Hay
Date
May 15, 2025, 10:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.962584] ==================================================================
[   17.962625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.962667] Write of size 1 at addr fff00000c77560eb by task kunit_try_catch/162
[   17.962714] 
[   17.962746] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.962824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.962864] Hardware name: linux,dummy-virt (DT)
[   17.962892] Call trace:
[   17.962912]  show_stack+0x20/0x38 (C)
[   17.962971]  dump_stack_lvl+0x8c/0xd0
[   17.963014]  print_report+0x118/0x608
[   17.963058]  kasan_report+0xdc/0x128
[   17.963102]  __asan_report_store1_noabort+0x20/0x30
[   17.963151]  krealloc_less_oob_helper+0xa58/0xc50
[   17.963208]  krealloc_large_less_oob+0x20/0x38
[   17.963253]  kunit_try_run_case+0x170/0x3f0
[   17.963306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.963356]  kthread+0x328/0x630
[   17.963411]  ret_from_fork+0x10/0x20
[   17.963456] 
[   17.963474] The buggy address belongs to the physical page:
[   17.963503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.963551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.963614] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.963691] page_type: f8(unknown)
[   17.963727] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.963774] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.963839] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.963948] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.964013] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.964060] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.964116] page dumped because: kasan: bad access detected
[   17.964171] 
[   17.964189] Memory state around the buggy address:
[   17.964217]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.964280]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.964590] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.964646]                                                           ^
[   17.964755]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.964823]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.964880] ==================================================================
[   17.880805] ==================================================================
[   17.880868] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.880919] Write of size 1 at addr fff00000c473dcc9 by task kunit_try_catch/158
[   17.881200] 
[   17.881260] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.881346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.881372] Hardware name: linux,dummy-virt (DT)
[   17.881403] Call trace:
[   17.881625]  show_stack+0x20/0x38 (C)
[   17.881710]  dump_stack_lvl+0x8c/0xd0
[   17.881798]  print_report+0x118/0x608
[   17.881884]  kasan_report+0xdc/0x128
[   17.881947]  __asan_report_store1_noabort+0x20/0x30
[   17.882011]  krealloc_less_oob_helper+0xa48/0xc50
[   17.882292]  krealloc_less_oob+0x20/0x38
[   17.882447]  kunit_try_run_case+0x170/0x3f0
[   17.882512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.882883]  kthread+0x328/0x630
[   17.883018]  ret_from_fork+0x10/0x20
[   17.883098] 
[   17.883414] Allocated by task 158:
[   17.883460]  kasan_save_stack+0x3c/0x68
[   17.883587]  kasan_save_track+0x20/0x40
[   17.883780]  kasan_save_alloc_info+0x40/0x58
[   17.883841]  __kasan_krealloc+0x118/0x178
[   17.884029]  krealloc_noprof+0x128/0x360
[   17.884186]  krealloc_less_oob_helper+0x168/0xc50
[   17.884262]  krealloc_less_oob+0x20/0x38
[   17.884399]  kunit_try_run_case+0x170/0x3f0
[   17.884436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.884778]  kthread+0x328/0x630
[   17.884889]  ret_from_fork+0x10/0x20
[   17.885094] 
[   17.885135] The buggy address belongs to the object at fff00000c473dc00
[   17.885135]  which belongs to the cache kmalloc-256 of size 256
[   17.885485] The buggy address is located 0 bytes to the right of
[   17.885485]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.885592] 
[   17.885613] The buggy address belongs to the physical page:
[   17.885681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.886055] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.886113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.886178] page_type: f5(slab)
[   17.886217] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.886566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.886639] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.886943] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.887148] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.887551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.887618] page dumped because: kasan: bad access detected
[   17.887747] 
[   17.887800] Memory state around the buggy address:
[   17.887968]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888091]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.888138] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.888392]                                               ^
[   17.888592]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888685]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888819] ==================================================================
[   17.910397] ==================================================================
[   17.910467] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.910689] Write of size 1 at addr fff00000c473dceb by task kunit_try_catch/158
[   17.910789] 
[   17.910858] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.910939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.910965] Hardware name: linux,dummy-virt (DT)
[   17.910994] Call trace:
[   17.911075]  show_stack+0x20/0x38 (C)
[   17.911131]  dump_stack_lvl+0x8c/0xd0
[   17.911218]  print_report+0x118/0x608
[   17.911264]  kasan_report+0xdc/0x128
[   17.911308]  __asan_report_store1_noabort+0x20/0x30
[   17.911358]  krealloc_less_oob_helper+0xa58/0xc50
[   17.911434]  krealloc_less_oob+0x20/0x38
[   17.911530]  kunit_try_run_case+0x170/0x3f0
[   17.911607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.911660]  kthread+0x328/0x630
[   17.911732]  ret_from_fork+0x10/0x20
[   17.911809] 
[   17.911846] Allocated by task 158:
[   17.911873]  kasan_save_stack+0x3c/0x68
[   17.911911]  kasan_save_track+0x20/0x40
[   17.911982]  kasan_save_alloc_info+0x40/0x58
[   17.912021]  __kasan_krealloc+0x118/0x178
[   17.912267]  krealloc_noprof+0x128/0x360
[   17.912334]  krealloc_less_oob_helper+0x168/0xc50
[   17.912436]  krealloc_less_oob+0x20/0x38
[   17.912474]  kunit_try_run_case+0x170/0x3f0
[   17.912509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.912568]  kthread+0x328/0x630
[   17.912603]  ret_from_fork+0x10/0x20
[   17.912637] 
[   17.912749] The buggy address belongs to the object at fff00000c473dc00
[   17.912749]  which belongs to the cache kmalloc-256 of size 256
[   17.912817] The buggy address is located 34 bytes to the right of
[   17.912817]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.912987] 
[   17.913047] The buggy address belongs to the physical page:
[   17.913107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.913185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.913230] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.913308] page_type: f5(slab)
