Hay
Date
May 13, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.209407] ==================================================================
[   19.209476] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.209549] Write of size 1 at addr fff00000c65620ea by task kunit_try_catch/162
[   19.209605] 
[   19.209645] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.209739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.209770] Hardware name: linux,dummy-virt (DT)
[   19.209805] Call trace:
[   19.209844]  show_stack+0x20/0x38 (C)
[   19.209906]  dump_stack_lvl+0x8c/0xd0
[   19.209958]  print_report+0x118/0x608
[   19.210028]  kasan_report+0xdc/0x128
[   19.210081]  __asan_report_store1_noabort+0x20/0x30
[   19.210139]  krealloc_less_oob_helper+0xae4/0xc50
[   19.210192]  krealloc_large_less_oob+0x20/0x38
[   19.210245]  kunit_try_run_case+0x170/0x3f0
[   19.210296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.210354]  kthread+0x328/0x630
[   19.210406]  ret_from_fork+0x10/0x20
[   19.210691] 
[   19.210724] The buggy address belongs to the physical page:
[   19.210774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.210851] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.210994] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.211054] page_type: f8(unknown)
[   19.211370] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.211453] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.211527] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.211655] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.211740] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.212073] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.212121] page dumped because: kasan: bad access detected
[   19.212168] 
[   19.212233] Memory state around the buggy address:
[   19.212287]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.212510]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.212593] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.212638]                                                           ^
[   19.212994]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.213252]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.213499] ==================================================================
[   19.133452] ==================================================================
[   19.133686] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.134064] Write of size 1 at addr fff00000c5b13cc9 by task kunit_try_catch/158
[   19.134130] 
[   19.134183] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.134291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.134322] Hardware name: linux,dummy-virt (DT)
[   19.134361] Call trace:
[   19.134811]  show_stack+0x20/0x38 (C)
[   19.134982]  dump_stack_lvl+0x8c/0xd0
[   19.135244]  print_report+0x118/0x608
[   19.135300]  kasan_report+0xdc/0x128
[   19.135349]  __asan_report_store1_noabort+0x20/0x30
[   19.135572]  krealloc_less_oob_helper+0xa48/0xc50
[   19.135708]  krealloc_less_oob+0x20/0x38
[   19.135806]  kunit_try_run_case+0x170/0x3f0
[   19.135932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.136005]  kthread+0x328/0x630
[   19.136118]  ret_from_fork+0x10/0x20
[   19.136189] 
[   19.136235] Allocated by task 158:
[   19.136314]  kasan_save_stack+0x3c/0x68
[   19.136367]  kasan_save_track+0x20/0x40
[   19.136422]  kasan_save_alloc_info+0x40/0x58
[   19.136462]  __kasan_krealloc+0x118/0x178
[   19.136501]  krealloc_noprof+0x128/0x360
[   19.136539]  krealloc_less_oob_helper+0x168/0xc50
[   19.136617]  krealloc_less_oob+0x20/0x38
[   19.136688]  kunit_try_run_case+0x170/0x3f0
[   19.137271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.137530]  kthread+0x328/0x630
[   19.137580]  ret_from_fork+0x10/0x20
[   19.137920] 
[   19.137947] The buggy address belongs to the object at fff00000c5b13c00
[   19.137947]  which belongs to the cache kmalloc-256 of size 256
[   19.138030] The buggy address is located 0 bytes to the right of
[   19.138030]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.138099] 
[   19.138124] The buggy address belongs to the physical page:
[   19.138163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.138222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.138274] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.138338] page_type: f5(slab)
[   19.138388] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.138455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.138516] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.138569] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.138622] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.138674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.138718] page dumped because: kasan: bad access detected
[   19.138753] 
[   19.138773] Memory state around the buggy address:
[   19.139223]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139336]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.139390] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.139435]                                               ^
[   19.139491]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139728]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139779] ==================================================================
[   19.191826] ==================================================================
[   19.191913] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.192095] Write of size 1 at addr fff00000c65620c9 by task kunit_try_catch/162
[   19.192184] 
[   19.192242] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.192342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.192374] Hardware name: linux,dummy-virt (DT)
[   19.192410] Call trace:
[   19.192444]  show_stack+0x20/0x38 (C)
[   19.192563]  dump_stack_lvl+0x8c/0xd0
[   19.192660]  print_report+0x118/0x608
[   19.192760]  kasan_report+0xdc/0x128
[   19.192842]  __asan_report_store1_noabort+0x20/0x30
[   19.192906]  krealloc_less_oob_helper+0xa48/0xc50
[   19.193541]  krealloc_large_less_oob+0x20/0x38
[   19.193732]  kunit_try_run_case+0x170/0x3f0
[   19.193792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.193886]  kthread+0x328/0x630
[   19.193993]  ret_from_fork+0x10/0x20
[   19.194100] 
[   19.194127] The buggy address belongs to the physical page:
[   19.194165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.194225] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.194277] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.194338] page_type: f8(unknown)
[   19.194388] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.194457] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.194519] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.194642] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.194768] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.194876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.195169] page dumped because: kasan: bad access detected
[   19.195331] 
[   19.195393] Memory state around the buggy address:
[   19.195586]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.195736]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.196014] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.196176]                                               ^
[   19.196390]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.196721]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.197137] ==================================================================
[   19.160968] ==================================================================
[   19.161044] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.161111] Write of size 1 at addr fff00000c5b13ceb by task kunit_try_catch/158
[   19.161162] 
[   19.161198] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.161282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.161310] Hardware name: linux,dummy-virt (DT)
[   19.161342] Call trace:
[   19.161365]  show_stack+0x20/0x38 (C)
[   19.161418]  dump_stack_lvl+0x8c/0xd0
[   19.161468]  print_report+0x118/0x608
[   19.161518]  kasan_report+0xdc/0x128
[   19.161568]  __asan_report_store1_noabort+0x20/0x30
[   19.161622]  krealloc_less_oob_helper+0xa58/0xc50
[   19.161674]  krealloc_less_oob+0x20/0x38
[   19.161723]  kunit_try_run_case+0x170/0x3f0
