0
[   16.187885]  ret_from_fork_asm+0x1a/0x30
[   16.188242] 
[   16.188429] The buggy address belongs to the object at ffff888100a35e00
[   16.188429]  which belongs to the cache kmalloc-256 of size 256
[   16.189287] The buggy address is located 17 bytes to the right of
[   16.189287]  allocated 201-byte region [ffff888100a35e00, ffff888100a35ec9)
[   16.190200] 
[   16.190536] The buggy address belongs to the physical page:
[   16.191561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a34
[   16.192252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.192981] flags: 0x200000000000040(head|node=0|zone=2)
[   16.193426] page_type: f5(slab)
[   16.193782] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.194373] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.195158] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.195644] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.196442] head: 0200000000000001 ffffea0004028d01 00000000ffffffff 00000000ffffffff
[   16.197460] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.197851] page dumped because: kasan: bad access detected
[   16.198050] 
[   16.198427] Memory state around the buggy address:
[   16.198869]  ffff888100a35d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.199432]  ffff888100a35e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.199955] >ffff888100a35e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.200551]                                                     ^
[   16.200990]  ffff888100a35f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.201607]  ffff888100a35f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.202395] ==================================================================
[   16.341340] ==================================================================
[   16.341855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   16.342618] Write of size 1 at addr ffff8881029960c9 by task kunit_try_catch/179
[   16.343188] 
[   16.343458] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.343572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.343598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.343639] Call Trace:
[   16.343666]  <TASK>
[   16.343712]  dump_stack_lvl+0x73/0xb0
[   16.343779]  print_report+0xd1/0x650
[   16.343858]  ? __virt_addr_valid+0x1db/0x2d0
[   16.343903]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   16.343951]  ? kasan_addr_to_slab+0x11/0xa0
[   16.343995]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   16.344042]  kasan_report+0x141/0x180
[   16.344107]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   16.344166]  __asan_report_store1_noabort+0x1b/0x30
[   16.344207]  krealloc_less_oob_helper+0xd70/0x11d0
[   16.344279]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.344312]  ? irqentry_exit+0x2a/0x60
[   16.344345]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.344390]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   16.344440]  krealloc_large_less_oob+0x1c/0x30
[   16.344485]  kunit_try_run_case+0x1a5/0x480
[   16.344559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.344653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.344693]  ? __kthread_parkme+0x82/0x180
[   16.344734]  ? preempt_count_sub+0x50/0x80
[   16.344782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.344868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.344960]  kthread+0x337/0x6f0
[   16.344999]  ? trace_preempt_on+0x20/0xc0
[   16.345050]  ? __pfx_kthread+0x10/0x10
[   16.345093]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.345132]  ? calculate_sigpending+0x7b/0xa0
[   16.345160]  ? __pfx_kthread+0x10/0x10
[   16.345182]  ret_from_fork+0x116/0x1d0
[   16.345204]  ? __pfx_kthread+0x10/0x10
[   16.345226]  ret_from_fork_asm+0x1a/0x30
[   16.345272]  </TASK>
[   16.345290] 
[   16.356652] The buggy address belongs to the physical page:
[   16.357130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994
[   16.357461] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.358026] flags: 0x200000000000040(head|node=0|zone=2)
[   16.358495] page_type: f8(unknown)
[   16.358826] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.359480] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.360046] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.360407] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.361077] head: 0200000000000002 ffffea00040a6501 00000000ffffffff 00000000ffffffff
[   16.361741] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.362268] page dumped because: kasan: bad access detected
[   16.362565] 
[   16.362711] Memory state around the buggy address:
[   16.363123]  ffff888102995f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.363512]  ffff888102996000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.364104] >ffff888102996080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.364522]                                               ^
[   16.364929]  ffff888102996100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.365201]  ffff888102996180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.365599] ==================================================================
[   16.368303] ==================================================================
[   16.368855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   16.369324] Write of size 1 at addr ffff8881029960d0 by task kunit_try_catch/179
[   16.370095] 
[   16.370621] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.370742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.370772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.370817] Call Trace:
[   16.370845]  <TASK>
[   16.370894]  dump_stack_lvl+0x73/0xb0
[   16.370981]  print_report+0xd1/0x650
[   16.371042]  ? __virt_addr_valid+0x1db/0x2d0
[   16.371091]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   16.371134]  ? kasan_addr_to_slab+0x11/0xa0
[   16.371164]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   16.371190]  kasan_report+0x141/0x180
[   16.371214]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   16.371244]  __asan_report_store1_noabort+0x1b/0x30