[   17.913445] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.913682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.913782] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.913881] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.913929] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.913991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.914153] page dumped because: kasan: bad access detected
[   17.914231] 
[   17.914328] Memory state around the buggy address:
[   17.914415]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.914518]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.914568] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.914605]                                                           ^
[   17.914641]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.914681]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.914716] ==================================================================
[   17.960474] ==================================================================
[   17.960507] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.960547] Write of size 1 at addr fff00000c77560ea by task kunit_try_catch/162
[   17.960592] 
[   17.960629] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.960708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.960732] Hardware name: linux,dummy-virt (DT)
[   17.960760] Call trace:
[   17.960780]  show_stack+0x20/0x38 (C)
[   17.960825]  dump_stack_lvl+0x8c/0xd0
[   17.960869]  print_report+0x118/0x608
[   17.960928]  kasan_report+0xdc/0x128
[   17.960975]  __asan_report_store1_noabort+0x20/0x30
[   17.961032]  krealloc_less_oob_helper+0xae4/0xc50
[   17.961079]  krealloc_large_less_oob+0x20/0x38
[   17.961125]  kunit_try_run_case+0x170/0x3f0
[   17.961180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.961231]  kthread+0x328/0x630
[   17.961275]  ret_from_fork+0x10/0x20
[   17.961319] 
[   17.961337] The buggy address belongs to the physical page:
[   17.961366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.961416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.961459] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.961517] page_type: f8(unknown)
[   17.961552] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.961598] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.961645] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.961691] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.961770] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.961817] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.961855] page dumped because: kasan: bad access detected
[   17.961884] 
[   17.961901] Memory state around the buggy address:
[   17.961929]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.961968]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.962019] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.962054]                                                           ^
[   17.962101]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.962140]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.962185] ==================================================================
[   17.944007] ==================================================================
[   17.944061] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.944111] Write of size 1 at addr fff00000c77560c9 by task kunit_try_catch/162
[   17.944993] 
[   17.945035] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.945268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.945317] Hardware name: linux,dummy-virt (DT)
[   17.945365] Call trace:
[   17.945403]  show_stack+0x20/0x38 (C)
[   17.945605]  dump_stack_lvl+0x8c/0xd0
[   17.945916]  print_report+0x118/0x608
[   17.946266]  kasan_report+0xdc/0x128
[   17.946409]  __asan_report_store1_noabort+0x20/0x30
[   17.946485]  krealloc_less_oob_helper+0xa48/0xc50
[   17.946533]  krealloc_large_less_oob+0x20/0x38
[   17.946608]  kunit_try_run_case+0x170/0x3f0
[   17.946983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.947108]  kthread+0x328/0x630
[   17.947304]  ret_from_fork+0x10/0x20
[   17.947487] 
[   17.947509] The buggy address belongs to the physical page:
[   17.947539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.947875] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.947993] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.948202] page_type: f8(unknown)
[   17.948410] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.948481] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.948607] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.948760] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.948858] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.949248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.949308] page dumped because: kasan: bad access detected
[   17.949443] 
[   17.949474] Memory state around the buggy address:
[   17.949582]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.949666]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.949808] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.949926]                                               ^
[   17.949987]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.950136]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.950398] ==================================================================
[   17.907345] ==================================================================
[   17.907388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.907434] Write of size 1 at addr fff00000c473dcea by task kunit_try_catch/158
[   17.907481] 
[   17.907510] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.907590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.907615] Hardware name: linux,dummy-virt (DT)
[   17.907647] Call trace:
[   17.907669]  show_stack+0x20/0x38 (C)
[   17.907717]  dump_stack_lvl+0x8c/0xd0
[   17.907762]  print_report+0x118/0x608
[   17.907806]  kasan_report+0xdc/0x128
[   17.907850]  __asan_report_store1_noabort+0x20/0x30
[   17.907900]  krealloc_less_oob_helper+0xae4/0xc50
[   17.907946]  krealloc_less_oob+0x20/0x38
[   17.907990]  kunit_try_run_case+0x170/0x3f0
[   17.908034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.908084]  kthread+0x328/0x630
[   17.908127]  ret_from_fork+0x10/0x20
[   17.908186] 
[   17.908204] Allocated by task 158:
[   17.908230]  kasan_save_stack+0x3c/0x68
[   17.908267]  kasan_save_track+0x20/0x40
[   17.908302]  kasan_save_alloc_info+0x40/0x58
[   17.908339]  __kasan_krealloc+0x118/0x178
[   17.908375]  krealloc_noprof+0x128/0x360
[   17.908409]  krealloc_less_oob_helper+0x168/0xc50
[   17.908445]  krealloc_less_oob+0x20/0x38
[   17.908479]  kunit_try_run_case+0x170/0x3f0
[   17.908513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.908553]  kthread+0x328/0x630
[   17.908586]  ret_from_fork+0x10/0x20
[   17.908619] 
[   17.908637] The buggy address belongs to the object at fff00000c473dc00
[   17.908637]  which belongs to the cache kmalloc-256 of size 256
[   17.908689] The buggy address is located 33 bytes to the right of
[   17.908689]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.908749] 
[   17.908767] The buggy address belongs to the physical page:
[   17.908796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.908845] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.908888] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.908936] page_type: f5(slab)