[   19.161773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.161860]  kthread+0x328/0x630
[   19.161915]  ret_from_fork+0x10/0x20
[   19.162906] 
[   19.162961] Allocated by task 158:
[   19.163018]  kasan_save_stack+0x3c/0x68
[   19.163072]  kasan_save_track+0x20/0x40
[   19.163114]  kasan_save_alloc_info+0x40/0x58
[   19.163156]  __kasan_krealloc+0x118/0x178
[   19.163196]  krealloc_noprof+0x128/0x360
[   19.163659]  krealloc_less_oob_helper+0x168/0xc50
[   19.163750]  krealloc_less_oob+0x20/0x38
[   19.163948]  kunit_try_run_case+0x170/0x3f0
[   19.164024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.164070]  kthread+0x328/0x630
[   19.164177]  ret_from_fork+0x10/0x20
[   19.164317] 
[   19.164344] The buggy address belongs to the object at fff00000c5b13c00
[   19.164344]  which belongs to the cache kmalloc-256 of size 256
[   19.164415] The buggy address is located 34 bytes to the right of
[   19.164415]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.164479] 
[   19.164502] The buggy address belongs to the physical page:
[   19.164536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.164589] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.164636] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.164939] page_type: f5(slab)
[   19.165112] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.165177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.165246] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.165330] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.165404] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.165462] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.165505] page dumped because: kasan: bad access detected
[   19.165541] 
[   19.165562] Memory state around the buggy address:
[   19.165619]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.165672]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.165719] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.165936]                                                           ^
[   19.166339]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.166559]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.166621] ==================================================================
[   19.198107] ==================================================================
[   19.198182] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.198330] Write of size 1 at addr fff00000c65620d0 by task kunit_try_catch/162
[   19.198388] 
[   19.198431] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.198535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.198566] Hardware name: linux,dummy-virt (DT)
[   19.198602] Call trace:
[   19.198629]  show_stack+0x20/0x38 (C)
[   19.198690]  dump_stack_lvl+0x8c/0xd0
[   19.198876]  print_report+0x118/0x608
[   19.198982]  kasan_report+0xdc/0x128
[   19.199069]  __asan_report_store1_noabort+0x20/0x30
[   19.199143]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.199199]  krealloc_large_less_oob+0x20/0x38
[   19.199251]  kunit_try_run_case+0x170/0x3f0
[   19.199304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.199361]  kthread+0x328/0x630
[   19.199416]  ret_from_fork+0x10/0x20
[   19.199485] 
[   19.199514] The buggy address belongs to the physical page:
[   19.199551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.199612] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.199772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.199933] page_type: f8(unknown)
[   19.200191] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.200421] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.200476] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.200569] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.200623] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.200674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.200717] page dumped because: kasan: bad access detected
[   19.200758] 
[   19.200795] Memory state around the buggy address:
[   19.200849]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.200951]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.201007] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.201048]                                                  ^
[   19.201194]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.201330]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.201598] ==================================================================
[   19.141202] ==================================================================
[   19.141319] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.141399] Write of size 1 at addr fff00000c5b13cd0 by task kunit_try_catch/158
[   19.141453] 
[   19.141706] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.141841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.141877] Hardware name: linux,dummy-virt (DT)
[   19.141914] Call trace:
[   19.141998]  show_stack+0x20/0x38 (C)
[   19.142069]  dump_stack_lvl+0x8c/0xd0
[   19.142123]  print_report+0x118/0x608
[   19.142504]  kasan_report+0xdc/0x128
[   19.142659]  __asan_report_store1_noabort+0x20/0x30
[   19.142719]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.142809]  krealloc_less_oob+0x20/0x38
[   19.142873]  kunit_try_run_case+0x170/0x3f0
[   19.142929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.142995]  kthread+0x328/0x630
[   19.143049]  ret_from_fork+0x10/0x20
[   19.143748] 
[   19.143853] Allocated by task 158:
[   19.143890]  kasan_save_stack+0x3c/0x68
[   19.143948]  kasan_save_track+0x20/0x40
[   19.144098]  kasan_save_alloc_info+0x40/0x58
[   19.144146]  __kasan_krealloc+0x118/0x178
[   19.144187]  krealloc_noprof+0x128/0x360
[   19.144566]  krealloc_less_oob_helper+0x168/0xc50
[   19.144620]  krealloc_less_oob+0x20/0x38
[   19.144808]  kunit_try_run_case+0x170/0x3f0
[   19.144853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.145184]  kthread+0x328/0x630
[   19.145268]  ret_from_fork+0x10/0x20
[   19.145331] 
[   19.145449] The buggy address belongs to the object at fff00000c5b13c00
[   19.145449]  which belongs to the cache kmalloc-256 of size 256
[   19.145522] The buggy address is located 7 bytes to the right of
[   19.145522]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.145593] 
[   19.145617] The buggy address belongs to the physical page:
[   19.145652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.146137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.146261] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.146324] page_type: f5(slab)
[   19.146382] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.146473] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.146591] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.146772] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.146863] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.146916] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.146958] page dumped because: kasan: bad access detected
[   19.147004] 
[   19.147025] Memory state around the buggy address:
[   19.147083]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147137]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.147184] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.147223]                                                  ^
[   19.147263]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147307]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147346] ==================================================================
[   19.201847] ==================================================================
[   19.201900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.201964] Write of size 1 at addr fff00000c65620da by task kunit_try_catch/162
[   19.202367] 
[   19.202425] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.203276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.203670] Hardware name: linux,dummy-virt (DT)
[   19.203717] Call trace:
[   19.203752]  show_stack+0x20/0x38 (C)
[   19.203832]  dump_stack_lvl+0x8c/0xd0
[   19.203933]  print_report+0x118/0x608
[   19.204013]  kasan_report+0xdc/0x128
[   19.204075]  __asan_report_store1_noabort+0x20/0x30
[   19.204132]  krealloc_less_oob_helper+0xa80/0xc50
[   19.204187]  krealloc_large_less_oob+0x20/0x38
[   19.204412]  kunit_try_run_case+0x170/0x3f0
[   19.204514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.204803]  kthread+0x328/0x630