[   16.371291]  krealloc_less_oob_helper+0xe23/0x11d0
[   16.371322]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.371347]  ? irqentry_exit+0x2a/0x60
[   16.371369]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.371399]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   16.371426]  krealloc_large_less_oob+0x1c/0x30
[   16.371450]  kunit_try_run_case+0x1a5/0x480
[   16.371476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.371524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.371546]  ? __kthread_parkme+0x82/0x180
[   16.371568]  ? preempt_count_sub+0x50/0x80
[   16.371592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.371640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.371687]  kthread+0x337/0x6f0
[   16.371717]  ? trace_preempt_on+0x20/0xc0
[   16.371744]  ? __pfx_kthread+0x10/0x10
[   16.371766]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.371788]  ? calculate_sigpending+0x7b/0xa0
[   16.371814]  ? __pfx_kthread+0x10/0x10
[   16.371836]  ret_from_fork+0x116/0x1d0
[   16.371856]  ? __pfx_kthread+0x10/0x10
[   16.371878]  ret_from_fork_asm+0x1a/0x30
[   16.371913]  </TASK>
[   16.371926] 
[   16.383211] The buggy address belongs to the physical page:
[   16.383820] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994
[   16.384503] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.385482] flags: 0x200000000000040(head|node=0|zone=2)
[   16.385754] page_type: f8(unknown)
[   16.386005] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.386342] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.387190] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.387876] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.388219] head: 0200000000000002 ffffea00040a6501 00000000ffffffff 00000000ffffffff
[   16.388452] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.389508] page dumped because: kasan: bad access detected
[   16.390040] 
[   16.390158] Memory state around the buggy address:
[   16.390538]  ffff888102995f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.390983]  ffff888102996000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.391579] >ffff888102996080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.392217]                                                  ^
[   16.392480]  ffff888102996100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.393012]  ffff888102996180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.393335] ==================================================================
[   16.446520] ==================================================================
[   16.447977] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   16.448401] Write of size 1 at addr ffff8881029960eb by task kunit_try_catch/179
[   16.448897] 
[   16.449133] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   16.449230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.449256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.449311] Call Trace:
[   16.449348]  <TASK>
[   16.449385]  dump_stack_lvl+0x73/0xb0
[   16.449449]  print_report+0xd1/0x650
[   16.449494]  ? __virt_addr_valid+0x1db/0x2d0
[   16.449538]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   16.449580]  ? kasan_addr_to_slab+0x11/0xa0
[   16.449619]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   16.449665]  kasan_report+0x141/0x180
[   16.449728]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   16.449775]  __asan_report_store1_noabort+0x1b/0x30
[   16.449812]  krealloc_less_oob_helper+0xd47/0x11d0
[   16.449862]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.449904]  ? irqentry_exit+0x2a/0x60
[   16.449940]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.449993]  ? __pfx_krealloc_large_less_oob+0x10/0x10
[   16.450050]  krealloc_large_less_oob+0x1c/0x30
[   16.450093]  kunit_try_run_case+0x1a5/0x480
[   16.450141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.450185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.450231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.450287]  ? __kthread_parkme+0x82/0x180
[   16.450332]  ? preempt_count_sub+0x50/0x80
[   16.450384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.450429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.450464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.450489]  kthread+0x337/0x6f0
[   16.450511]  ? trace_preempt_on+0x20/0xc0
[   16.450537]  ? __pfx_kthread+0x10/0x10
[   16.450559]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.450580]  ? calculate_sigpending+0x7b/0xa0
[   16.450606]  ? __pfx_kthread+0x10/0x10
[   16.450628]  ret_from_fork+0x116/0x1d0
[   16.450649]  ? __pfx_kthread+0x10/0x10
[   16.450681]  ret_from_fork_asm+0x1a/0x30
[   16.450738]  </TASK>
[   16.450752] 
[   16.460168] The buggy address belongs to the physical page:
[   16.460513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102994
[   16.461292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.461583] flags: 0x200000000000040(head|node=0|zone=2)
[   16.462131] page_type: f8(unknown)
[   16.462474] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.462903] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.463212] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.463775] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.464289] head: 0200000000000002 ffffea00040a6501 00000000ffffffff 00000000ffffffff
[   16.464808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.465118] page dumped because: kasan: bad access detected
[   16.465467] 
[   16.465685] Memory state around the buggy address:
[   16.466091]  ffff888102995f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.466531]  ffff888102996000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.467005] >ffff888102996080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.467757]                                                           ^
[   16.468024]  ffff888102996100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.468310]  ffff888102996180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.468568] ==================================================================