[   17.908970] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.909018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.909066] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.909112] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.909192] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.909268] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.909335] page dumped because: kasan: bad access detected
[   17.909393] 
[   17.909422] Memory state around the buggy address:
[   17.909490]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.909558]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.909629] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.909676]                                                           ^
[   17.909714]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.910109]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.910170] ==================================================================
[   17.958267] ==================================================================
[   17.958309] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.958352] Write of size 1 at addr fff00000c77560da by task kunit_try_catch/162
[   17.958399] 
[   17.958426] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.958980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.959016] Hardware name: linux,dummy-virt (DT)
[   17.959045] Call trace:
[   17.959066]  show_stack+0x20/0x38 (C)
[   17.959115]  dump_stack_lvl+0x8c/0xd0
[   17.959171]  print_report+0x118/0x608
[   17.959215]  kasan_report+0xdc/0x128
[   17.959259]  __asan_report_store1_noabort+0x20/0x30
[   17.959308]  krealloc_less_oob_helper+0xa80/0xc50
[   17.959354]  krealloc_large_less_oob+0x20/0x38
[   17.959400]  kunit_try_run_case+0x170/0x3f0
[   17.959444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.959493]  kthread+0x328/0x630
[   17.959536]  ret_from_fork+0x10/0x20
[   17.959581] 
[   17.959600] The buggy address belongs to the physical page:
[   17.959628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.959678] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.959721] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.959768] page_type: f8(unknown)
[   17.959803] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.959850] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.959898] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.959944] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.959990] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.960036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.960074] page dumped because: kasan: bad access detected
[   17.960102] 
[   17.960120] Memory state around the buggy address:
[   17.960148]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.960196]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.960236] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.960300]                                                     ^
[   17.960336]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.960382]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.960418] ==================================================================
[   17.897052] ==================================================================
[   17.897096] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.897142] Write of size 1 at addr fff00000c473dcda by task kunit_try_catch/158
[   17.897754] 
[   17.897931] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.898169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.898207] Hardware name: linux,dummy-virt (DT)
[   17.898266] Call trace:
[   17.898288]  show_stack+0x20/0x38 (C)
[   17.898671]  dump_stack_lvl+0x8c/0xd0
[   17.898806]  print_report+0x118/0x608
[   17.898950]  kasan_report+0xdc/0x128
[   17.899106]  __asan_report_store1_noabort+0x20/0x30
[   17.899233]  krealloc_less_oob_helper+0xa80/0xc50
[   17.899305]  krealloc_less_oob+0x20/0x38
[   17.899640]  kunit_try_run_case+0x170/0x3f0
[   17.899750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.899861]  kthread+0x328/0x630
[   17.900064]  ret_from_fork+0x10/0x20
[   17.900153] 
[   17.900186] Allocated by task 158:
[   17.900426]  kasan_save_stack+0x3c/0x68
[   17.900514]  kasan_save_track+0x20/0x40
[   17.900581]  kasan_save_alloc_info+0x40/0x58
[   17.900983]  __kasan_krealloc+0x118/0x178
[   17.901101]  krealloc_noprof+0x128/0x360
[   17.901256]  krealloc_less_oob_helper+0x168/0xc50
[   17.901422]  krealloc_less_oob+0x20/0x38
[   17.901531]  kunit_try_run_case+0x170/0x3f0
[   17.901935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.902091]  kthread+0x328/0x630
[   17.902334]  ret_from_fork+0x10/0x20
[   17.902537] 
[   17.902588] The buggy address belongs to the object at fff00000c473dc00
[   17.902588]  which belongs to the cache kmalloc-256 of size 256
[   17.903028] The buggy address is located 17 bytes to the right of
[   17.903028]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.903166] 
[   17.903305] The buggy address belongs to the physical page:
[   17.903376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.903546] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.903604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.903692] page_type: f5(slab)
[   17.903963] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.904121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.904866] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.904940] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.905023] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.905099] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.905231] page dumped because: kasan: bad access detected
[   17.905263] 
[   17.905466] Memory state around the buggy address:
[   17.905731]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906213]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.906258] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.906295]                                                     ^
[   17.906330]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906858]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906915] ==================================================================
[   17.952860] ==================================================================
[   17.952940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.953016] Write of size 1 at addr fff00000c77560d0 by task kunit_try_catch/162
[   17.953082] 
[   17.953383] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.953560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.953618] Hardware name: linux,dummy-virt (DT)
[   17.953676] Call trace:
[   17.953770]  show_stack+0x20/0x38 (C)
[   17.953845]  dump_stack_lvl+0x8c/0xd0
[   17.953957]  print_report+0x118/0x608
[   17.954077]  kasan_report+0xdc/0x128
[   17.954253]  __asan_report_store1_noabort+0x20/0x30
[   17.954429]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.954675]  krealloc_large_less_oob+0x20/0x38
[   17.954786]  kunit_try_run_case+0x170/0x3f0
[   17.954935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.954988]  kthread+0x328/0x630
[   17.955290]  ret_from_fork+0x10/0x20
[   17.955420] 
[   17.955465] The buggy address belongs to the physical page:
[   17.955710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.955808] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.955913] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.956224] page_type: f8(unknown)