[   19.204863]  ret_from_fork+0x10/0x20
[   19.205027] 
[   19.205188] The buggy address belongs to the physical page:
[   19.205475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.205540] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.205608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.206178] page_type: f8(unknown)
[   19.206285] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.206359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.206485] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.206542] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.206595] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.206647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.206689] page dumped because: kasan: bad access detected
[   19.207010] 
[   19.207037] Memory state around the buggy address:
[   19.207086]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.207137]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.207274] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.207380]                                                     ^
[   19.207670]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.207735]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.207866] ==================================================================
[   19.149603] ==================================================================
[   19.149821] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.149918] Write of size 1 at addr fff00000c5b13cda by task kunit_try_catch/158
[   19.149986] 
[   19.150031] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.150328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.150400] Hardware name: linux,dummy-virt (DT)
[   19.150440] Call trace:
[   19.150565]  show_stack+0x20/0x38 (C)
[   19.150683]  dump_stack_lvl+0x8c/0xd0
[   19.150742]  print_report+0x118/0x608
[   19.150796]  kasan_report+0xdc/0x128
[   19.150870]  __asan_report_store1_noabort+0x20/0x30
[   19.150926]  krealloc_less_oob_helper+0xa80/0xc50
[   19.151097]  krealloc_less_oob+0x20/0x38
[   19.151183]  kunit_try_run_case+0x170/0x3f0
[   19.151331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.151428]  kthread+0x328/0x630
[   19.151482]  ret_from_fork+0x10/0x20
[   19.151534] 
[   19.151555] Allocated by task 158:
[   19.151586]  kasan_save_stack+0x3c/0x68
[   19.151631]  kasan_save_track+0x20/0x40
[   19.151697]  kasan_save_alloc_info+0x40/0x58
[   19.151756]  __kasan_krealloc+0x118/0x178
[   19.151804]  krealloc_noprof+0x128/0x360
[   19.151888]  krealloc_less_oob_helper+0x168/0xc50
[   19.151934]  krealloc_less_oob+0x20/0x38
[   19.151981]  kunit_try_run_case+0x170/0x3f0
[   19.152032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.152121]  kthread+0x328/0x630
[   19.152192]  ret_from_fork+0x10/0x20
[   19.152263] 
[   19.152307] The buggy address belongs to the object at fff00000c5b13c00
[   19.152307]  which belongs to the cache kmalloc-256 of size 256
[   19.152366] The buggy address is located 17 bytes to the right of
[   19.152366]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.152435] 
[   19.152479] The buggy address belongs to the physical page:
[   19.152538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.152623] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.152671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.152778] page_type: f5(slab)
[   19.152873] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.152979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.153034] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.153082] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.153131] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.153182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.153680] page dumped because: kasan: bad access detected
[   19.153865] 
[   19.153946] Memory state around the buggy address:
[   19.154031]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154142]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.154244] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.154287]                                                     ^
[   19.154332]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154377]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154416] ==================================================================
[   19.155062] ==================================================================
[   19.155125] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.155196] Write of size 1 at addr fff00000c5b13cea by task kunit_try_catch/158
[   19.155252] 
[   19.155291] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.155381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.155409] Hardware name: linux,dummy-virt (DT)
[   19.155443] Call trace:
[   19.155468]  show_stack+0x20/0x38 (C)
[   19.155524]  dump_stack_lvl+0x8c/0xd0
[   19.155576]  print_report+0x118/0x608
[   19.155627]  kasan_report+0xdc/0x128
[   19.155677]  __asan_report_store1_noabort+0x20/0x30
[   19.155733]  krealloc_less_oob_helper+0xae4/0xc50
[   19.155786]  krealloc_less_oob+0x20/0x38
[   19.155834]  kunit_try_run_case+0x170/0x3f0
[   19.155883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.155938]  kthread+0x328/0x630
[   19.156407]  ret_from_fork+0x10/0x20
[   19.156528] 
[   19.156570] Allocated by task 158:
[   19.156630]  kasan_save_stack+0x3c/0x68
[   19.156710]  kasan_save_track+0x20/0x40
[   19.156752]  kasan_save_alloc_info+0x40/0x58
[   19.156835]  __kasan_krealloc+0x118/0x178
[   19.156914]  krealloc_noprof+0x128/0x360
[   19.157009]  krealloc_less_oob_helper+0x168/0xc50
[   19.157067]  krealloc_less_oob+0x20/0x38
[   19.157126]  kunit_try_run_case+0x170/0x3f0
[   19.157205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.157294]  kthread+0x328/0x630
[   19.157373]  ret_from_fork+0x10/0x20
[   19.157452] 
[   19.157475] The buggy address belongs to the object at fff00000c5b13c00
[   19.157475]  which belongs to the cache kmalloc-256 of size 256
[   19.157535] The buggy address is located 33 bytes to the right of
[   19.157535]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.157602] 
[   19.157624] The buggy address belongs to the physical page:
[   19.157657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.157712] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.157763] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.157831] page_type: f5(slab)
[   19.157881] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.157938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.158005] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.158060] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.158112] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.158163] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.158204] page dumped because: kasan: bad access detected
[   19.158238] 
[   19.158257] Memory state around the buggy address:
[   19.158291]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.158336]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.158381] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.159379]                                                           ^
[   19.159448]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.159672]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.159729] ==================================================================
[   19.214289] ==================================================================
[   19.214356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.214427] Write of size 1 at addr fff00000c65620eb by task kunit_try_catch/162
[   19.214703] 
[   19.214917] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.215220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.215266] Hardware name: linux,dummy-virt (DT)
[   19.215337] Call trace:
[   19.215571]  show_stack+0x20/0x38 (C)
[   19.215769]  dump_stack_lvl+0x8c/0xd0
[   19.215882]  print_report+0x118/0x608
[   19.215938]  kasan_report+0xdc/0x128
[   19.216043]  __asan_report_store1_noabort+0x20/0x30
[   19.216107]  krealloc_less_oob_helper+0xa58/0xc50
[   19.216407]  krealloc_large_less_oob+0x20/0x38
[   19.216575]  kunit_try_run_case+0x170/0x3f0
[   19.216640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.216861]  kthread+0x328/0x630
[   19.217063]  ret_from_fork+0x10/0x20
[   19.217141] 