[   17.956286] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.956483] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.956636] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.956743] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.956848] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.956934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.957765] page dumped because: kasan: bad access detected
[   17.957809] 
[   17.957827] Memory state around the buggy address:
[   17.957865]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.957907]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.957950] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.957988]                                                  ^
[   17.958023]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.958064]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.958100] ==================================================================
[   17.890012] ==================================================================
[   17.890057] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.890420] Write of size 1 at addr fff00000c473dcd0 by task kunit_try_catch/158
[   17.890593] 
[   17.890632] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.890813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.890841] Hardware name: linux,dummy-virt (DT)
[   17.891124] Call trace:
[   17.891195]  show_stack+0x20/0x38 (C)
[   17.891314]  dump_stack_lvl+0x8c/0xd0
[   17.891400]  print_report+0x118/0x608
[   17.891511]  kasan_report+0xdc/0x128
[   17.891673]  __asan_report_store1_noabort+0x20/0x30
[   17.891810]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.892246]  krealloc_less_oob+0x20/0x38
[   17.892329]  kunit_try_run_case+0x170/0x3f0
[   17.892524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.892735]  kthread+0x328/0x630
[   17.892819]  ret_from_fork+0x10/0x20
[   17.892989] 
[   17.893172] Allocated by task 158:
[   17.893231]  kasan_save_stack+0x3c/0x68
[   17.893385]  kasan_save_track+0x20/0x40
[   17.893582]  kasan_save_alloc_info+0x40/0x58
[   17.893681]  __kasan_krealloc+0x118/0x178
[   17.893859]  krealloc_noprof+0x128/0x360
[   17.893899]  krealloc_less_oob_helper+0x168/0xc50
[   17.893960]  krealloc_less_oob+0x20/0x38
[   17.893998]  kunit_try_run_case+0x170/0x3f0
[   17.894319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.894479]  kthread+0x328/0x630
[   17.894589]  ret_from_fork+0x10/0x20
[   17.894711] 
[   17.894805] The buggy address belongs to the object at fff00000c473dc00
[   17.894805]  which belongs to the cache kmalloc-256 of size 256
[   17.894940] The buggy address is located 7 bytes to the right of
[   17.894940]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.895003] 
[   17.895022] The buggy address belongs to the physical page:
[   17.895420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.895657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.895726] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.895789] page_type: f5(slab)
[   17.895835] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.895884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.895946] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.896002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.896050] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.896106] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.896166] page dumped because: kasan: bad access detected
[   17.896205] 
[   17.896223] Memory state around the buggy address:
[   17.896261]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896301]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.896349] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.896384]                                                  ^
[   17.896434]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896474]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896527] ==================================================================


[   13.881635] ==================================================================
[   13.881867] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.882148] Write of size 1 at addr ffff88810298e0da by task kunit_try_catch/180
[   13.882953] 
[   13.883557] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.883657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.883682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.883720] Call Trace:
[   13.883761]  <TASK>
[   13.883796]  dump_stack_lvl+0x73/0xb0
[   13.883883]  print_report+0xd1/0x650
[   13.884091]  ? __virt_addr_valid+0x1db/0x2d0
[   13.884146]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.884195]  ? kasan_addr_to_slab+0x11/0xa0
[   13.884249]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.884298]  kasan_report+0x141/0x180
[   13.884336]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.884389]  __asan_report_store1_noabort+0x1b/0x30
[   13.884423]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.884478]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.884516]  ? finish_task_switch.isra.0+0x153/0x700
[   13.884550]  ? __switch_to+0x47/0xf50
[   13.884592]  ? __schedule+0x10cc/0x2b60
[   13.884620]  ? __pfx_read_tsc+0x10/0x10
[   13.884645]  krealloc_large_less_oob+0x1c/0x30
[   13.884668]  kunit_try_run_case+0x1a5/0x480
[   13.884695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.884737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.884758]  ? __kthread_parkme+0x82/0x180
[   13.884779]  ? preempt_count_sub+0x50/0x80
[   13.884801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.884844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.884865]  kthread+0x337/0x6f0
[   13.884884]  ? trace_preempt_on+0x20/0xc0
[   13.884907]  ? __pfx_kthread+0x10/0x10
[   13.884926]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.884946]  ? calculate_sigpending+0x7b/0xa0
[   13.884970]  ? __pfx_kthread+0x10/0x10
[   13.884990]  ret_from_fork+0x116/0x1d0
[   13.885008]  ? __pfx_kthread+0x10/0x10
[   13.885028]  ret_from_fork_asm+0x1a/0x30
[   13.885060]  </TASK>
[   13.885072] 
[   13.896777] The buggy address belongs to the physical page:
[   13.897158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.897682] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.898175] flags: 0x200000000000040(head|node=0|zone=2)
[   13.899160] page_type: f8(unknown)
[   13.899654] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.900162] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.900637] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.900882] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.901685] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.902097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.902420] page dumped because: kasan: bad access detected
[   13.902882] 
[   13.903047] Memory state around the buggy address:
[   13.903762]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.904175]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.904741] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.905101]                                                     ^
[   13.905653]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.905955]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.906430] ==================================================================