[   19.217167] The buggy address belongs to the physical page:
[   19.217205] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.217264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.217316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.217374] page_type: f8(unknown)
[   19.217730] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.217802] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.218161] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.218225] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.218411] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.218484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.218539] page dumped because: kasan: bad access detected
[   19.218838] 
[   19.218954] Memory state around the buggy address:
[   19.219153]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.219230]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.219283] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.219502]                                                           ^
[   19.219675]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.219928]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.220006] ==================================================================

[   10.929734] ==================================================================
[   10.930741] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   10.931643] Write of size 1 at addr ffff888102aa60d0 by task kunit_try_catch/179
[   10.932283] 
[   10.932372] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.932418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.932429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.932449] Call Trace:
[   10.932462]  <TASK>
[   10.932477]  dump_stack_lvl+0x73/0xb0
[   10.932505]  print_report+0xd1/0x650
[   10.932538]  ? __virt_addr_valid+0x1db/0x2d0
[   10.932561]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.932584]  ? kasan_addr_to_slab+0x11/0xa0
[   10.932604]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.932641]  kasan_report+0x141/0x180
[   10.932663]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.932692]  __asan_report_store1_noabort+0x1b/0x30
[   10.932713]  krealloc_less_oob_helper+0xe23/0x11d0
[   10.932738]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.932762]  ? finish_task_switch.isra.0+0x153/0x700
[   10.932782]  ? __switch_to+0x47/0xf50
[   10.932807]  ? __schedule+0x10cc/0x2b60
[   10.932828]  ? __pfx_read_tsc+0x10/0x10
[   10.932852]  krealloc_large_less_oob+0x1c/0x30
[   10.932874]  kunit_try_run_case+0x1a5/0x480
[   10.932898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.932919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.932941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.932962]  ? __kthread_parkme+0x82/0x180
[   10.932982]  ? preempt_count_sub+0x50/0x80
[   10.933005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.933027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.933049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.933072]  kthread+0x337/0x6f0
[   10.933091]  ? trace_preempt_on+0x20/0xc0
[   10.933114]  ? __pfx_kthread+0x10/0x10
[   10.933134]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.933154]  ? calculate_sigpending+0x7b/0xa0
[   10.933176]  ? __pfx_kthread+0x10/0x10
[   10.933209]  ret_from_fork+0x116/0x1d0
[   10.933227]  ? __pfx_kthread+0x10/0x10
[   10.933247]  ret_from_fork_asm+0x1a/0x30
[   10.933278]  </TASK>
[   10.933288] 
[   10.946635] The buggy address belongs to the physical page:
[   10.947204] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa4
[   10.948157] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.948940] flags: 0x200000000000040(head|node=0|zone=2)
[   10.949242] page_type: f8(unknown)
[   10.949673] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.950085] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.950666] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.951437] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.952056] head: 0200000000000002 ffffea00040aa901 00000000ffffffff 00000000ffffffff
[   10.952345] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.953113] page dumped because: kasan: bad access detected
[   10.953679] 
[   10.953840] Memory state around the buggy address:
[   10.954294]  ffff888102aa5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.954833]  ffff888102aa6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.955051] >ffff888102aa6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   10.955389]                                                  ^
[   10.955973]  ffff888102aa6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.956853]  ffff888102aa6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.957516] ==================================================================
[   10.716395] ==================================================================
[   10.717356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   10.718243] Write of size 1 at addr ffff888100356ac9 by task kunit_try_catch/175
[   10.718560] 
[   10.718680] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.718729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.718741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.718762] Call Trace:
[   10.718774]  <TASK>
[   10.718789]  dump_stack_lvl+0x73/0xb0
[   10.718818]  print_report+0xd1/0x650
[   10.718841]  ? __virt_addr_valid+0x1db/0x2d0
[   10.719062]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.719087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.719109]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.719133]  kasan_report+0x141/0x180
[   10.719156]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.719420]  __asan_report_store1_noabort+0x1b/0x30
[   10.719449]  krealloc_less_oob_helper+0xd70/0x11d0
[   10.719476]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.719501]  ? finish_task_switch.isra.0+0x153/0x700
[   10.719582]  ? __switch_to+0x47/0xf50
[   10.719625]  ? __schedule+0x10cc/0x2b60
[   10.719647]  ? __pfx_read_tsc+0x10/0x10
[   10.719672]  krealloc_less_oob+0x1c/0x30
[   10.719694]  kunit_try_run_case+0x1a5/0x480
[   10.719718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.719739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.719763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.719785]  ? __kthread_parkme+0x82/0x180
[   10.719807]  ? preempt_count_sub+0x50/0x80
[   10.719831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.719855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.719877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.719899]  kthread+0x337/0x6f0
[   10.719920]  ? trace_preempt_on+0x20/0xc0
[   10.719943]  ? __pfx_kthread+0x10/0x10
[   10.719963]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.719983]  ? calculate_sigpending+0x7b/0xa0
[   10.720007]  ? __pfx_kthread+0x10/0x10
[   10.720029]  ret_from_fork+0x116/0x1d0
[   10.720048]  ? __pfx_kthread+0x10/0x10
[   10.720069]  ret_from_fork_asm+0x1a/0x30
[   10.720100]  </TASK>
[   10.720112] 
[   10.732464] Allocated by task 175:
[   10.732848]  kasan_save_stack+0x45/0x70
[   10.733172]  kasan_save_track+0x18/0x40
[   10.733382]  kasan_save_alloc_info+0x3b/0x50
[   10.733749]  __kasan_krealloc+0x190/0x1f0
[   10.734090]  krealloc_noprof+0xf3/0x340
[   10.734418]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.734931]  krealloc_less_oob+0x1c/0x30
[   10.735203]  kunit_try_run_case+0x1a5/0x480
[   10.735508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.735917]  kthread+0x337/0x6f0
[   10.736074]  ret_from_fork+0x116/0x1d0
[   10.736488]  ret_from_fork_asm+0x1a/0x30
[   10.736782] 
[   10.736995] The buggy address belongs to the object at ffff888100356a00
[   10.736995]  which belongs to the cache kmalloc-256 of size 256
[   10.737926] The buggy address is located 0 bytes to the right of
[   10.737926]  allocated 201-byte region [ffff888100356a00, ffff888100356ac9)
[   10.738800] 
[   10.738903] The buggy address belongs to the physical page:
[   10.739133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100356
[   10.739945] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.740464] flags: 0x200000000000040(head|node=0|zone=2)
[   10.740907] page_type: f5(slab)