[   13.643860] ==================================================================
[   13.644449] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.644887] Write of size 1 at addr ffff888100ab36d0 by task kunit_try_catch/176
[   13.645261] 
[   13.645459] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.645547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.645570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.645608] Call Trace:
[   13.645640]  <TASK>
[   13.645672]  dump_stack_lvl+0x73/0xb0
[   13.645727]  print_report+0xd1/0x650
[   13.645772]  ? __virt_addr_valid+0x1db/0x2d0
[   13.645818]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.645863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.645907]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.645952]  kasan_report+0x141/0x180
[   13.645990]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.646039]  __asan_report_store1_noabort+0x1b/0x30
[   13.646075]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.646121]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.646166]  ? finish_task_switch.isra.0+0x153/0x700
[   13.646207]  ? __switch_to+0x47/0xf50
[   13.646271]  ? __schedule+0x10cc/0x2b60
[   13.646314]  ? __pfx_read_tsc+0x10/0x10
[   13.646373]  krealloc_less_oob+0x1c/0x30
[   13.646418]  kunit_try_run_case+0x1a5/0x480
[   13.646469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.646511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.646556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.646592]  ? __kthread_parkme+0x82/0x180
[   13.646626]  ? preempt_count_sub+0x50/0x80
[   13.646669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.646708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.646745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.646784]  kthread+0x337/0x6f0
[   13.646818]  ? trace_preempt_on+0x20/0xc0
[   13.646860]  ? __pfx_kthread+0x10/0x10
[   13.646896]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.646930]  ? calculate_sigpending+0x7b/0xa0
[   13.646970]  ? __pfx_kthread+0x10/0x10
[   13.647011]  ret_from_fork+0x116/0x1d0
[   13.647049]  ? __pfx_kthread+0x10/0x10
[   13.647091]  ret_from_fork_asm+0x1a/0x30
[   13.647151]  </TASK>
[   13.647170] 
[   13.657063] Allocated by task 176:
[   13.657327]  kasan_save_stack+0x45/0x70
[   13.657755]  kasan_save_track+0x18/0x40
[   13.658007]  kasan_save_alloc_info+0x3b/0x50
[   13.658190]  __kasan_krealloc+0x190/0x1f0
[   13.658951]  krealloc_noprof+0xf3/0x340
[   13.659154]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.659507]  krealloc_less_oob+0x1c/0x30
[   13.659687]  kunit_try_run_case+0x1a5/0x480
[   13.659976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.660362]  kthread+0x337/0x6f0
[   13.660620]  ret_from_fork+0x116/0x1d0
[   13.660906]  ret_from_fork_asm+0x1a/0x30
[   13.661100] 
[   13.661423] The buggy address belongs to the object at ffff888100ab3600
[   13.661423]  which belongs to the cache kmalloc-256 of size 256
[   13.661966] The buggy address is located 7 bytes to the right of
[   13.661966]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.663085] 
[   13.663273] The buggy address belongs to the physical page:
[   13.663706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.664030] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.664403] flags: 0x200000000000040(head|node=0|zone=2)
[   13.664917] page_type: f5(slab)
[   13.665091] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.665613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.666126] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.666984] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.667334] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.668008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.668351] page dumped because: kasan: bad access detected
[   13.668865] 
[   13.669032] Memory state around the buggy address:
[   13.669267]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.669819]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.670283] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.671113]                                                  ^
[   13.671438]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.671903]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.672448] ==================================================================
[   13.673386] ==================================================================
[   13.673932] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.674394] Write of size 1 at addr ffff888100ab36da by task kunit_try_catch/176
[   13.675295] 
[   13.675620] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.675740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.675761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.675795] Call Trace:
[   13.675827]  <TASK>
[   13.675859]  dump_stack_lvl+0x73/0xb0
[   13.675918]  print_report+0xd1/0x650
[   13.675963]  ? __virt_addr_valid+0x1db/0x2d0
[   13.676009]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.676055]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.676099]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.676145]  kasan_report+0x141/0x180
[   13.676191]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.676254]  __asan_report_store1_noabort+0x1b/0x30
[   13.676290]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.676329]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.676369]  ? finish_task_switch.isra.0+0x153/0x700
[   13.676408]  ? __switch_to+0x47/0xf50
[   13.676451]  ? __schedule+0x10cc/0x2b60
[   13.676659]  ? __pfx_read_tsc+0x10/0x10
[   13.676709]  krealloc_less_oob+0x1c/0x30
[   13.676755]  kunit_try_run_case+0x1a5/0x480
[   13.676804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.676847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.676887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.676922]  ? __kthread_parkme+0x82/0x180
[   13.676954]  ? preempt_count_sub+0x50/0x80
[   13.676992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.677030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.677071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.677115]  kthread+0x337/0x6f0
[   13.677154]  ? trace_preempt_on+0x20/0xc0
[   13.677202]  ? __pfx_kthread+0x10/0x10
[   13.677254]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.677297]  ? calculate_sigpending+0x7b/0xa0
[   13.677343]  ? __pfx_kthread+0x10/0x10
[   13.677387]  ret_from_fork+0x116/0x1d0
[   13.677421]  ? __pfx_kthread+0x10/0x10
[   13.677557]  ret_from_fork_asm+0x1a/0x30
[   13.677625]  </TASK>
[   13.677640] 
[   13.691284] Allocated by task 176:
[   13.691674]  kasan_save_stack+0x45/0x70
[   13.691927]  kasan_save_track+0x18/0x40
[   13.692123]  kasan_save_alloc_info+0x3b/0x50
[   13.692296]  __kasan_krealloc+0x190/0x1f0
[   13.692607]  krealloc_noprof+0xf3/0x340
[   13.692810]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.693011]  krealloc_less_oob+0x1c/0x30
[   13.693976]  kunit_try_run_case+0x1a5/0x480
[   13.694196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.694398]  kthread+0x337/0x6f0
[   13.695128]  ret_from_fork+0x116/0x1d0
[   13.695580]  ret_from_fork_asm+0x1a/0x30
[   13.696091] 
[   13.696191] The buggy address belongs to the object at ffff888100ab3600
[   13.696191]  which belongs to the cache kmalloc-256 of size 256