[   10.741068] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.741836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.742306] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.743009] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.743757] head: 0200000000000001 ffffea000400d581 00000000ffffffff 00000000ffffffff
[   10.744153] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.744469] page dumped because: kasan: bad access detected
[   10.744952] 
[   10.745049] Memory state around the buggy address:
[   10.745428]  ffff888100356980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.745885]  ffff888100356a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.746359] >ffff888100356a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.746839]                                               ^
[   10.747086]  ffff888100356b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.747697]  ffff888100356b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.748149] ==================================================================
[   10.896963] ==================================================================
[   10.897452] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   10.897995] Write of size 1 at addr ffff888102aa60c9 by task kunit_try_catch/179
[   10.898855] 
[   10.898960] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.899009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.899021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.899042] Call Trace:
[   10.899055]  <TASK>
[   10.899072]  dump_stack_lvl+0x73/0xb0
[   10.899103]  print_report+0xd1/0x650
[   10.899126]  ? __virt_addr_valid+0x1db/0x2d0
[   10.899149]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.899173]  ? kasan_addr_to_slab+0x11/0xa0
[   10.899359]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.899385]  kasan_report+0x141/0x180
[   10.899422]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   10.899451]  __asan_report_store1_noabort+0x1b/0x30
[   10.899501]  krealloc_less_oob_helper+0xd70/0x11d0
[   10.899528]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.899564]  ? finish_task_switch.isra.0+0x153/0x700
[   10.899588]  ? __switch_to+0x47/0xf50
[   10.899625]  ? __schedule+0x10cc/0x2b60
[   10.899646]  ? __pfx_read_tsc+0x10/0x10
[   10.899671]  krealloc_large_less_oob+0x1c/0x30
[   10.899693]  kunit_try_run_case+0x1a5/0x480
[   10.899719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.899740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.899762]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.899784]  ? __kthread_parkme+0x82/0x180
[   10.899805]  ? preempt_count_sub+0x50/0x80
[   10.899827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.899850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.899872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.899894]  kthread+0x337/0x6f0
[   10.899914]  ? trace_preempt_on+0x20/0xc0
[   10.899937]  ? __pfx_kthread+0x10/0x10
[   10.899958]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.899978]  ? calculate_sigpending+0x7b/0xa0
[   10.900001]  ? __pfx_kthread+0x10/0x10
[   10.900022]  ret_from_fork+0x116/0x1d0
[   10.900040]  ? __pfx_kthread+0x10/0x10
[   10.900061]  ret_from_fork_asm+0x1a/0x30
[   10.900093]  </TASK>
[   10.900104] 
[   10.917015] The buggy address belongs to the physical page:
[   10.917847] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa4
[   10.918546] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.919159] flags: 0x200000000000040(head|node=0|zone=2)
[   10.919504] page_type: f8(unknown)
[   10.919966] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.920767] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.921463] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.921844] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.922790] head: 0200000000000002 ffffea00040aa901 00000000ffffffff 00000000ffffffff
[   10.923571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.924356] page dumped because: kasan: bad access detected
[   10.924902] 
[   10.924981] Memory state around the buggy address:
[   10.925139]  ffff888102aa5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.925964]  ffff888102aa6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.926941] >ffff888102aa6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   10.927644]                                               ^
[   10.928134]  ffff888102aa6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.928912]  ffff888102aa6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.929320] ==================================================================
[   10.770412] ==================================================================
[   10.770903] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   10.771250] Write of size 1 at addr ffff888100356ada by task kunit_try_catch/175
[   10.771548] 
[   10.772373] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.772426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.772438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.772459] Call Trace:
[   10.772473]  <TASK>
[   10.772488]  dump_stack_lvl+0x73/0xb0
[   10.772525]  print_report+0xd1/0x650
[   10.772548]  ? __virt_addr_valid+0x1db/0x2d0
[   10.772570]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.772594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.772625]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.772649]  kasan_report+0x141/0x180
[   10.772671]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.772701]  __asan_report_store1_noabort+0x1b/0x30
[   10.772722]  krealloc_less_oob_helper+0xec6/0x11d0
[   10.772748]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.772771]  ? finish_task_switch.isra.0+0x153/0x700
[   10.772793]  ? __switch_to+0x47/0xf50
[   10.772818]  ? __schedule+0x10cc/0x2b60
[   10.772840]  ? __pfx_read_tsc+0x10/0x10
[   10.772863]  krealloc_less_oob+0x1c/0x30
[   10.772885]  kunit_try_run_case+0x1a5/0x480
[   10.772908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.772929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.772952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.772973]  ? __kthread_parkme+0x82/0x180
[   10.772993]  ? preempt_count_sub+0x50/0x80
[   10.773015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.773038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.773061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.773083]  kthread+0x337/0x6f0
[   10.773102]  ? trace_preempt_on+0x20/0xc0
[   10.773124]  ? __pfx_kthread+0x10/0x10
[   10.773144]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.773164]  ? calculate_sigpending+0x7b/0xa0
[   10.773187]  ? __pfx_kthread+0x10/0x10
[   10.773209]  ret_from_fork+0x116/0x1d0
[   10.773227]  ? __pfx_kthread+0x10/0x10
[   10.773247]  ret_from_fork_asm+0x1a/0x30
[   10.773278]  </TASK>
[   10.773288] 
[   10.788269] Allocated by task 175:
[   10.788710]  kasan_save_stack+0x45/0x70
[   10.789110]  kasan_save_track+0x18/0x40
[   10.789465]  kasan_save_alloc_info+0x3b/0x50
[   10.789916]  __kasan_krealloc+0x190/0x1f0
[   10.790063]  krealloc_noprof+0xf3/0x340
[   10.790214]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.790757]  krealloc_less_oob+0x1c/0x30
[   10.791292]  kunit_try_run_case+0x1a5/0x480
[   10.791838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.792322]  kthread+0x337/0x6f0
[   10.792447]  ret_from_fork+0x116/0x1d0
[   10.792768]  ret_from_fork_asm+0x1a/0x30
[   10.793174] 
[   10.793347] The buggy address belongs to the object at ffff888100356a00
[   10.793347]  which belongs to the cache kmalloc-256 of size 256
[   10.794666] The buggy address is located 17 bytes to the right of
[   10.794666]  allocated 201-byte region [ffff888100356a00, ffff888100356ac9)
[   10.795039] 
[   10.795114] The buggy address belongs to the physical page:
[   10.795595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100356
[   10.796436] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.797191] flags: 0x200000000000040(head|node=0|zone=2)
[   10.797886] page_type: f5(slab)
[   10.798234] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.798686] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.799387] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.799962] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.800214] head: 0200000000000001 ffffea000400d581 00000000ffffffff 00000000ffffffff