[   13.697085] The buggy address is located 17 bytes to the right of
[   13.697085]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.697546] 
[   13.697701] The buggy address belongs to the physical page:
[   13.697881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.698458] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.698748] flags: 0x200000000000040(head|node=0|zone=2)
[   13.699097] page_type: f5(slab)
[   13.699776] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.700071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.700337] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.700850] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.701442] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.701908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.702423] page dumped because: kasan: bad access detected
[   13.702931] 
[   13.703047] Memory state around the buggy address:
[   13.703437]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.704160]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.704490] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.704852]                                                     ^
[   13.705457]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.705919]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.706318] ==================================================================
[   13.854821] ==================================================================
[   13.855356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.855858] Write of size 1 at addr ffff88810298e0d0 by task kunit_try_catch/180
[   13.856239] 
[   13.856386] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.856491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.856516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.856553] Call Trace:
[   13.856578]  <TASK>
[   13.856611]  dump_stack_lvl+0x73/0xb0
[   13.856727]  print_report+0xd1/0x650
[   13.856769]  ? __virt_addr_valid+0x1db/0x2d0
[   13.856816]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.856872]  ? kasan_addr_to_slab+0x11/0xa0
[   13.856915]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.856971]  kasan_report+0x141/0x180
[   13.857026]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.857088]  __asan_report_store1_noabort+0x1b/0x30
[   13.857136]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.857178]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.857217]  ? finish_task_switch.isra.0+0x153/0x700
[   13.857268]  ? __switch_to+0x47/0xf50
[   13.857317]  ? __schedule+0x10cc/0x2b60
[   13.857362]  ? __pfx_read_tsc+0x10/0x10
[   13.857415]  krealloc_large_less_oob+0x1c/0x30
[   13.857486]  kunit_try_run_case+0x1a5/0x480
[   13.857538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.857580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.857626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.857665]  ? __kthread_parkme+0x82/0x180
[   13.857702]  ? preempt_count_sub+0x50/0x80
[   13.857737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.857773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.857813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.857873]  kthread+0x337/0x6f0
[   13.857911]  ? trace_preempt_on+0x20/0xc0
[   13.857948]  ? __pfx_kthread+0x10/0x10
[   13.857980]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.858027]  ? calculate_sigpending+0x7b/0xa0
[   13.858063]  ? __pfx_kthread+0x10/0x10
[   13.858097]  ret_from_fork+0x116/0x1d0
[   13.858128]  ? __pfx_kthread+0x10/0x10
[   13.858162]  ret_from_fork_asm+0x1a/0x30
[   13.858215]  </TASK>
[   13.858245] 
[   13.867170] The buggy address belongs to the physical page:
[   13.868625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.869279] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.871379] flags: 0x200000000000040(head|node=0|zone=2)
[   13.871774] page_type: f8(unknown)
[   13.872042] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.872580] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.873419] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.875606] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.875939] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.876514] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.876958] page dumped because: kasan: bad access detected
[   13.877266] 
[   13.877397] Memory state around the buggy address:
[   13.877681]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.877962]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.878997] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.879659]                                                  ^
[   13.880211]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.880730]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.881032] ==================================================================
[   13.932386] ==================================================================
[   13.932964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   13.933330] Write of size 1 at addr ffff88810298e0eb by task kunit_try_catch/180
[   13.933749] 
[   13.933931] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.934014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.934035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.934071] Call Trace:
[   13.934107]  <TASK>
[   13.934143]  dump_stack_lvl+0x73/0xb0
[   13.934199]  print_report+0xd1/0x650
[   13.934259]  ? __virt_addr_valid+0x1db/0x2d0
[   13.934305]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.934356]  ? kasan_addr_to_slab+0x11/0xa0
[   13.934392]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.934433]  kasan_report+0x141/0x180
[   13.934474]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.934531]  __asan_report_store1_noabort+0x1b/0x30
[   13.934570]  krealloc_less_oob_helper+0xd47/0x11d0
[   13.934618]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.934660]  ? finish_task_switch.isra.0+0x153/0x700
[   13.934701]  ? __switch_to+0x47/0xf50
[   13.934748]  ? __schedule+0x10cc/0x2b60
[   13.934789]  ? __pfx_read_tsc+0x10/0x10
[   13.934837]  krealloc_large_less_oob+0x1c/0x30
[   13.934878]  kunit_try_run_case+0x1a5/0x480
[   13.934925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.934960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.934999]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.935040]  ? __kthread_parkme+0x82/0x180
[   13.935074]  ? preempt_count_sub+0x50/0x80
[   13.935098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.935120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.935142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.935164]  kthread+0x337/0x6f0
[   13.935183]  ? trace_preempt_on+0x20/0xc0
[   13.935207]  ? __pfx_kthread+0x10/0x10
[   13.935275]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.935313]  ? calculate_sigpending+0x7b/0xa0
[   13.935348]  ? __pfx_kthread+0x10/0x10
[   13.935401]  ret_from_fork+0x116/0x1d0
[   13.935436]  ? __pfx_kthread+0x10/0x10
[   13.935488]  ret_from_fork_asm+0x1a/0x30
[   13.935549]  </TASK>
[   13.935568] 
[   13.945604] The buggy address belongs to the physical page:
[   13.945918] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.946296] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.946564] flags: 0x200000000000040(head|node=0|zone=2)
[   13.946935] page_type: f8(unknown)