[   10.800972] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.801753] page dumped because: kasan: bad access detected
[   10.802275] 
[   10.802383] Memory state around the buggy address:
[   10.803021]  ffff888100356980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.803552]  ffff888100356a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.804004] >ffff888100356a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.804465]                                                     ^
[   10.804866]  ffff888100356b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.805550]  ffff888100356b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.806200] ==================================================================
[   10.996917] ==================================================================
[   10.997197] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   10.997712] Write of size 1 at addr ffff888102aa60eb by task kunit_try_catch/179
[   10.998013] 
[   10.998101] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.998145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.998157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.998176] Call Trace:
[   10.998188]  <TASK>
[   10.998201]  dump_stack_lvl+0x73/0xb0
[   10.998227]  print_report+0xd1/0x650
[   10.998248]  ? __virt_addr_valid+0x1db/0x2d0
[   10.998270]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.998293]  ? kasan_addr_to_slab+0x11/0xa0
[   10.998313]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.998337]  kasan_report+0x141/0x180
[   10.998359]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.998388]  __asan_report_store1_noabort+0x1b/0x30
[   10.998408]  krealloc_less_oob_helper+0xd47/0x11d0
[   10.998434]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.998457]  ? finish_task_switch.isra.0+0x153/0x700
[   10.998484]  ? __switch_to+0x47/0xf50
[   10.998508]  ? __schedule+0x10cc/0x2b60
[   10.998530]  ? __pfx_read_tsc+0x10/0x10
[   10.998553]  krealloc_large_less_oob+0x1c/0x30
[   10.998575]  kunit_try_run_case+0x1a5/0x480
[   10.998599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.998632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.998654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.998675]  ? __kthread_parkme+0x82/0x180
[   10.998695]  ? preempt_count_sub+0x50/0x80
[   10.998718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.998740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.998817]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.998840]  kthread+0x337/0x6f0
[   10.998859]  ? trace_preempt_on+0x20/0xc0
[   10.998882]  ? __pfx_kthread+0x10/0x10
[   10.998903]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.998923]  ? calculate_sigpending+0x7b/0xa0
[   10.998945]  ? __pfx_kthread+0x10/0x10
[   10.998967]  ret_from_fork+0x116/0x1d0
[   10.998985]  ? __pfx_kthread+0x10/0x10
[   10.999005]  ret_from_fork_asm+0x1a/0x30
[   10.999036]  </TASK>
[   10.999045] 
[   11.007078] The buggy address belongs to the physical page:
[   11.007400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa4
[   11.007823] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.008103] flags: 0x200000000000040(head|node=0|zone=2)
[   11.008350] page_type: f8(unknown)
[   11.008508] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.008890] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.009242] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.009754] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.010076] head: 0200000000000002 ffffea00040aa901 00000000ffffffff 00000000ffffffff
[   11.010358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.010586] page dumped because: kasan: bad access detected
[   11.010841] 
[   11.011006] Memory state around the buggy address:
[   11.011214]  ffff888102aa5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.011429]  ffff888102aa6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.011968] >ffff888102aa6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.012442]                                                           ^
[   11.012734]  ffff888102aa6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.013061]  ffff888102aa6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.013365] ==================================================================
[   10.958362] ==================================================================
[   10.958864] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   10.959111] Write of size 1 at addr ffff888102aa60da by task kunit_try_catch/179
[   10.959342] 
[   10.959523] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.959580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.959592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.959621] Call Trace:
[   10.959636]  <TASK>
[   10.959650]  dump_stack_lvl+0x73/0xb0
[   10.959675]  print_report+0xd1/0x650
[   10.959697]  ? __virt_addr_valid+0x1db/0x2d0
[   10.959720]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.959743]  ? kasan_addr_to_slab+0x11/0xa0
[   10.959763]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.959786]  kasan_report+0x141/0x180
[   10.959809]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   10.959837]  __asan_report_store1_noabort+0x1b/0x30
[   10.959857]  krealloc_less_oob_helper+0xec6/0x11d0
[   10.959883]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.959907]  ? finish_task_switch.isra.0+0x153/0x700
[   10.959928]  ? __switch_to+0x47/0xf50
[   10.959953]  ? __schedule+0x10cc/0x2b60
[   10.959974]  ? __pfx_read_tsc+0x10/0x10
[   10.959997]  krealloc_large_less_oob+0x1c/0x30
[   10.960019]  kunit_try_run_case+0x1a5/0x480
[   10.960042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.960063]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.960085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.960106]  ? __kthread_parkme+0x82/0x180
[   10.960126]  ? preempt_count_sub+0x50/0x80
[   10.960148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.960171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.960203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.960225]  kthread+0x337/0x6f0
[   10.960244]  ? trace_preempt_on+0x20/0xc0
[   10.960266]  ? __pfx_kthread+0x10/0x10
[   10.960286]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.960306]  ? calculate_sigpending+0x7b/0xa0
[   10.960329]  ? __pfx_kthread+0x10/0x10
[   10.960350]  ret_from_fork+0x116/0x1d0
[   10.960378]  ? __pfx_kthread+0x10/0x10
[   10.960546]  ret_from_fork_asm+0x1a/0x30
[   10.960579]  </TASK>
[   10.960589] 
[   10.973173] The buggy address belongs to the physical page:
[   10.973434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa4
[   10.973879] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.974158] flags: 0x200000000000040(head|node=0|zone=2)
[   10.974471] page_type: f8(unknown)
[   10.974663] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.975057] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.975361] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.975812] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.976079] head: 0200000000000002 ffffea00040aa901 00000000ffffffff 00000000ffffffff
[   10.976379] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.976910] page dumped because: kasan: bad access detected
[   10.977092] 
[   10.977280] Memory state around the buggy address:
[   10.977583]  ffff888102aa5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.977834]  ffff888102aa6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.978207] >ffff888102aa6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   10.978472]                                                     ^
[   10.978769]  ffff888102aa6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.979140]  ffff888102aa6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.979490] ==================================================================
[   10.806711] ==================================================================
[   10.807132] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   10.807886] Write of size 1 at addr ffff888100356aea by task kunit_try_catch/175
[   10.808622] 
[   10.808827] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.808887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.808899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.808919] Call Trace:
[   10.808931]  <TASK>
[   10.808947]  dump_stack_lvl+0x73/0xb0
[   10.808975]  print_report+0xd1/0x650
[   10.809007]  ? __virt_addr_valid+0x1db/0x2d0
[   10.809030]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.809054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.809086]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.809110]  kasan_report+0x141/0x180
[   10.809133]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.809162]  __asan_report_store1_noabort+0x1b/0x30
[   10.809191]  krealloc_less_oob_helper+0xe90/0x11d0
[   10.809224]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.809248]  ? finish_task_switch.isra.0+0x153/0x700
[   10.809279]  ? __switch_to+0x47/0xf50
[   10.809305]  ? __schedule+0x10cc/0x2b60
[   10.809326]  ? __pfx_read_tsc+0x10/0x10
[   10.809351]  krealloc_less_oob+0x1c/0x30
[   10.809381]  kunit_try_run_case+0x1a5/0x480
[   10.809404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.809425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.809459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.809481]  ? __kthread_parkme+0x82/0x180
[   10.809501]  ? preempt_count_sub+0x50/0x80
[   10.809524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.809546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.809569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.809591]  kthread+0x337/0x6f0
[   10.809610]  ? trace_preempt_on+0x20/0xc0
[   10.809640]  ? __pfx_kthread+0x10/0x10
[   10.809661]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.809681]  ? calculate_sigpending+0x7b/0xa0
[   10.809704]  ? __pfx_kthread+0x10/0x10
[   10.809726]  ret_from_fork+0x116/0x1d0
[   10.809744]  ? __pfx_kthread+0x10/0x10
[   10.809765]  ret_from_fork_asm+0x1a/0x30
[   10.809796]  </TASK>
[   10.809807] 
[   10.817542] Allocated by task 175:
[   10.817699]  kasan_save_stack+0x45/0x70
[   10.817899]  kasan_save_track+0x18/0x40
[   10.818116]  kasan_save_alloc_info+0x3b/0x50
[   10.818376]  __kasan_krealloc+0x190/0x1f0
[   10.818642]  krealloc_noprof+0xf3/0x340
[   10.818834]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.819068]  krealloc_less_oob+0x1c/0x30
[   10.819224]  kunit_try_run_case+0x1a5/0x480
[   10.819442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.819688]  kthread+0x337/0x6f0
[   10.819940]  ret_from_fork+0x116/0x1d0
[   10.820103]  ret_from_fork_asm+0x1a/0x30
[   10.820309] 
[   10.820445] The buggy address belongs to the object at ffff888100356a00
[   10.820445]  which belongs to the cache kmalloc-256 of size 256
[   10.820938] The buggy address is located 33 bytes to the right of
[   10.820938]  allocated 201-byte region [ffff888100356a00, ffff888100356ac9)
[   10.821305] 
[   10.821378] The buggy address belongs to the physical page:
[   10.821668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100356
[   10.822024] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.822381] flags: 0x200000000000040(head|node=0|zone=2)
[   10.822648] page_type: f5(slab)
[   10.822818] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.823147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.823487] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.823729] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.824005] head: 0200000000000001 ffffea000400d581 00000000ffffffff 00000000ffffffff
[   10.824592] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.824906] page dumped because: kasan: bad access detected
[   10.825136] 
[   10.825245] Memory state around the buggy address:
[   10.825451]  ffff888100356980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.825761]  ffff888100356a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.826062] >ffff888100356a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.826377]                                                           ^
[   10.826650]  ffff888100356b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.826965]  ffff888100356b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.827300] ==================================================================
[   10.827957] ==================================================================
[   10.828384] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   10.828643] Write of size 1 at addr ffff888100356aeb by task kunit_try_catch/175
[   10.829160] 
[   10.829248] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.829292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.829304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.829323] Call Trace:
[   10.829336]  <TASK>
[   10.829351]  dump_stack_lvl+0x73/0xb0
[   10.829377]  print_report+0xd1/0x650
[   10.829398]  ? __virt_addr_valid+0x1db/0x2d0
[   10.829420]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.829443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.829465]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.829488]  kasan_report+0x141/0x180
[   10.829510]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   10.829538]  __asan_report_store1_noabort+0x1b/0x30
[   10.829558]  krealloc_less_oob_helper+0xd47/0x11d0
[   10.829584]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.829607]  ? finish_task_switch.isra.0+0x153/0x700
[   10.829638]  ? __switch_to+0x47/0xf50
[   10.829663]  ? __schedule+0x10cc/0x2b60
[   10.829684]  ? __pfx_read_tsc+0x10/0x10
[   10.829707]  krealloc_less_oob+0x1c/0x30
[   10.829729]  kunit_try_run_case+0x1a5/0x480
[   10.829763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.829794]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.829817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.829838]  ? __kthread_parkme+0x82/0x180
[   10.829870]  ? preempt_count_sub+0x50/0x80
[   10.829892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.829915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.829938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.829960]  kthread+0x337/0x6f0
[   10.829979]  ? trace_preempt_on+0x20/0xc0
[   10.830002]  ? __pfx_kthread+0x10/0x10
[   10.830023]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.830043]  ? calculate_sigpending+0x7b/0xa0
[   10.830066]  ? __pfx_kthread+0x10/0x10
[   10.830087]  ret_from_fork+0x116/0x1d0
[   10.830106]  ? __pfx_kthread+0x10/0x10
[   10.830126]  ret_from_fork_asm+0x1a/0x30
[   10.830157]  </TASK>
[   10.830167] 
[   10.837928] Allocated by task 175:
[   10.838135]  kasan_save_stack+0x45/0x70
[   10.838352]  kasan_save_track+0x18/0x40
[   10.838546]  kasan_save_alloc_info+0x3b/0x50
[   10.838756]  __kasan_krealloc+0x190/0x1f0
[   10.838924]  krealloc_noprof+0xf3/0x340
[   10.839062]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.839249]  krealloc_less_oob+0x1c/0x30
[   10.839491]  kunit_try_run_case+0x1a5/0x480
[   10.839715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.839994]  kthread+0x337/0x6f0
[   10.840120]  ret_from_fork+0x116/0x1d0
[   10.840472]  ret_from_fork_asm+0x1a/0x30
[   10.840675] 
[   10.840770] The buggy address belongs to the object at ffff888100356a00
[   10.840770]  which belongs to the cache kmalloc-256 of size 256
[   10.841267] The buggy address is located 34 bytes to the right of
[   10.841267]  allocated 201-byte region [ffff888100356a00, ffff888100356ac9)
[   10.841709] 
[   10.841782] The buggy address belongs to the physical page:
[   10.841957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100356
[   10.842203] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.842568] flags: 0x200000000000040(head|node=0|zone=2)
[   10.842826] page_type: f5(slab)
[   10.842994] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.843515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.843870] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.844209] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.844476] head: 0200000000000001 ffffea000400d581 00000000ffffffff 00000000ffffffff
[   10.844719] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.844946] page dumped because: kasan: bad access detected
[   10.845202] 
[   10.845299] Memory state around the buggy address:
[   10.845551]  ffff888100356980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.845901]  ffff888100356a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.846305] >ffff888100356a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.846635]                                                           ^
[   10.846848]  ffff888100356b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.847190]  ffff888100356b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.847475] ==================================================================
[   10.979990] ==================================================================
[   10.980299] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   10.980827] Write of size 1 at addr ffff888102aa60ea by task kunit_try_catch/179
[   10.981133] 
[   10.981244] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.981288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.981299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.981319] Call Trace:
[   10.981333]  <TASK>
[   10.981347]  dump_stack_lvl+0x73/0xb0
[   10.981375]  print_report+0xd1/0x650
[   10.981396]  ? __virt_addr_valid+0x1db/0x2d0
[   10.981419]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.981442]  ? kasan_addr_to_slab+0x11/0xa0
[   10.981462]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.981486]  kasan_report+0x141/0x180
[   10.981518]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   10.981546]  __asan_report_store1_noabort+0x1b/0x30
[   10.981640]  krealloc_less_oob_helper+0xe90/0x11d0
[   10.981666]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.981690]  ? finish_task_switch.isra.0+0x153/0x700
[   10.981711]  ? __switch_to+0x47/0xf50
[   10.981737]  ? __schedule+0x10cc/0x2b60
[   10.981757]  ? __pfx_read_tsc+0x10/0x10
[   10.981782]  krealloc_large_less_oob+0x1c/0x30
[   10.981804]  kunit_try_run_case+0x1a5/0x480
[   10.981827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.981849]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.981870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.981892]  ? __kthread_parkme+0x82/0x180
[   10.981911]  ? preempt_count_sub+0x50/0x80
[   10.981934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.981956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.981979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.982001]  kthread+0x337/0x6f0
[   10.982020]  ? trace_preempt_on+0x20/0xc0
[   10.982043]  ? __pfx_kthread+0x10/0x10
[   10.982063]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.982083]  ? calculate_sigpending+0x7b/0xa0
[   10.982106]  ? __pfx_kthread+0x10/0x10
[   10.982127]  ret_from_fork+0x116/0x1d0
[   10.982145]  ? __pfx_kthread+0x10/0x10
[   10.982165]  ret_from_fork_asm+0x1a/0x30
[   10.982196]  </TASK>
[   10.982205] 
[   10.990225] The buggy address belongs to the physical page:
[   10.990404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa4
[   10.990793] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.991073] flags: 0x200000000000040(head|node=0|zone=2)
[   10.991242] page_type: f8(unknown)
[   10.991367] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.991829] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.992181] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   10.992537] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   10.993296] head: 0200000000000002 ffffea00040aa901 00000000ffffffff 00000000ffffffff
[   10.993699] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   10.993929] page dumped because: kasan: bad access detected
[   10.994162] 
[   10.994319] Memory state around the buggy address:
[   10.994548]  ffff888102aa5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.994805]  ffff888102aa6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.995018] >ffff888102aa6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   10.995327]                                                           ^
[   10.995627]  ffff888102aa6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.996019]  ffff888102aa6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.996355] ==================================================================
[   10.749315] ==================================================================
[   10.749668] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   10.750042] Write of size 1 at addr ffff888100356ad0 by task kunit_try_catch/175
[   10.750402] 
[   10.750525] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   10.750571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.750583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.750603] Call Trace:
[   10.750625]  <TASK>
[   10.750640]  dump_stack_lvl+0x73/0xb0
[   10.750666]  print_report+0xd1/0x650
[   10.750688]  ? __virt_addr_valid+0x1db/0x2d0
[   10.750721]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.750745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.750767]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.750790]  kasan_report+0x141/0x180
[   10.750813]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   10.750841]  __asan_report_store1_noabort+0x1b/0x30
[   10.750862]  krealloc_less_oob_helper+0xe23/0x11d0
[   10.750888]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.750912]  ? finish_task_switch.isra.0+0x153/0x700
[   10.750934]  ? __switch_to+0x47/0xf50
[   10.750960]  ? __schedule+0x10cc/0x2b60
[   10.750981]  ? __pfx_read_tsc+0x10/0x10
[   10.751006]  krealloc_less_oob+0x1c/0x30
[   10.751027]  kunit_try_run_case+0x1a5/0x480
[   10.751051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.751072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.751095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.751116]  ? __kthread_parkme+0x82/0x180
[   10.751136]  ? preempt_count_sub+0x50/0x80
[   10.751159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.751191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.751214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.751237]  kthread+0x337/0x6f0
[   10.751256]  ? trace_preempt_on+0x20/0xc0
[   10.751279]  ? __pfx_kthread+0x10/0x10
[   10.751300]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.751320]  ? calculate_sigpending+0x7b/0xa0
[   10.751343]  ? __pfx_kthread+0x10/0x10
[   10.751365]  ret_from_fork+0x116/0x1d0
[   10.751383]  ? __pfx_kthread+0x10/0x10
[   10.751403]  ret_from_fork_asm+0x1a/0x30
[   10.751435]  </TASK>
[   10.751445] 
[   10.759124] Allocated by task 175:
[   10.759249]  kasan_save_stack+0x45/0x70
[   10.759433]  kasan_save_track+0x18/0x40
[   10.759836]  kasan_save_alloc_info+0x3b/0x50
[   10.760042]  __kasan_krealloc+0x190/0x1f0
[   10.760239]  krealloc_noprof+0xf3/0x340
[   10.760432]  krealloc_less_oob_helper+0x1aa/0x11d0
[   10.760599]  krealloc_less_oob+0x1c/0x30
[   10.760746]  kunit_try_run_case+0x1a5/0x480
[   10.760902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.761431]  kthread+0x337/0x6f0
[   10.761600]  ret_from_fork+0x116/0x1d0
[   10.761798]  ret_from_fork_asm+0x1a/0x30
[   10.761961] 
[   10.762031] The buggy address belongs to the object at ffff888100356a00
[   10.762031]  which belongs to the cache kmalloc-256 of size 256
[   10.762377] The buggy address is located 7 bytes to the right of
[   10.762377]  allocated 201-byte region [ffff888100356a00, ffff888100356ac9)
[   10.763237] 
[   10.763384] The buggy address belongs to the physical page:
[   10.763628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100356
[   10.763916] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.764246] flags: 0x200000000000040(head|node=0|zone=2)
[   10.764482] page_type: f5(slab)
[   10.764719] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.764950] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.765178] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.765534] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.766021] head: 0200000000000001 ffffea000400d581 00000000ffffffff 00000000ffffffff
[   10.766343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.766777] page dumped because: kasan: bad access detected
[   10.767002] 
[   10.767076] Memory state around the buggy address:
[   10.767309]  ffff888100356980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.767522]  ffff888100356a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.767743] >ffff888100356a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.768057]                                                  ^
[   10.768320]  ffff888100356b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.768783]  ffff888100356b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.769196] ==================================================================