[   13.947205] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.947929] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.948567] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.948823] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.949074] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.949418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.949912] page dumped because: kasan: bad access detected
[   13.950743] 
[   13.950922] Memory state around the buggy address:
[   13.951249]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.951967]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.952245] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.952474]                                                           ^
[   13.953151]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.953834]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.954185] ==================================================================
[   13.708030] ==================================================================
[   13.708367] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   13.708996] Write of size 1 at addr ffff888100ab36ea by task kunit_try_catch/176
[   13.710025] 
[   13.710291] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.710392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.710416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.710487] Call Trace:
[   13.710537]  <TASK>
[   13.710581]  dump_stack_lvl+0x73/0xb0
[   13.710635]  print_report+0xd1/0x650
[   13.710678]  ? __virt_addr_valid+0x1db/0x2d0
[   13.710720]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.710763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.710806]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.710851]  kasan_report+0x141/0x180
[   13.710886]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.710916]  __asan_report_store1_noabort+0x1b/0x30
[   13.710936]  krealloc_less_oob_helper+0xe90/0x11d0
[   13.710960]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.710982]  ? finish_task_switch.isra.0+0x153/0x700
[   13.711005]  ? __switch_to+0x47/0xf50
[   13.711042]  ? __schedule+0x10cc/0x2b60
[   13.711078]  ? __pfx_read_tsc+0x10/0x10
[   13.711104]  krealloc_less_oob+0x1c/0x30
[   13.711124]  kunit_try_run_case+0x1a5/0x480
[   13.711148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.711169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.711191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.711212]  ? __kthread_parkme+0x82/0x180
[   13.711252]  ? preempt_count_sub+0x50/0x80
[   13.711275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.711297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.711318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.711339]  kthread+0x337/0x6f0
[   13.711357]  ? trace_preempt_on+0x20/0xc0
[   13.711381]  ? __pfx_kthread+0x10/0x10
[   13.711400]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.711420]  ? calculate_sigpending+0x7b/0xa0
[   13.711443]  ? __pfx_kthread+0x10/0x10
[   13.711484]  ret_from_fork+0x116/0x1d0
[   13.711515]  ? __pfx_kthread+0x10/0x10
[   13.711545]  ret_from_fork_asm+0x1a/0x30
[   13.711617]  </TASK>
[   13.711631] 
[   13.722326] Allocated by task 176:
[   13.722630]  kasan_save_stack+0x45/0x70
[   13.723084]  kasan_save_track+0x18/0x40
[   13.723423]  kasan_save_alloc_info+0x3b/0x50
[   13.723881]  __kasan_krealloc+0x190/0x1f0
[   13.724130]  krealloc_noprof+0xf3/0x340
[   13.724295]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.724990]  krealloc_less_oob+0x1c/0x30
[   13.725289]  kunit_try_run_case+0x1a5/0x480
[   13.725670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.725875]  kthread+0x337/0x6f0
[   13.726035]  ret_from_fork+0x116/0x1d0
[   13.726202]  ret_from_fork_asm+0x1a/0x30
[   13.726767] 
[   13.726994] The buggy address belongs to the object at ffff888100ab3600
[   13.726994]  which belongs to the cache kmalloc-256 of size 256
[   13.727789] The buggy address is located 33 bytes to the right of
[   13.727789]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.729011] 
[   13.729341] The buggy address belongs to the physical page:
[   13.729941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.730301] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.730575] flags: 0x200000000000040(head|node=0|zone=2)
[   13.730949] page_type: f5(slab)
[   13.731401] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.731929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.732939] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.733233] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.734042] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.734468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.734718] page dumped because: kasan: bad access detected
[   13.734953] 
[   13.735111] Memory state around the buggy address:
[   13.735477]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.736261]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.736975] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.737454]                                                           ^
[   13.737983]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.738624]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.738992] ==================================================================
[   13.907378] ==================================================================
[   13.907809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   13.908366] Write of size 1 at addr ffff88810298e0ea by task kunit_try_catch/180
[   13.908834] 
[   13.909025] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.909117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.909140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.909177] Call Trace:
[   13.909215]  <TASK>
[   13.909262]  dump_stack_lvl+0x73/0xb0
[   13.909322]  print_report+0xd1/0x650
[   13.909363]  ? __virt_addr_valid+0x1db/0x2d0
[   13.909409]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.909607]  ? kasan_addr_to_slab+0x11/0xa0
[   13.909670]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.909714]  kasan_report+0x141/0x180
[   13.909754]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.909806]  __asan_report_store1_noabort+0x1b/0x30
[   13.909848]  krealloc_less_oob_helper+0xe90/0x11d0
[   13.909897]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.909936]  ? finish_task_switch.isra.0+0x153/0x700
[   13.909977]  ? __switch_to+0x47/0xf50
[   13.910023]  ? __schedule+0x10cc/0x2b60
[   13.910062]  ? __pfx_read_tsc+0x10/0x10
[   13.910111]  krealloc_large_less_oob+0x1c/0x30
[   13.910155]  kunit_try_run_case+0x1a5/0x480
[   13.910198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.910290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.910328]  ? __kthread_parkme+0x82/0x180
[   13.910373]  ? preempt_count_sub+0x50/0x80
[   13.910418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.910607]  kthread+0x337/0x6f0
[   13.910642]  ? trace_preempt_on+0x20/0xc0
[   13.910681]  ? __pfx_kthread+0x10/0x10
[   13.910714]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.910749]  ? calculate_sigpending+0x7b/0xa0
[   13.910786]  ? __pfx_kthread+0x10/0x10
[   13.910821]  ret_from_fork+0x116/0x1d0
[   13.910853]  ? __pfx_kthread+0x10/0x10
[   13.910885]  ret_from_fork_asm+0x1a/0x30
[   13.910920]  </TASK>
[   13.910933] 
[   13.920845] The buggy address belongs to the physical page:
[   13.921134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.921419] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.921910] flags: 0x200000000000040(head|node=0|zone=2)
[   13.922283] page_type: f8(unknown)
[   13.923057] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.923586] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.923920] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.924173] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.924434] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.925021] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.925520] page dumped because: kasan: bad access detected
[   13.925900] 
[   13.926052] Memory state around the buggy address:
[   13.926405]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.926691]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.926934] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.927210]                                                           ^
[   13.928163]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.928817]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.929274] ==================================================================
[   13.740084] ==================================================================
[   13.740556] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   13.741089] Write of size 1 at addr ffff888100ab36eb by task kunit_try_catch/176
[   13.741688] 
[   13.741934] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.742056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.742086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.742124] Call Trace:
[   13.742177]  <TASK>
[   13.742214]  dump_stack_lvl+0x73/0xb0
[   13.742282]  print_report+0xd1/0x650
[   13.742328]  ? __virt_addr_valid+0x1db/0x2d0
[   13.742383]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.742438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.742496]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.742550]  kasan_report+0x141/0x180
[   13.742674]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.742735]  __asan_report_store1_noabort+0x1b/0x30
[   13.742780]  krealloc_less_oob_helper+0xd47/0x11d0
[   13.742827]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.742871]  ? finish_task_switch.isra.0+0x153/0x700
[   13.742913]  ? __switch_to+0x47/0xf50
[   13.743062]  ? __schedule+0x10cc/0x2b60
[   13.743110]  ? __pfx_read_tsc+0x10/0x10
[   13.743161]  krealloc_less_oob+0x1c/0x30
[   13.743207]  kunit_try_run_case+0x1a5/0x480
[   13.743272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.743317]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.743359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.743395]  ? __kthread_parkme+0x82/0x180
[   13.743421]  ? preempt_count_sub+0x50/0x80
[   13.743445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.743477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.743543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.743577]  kthread+0x337/0x6f0
[   13.743608]  ? trace_preempt_on+0x20/0xc0
[   13.743645]  ? __pfx_kthread+0x10/0x10
[   13.743676]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.743709]  ? calculate_sigpending+0x7b/0xa0
[   13.743746]  ? __pfx_kthread+0x10/0x10
[   13.743780]  ret_from_fork+0x116/0x1d0
[   13.743813]  ? __pfx_kthread+0x10/0x10
[   13.743847]  ret_from_fork_asm+0x1a/0x30
[   13.743886]  </TASK>
[   13.743899] 
[   13.756868] Allocated by task 176:
[   13.757445]  kasan_save_stack+0x45/0x70
[   13.757655]  kasan_save_track+0x18/0x40
[   13.758119]  kasan_save_alloc_info+0x3b/0x50
[   13.758630]  __kasan_krealloc+0x190/0x1f0
[   13.758966]  krealloc_noprof+0xf3/0x340
[   13.759188]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.759548]  krealloc_less_oob+0x1c/0x30
[   13.759813]  kunit_try_run_case+0x1a5/0x480
[   13.759993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.760406]  kthread+0x337/0x6f0
[   13.760963]  ret_from_fork+0x116/0x1d0
[   13.761275]  ret_from_fork_asm+0x1a/0x30
[   13.761598] 
[   13.761755] The buggy address belongs to the object at ffff888100ab3600
[   13.761755]  which belongs to the cache kmalloc-256 of size 256
[   13.762618] The buggy address is located 34 bytes to the right of
[   13.762618]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.763284] 
[   13.763462] The buggy address belongs to the physical page:
[   13.763899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.764296] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.764546] flags: 0x200000000000040(head|node=0|zone=2)
[   13.764958] page_type: f5(slab)
[   13.765518] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.766294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.766772] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.767234] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.768024] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.768568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.769124] page dumped because: kasan: bad access detected
[   13.769374] 
[   13.769532] Memory state around the buggy address:
[   13.769886]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.770708]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.771185] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.771838]                                                           ^
[   13.772156]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.772748]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.773248] ==================================================================
[   13.611596] ==================================================================
[   13.612214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.613124] Write of size 1 at addr ffff888100ab36c9 by task kunit_try_catch/176
[   13.613978] 
[   13.614356] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.614488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.614513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.614548] Call Trace:
[   13.614573]  <TASK>
[   13.614604]  dump_stack_lvl+0x73/0xb0
[   13.614809]  print_report+0xd1/0x650
[   13.614838]  ? __virt_addr_valid+0x1db/0x2d0
[   13.614864]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.614888]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.614910]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.614933]  kasan_report+0x141/0x180
[   13.614955]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.614983]  __asan_report_store1_noabort+0x1b/0x30
[   13.615004]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.615029]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.615053]  ? finish_task_switch.isra.0+0x153/0x700
[   13.615076]  ? __switch_to+0x47/0xf50
[   13.615104]  ? __schedule+0x10cc/0x2b60
[   13.615126]  ? __pfx_read_tsc+0x10/0x10
[   13.615152]  krealloc_less_oob+0x1c/0x30
[   13.615173]  kunit_try_run_case+0x1a5/0x480
[   13.615199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.615231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.615259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.615282]  ? __kthread_parkme+0x82/0x180
[   13.615304]  ? preempt_count_sub+0x50/0x80
[   13.615327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.615351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.615374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.615396]  kthread+0x337/0x6f0
[   13.615416]  ? trace_preempt_on+0x20/0xc0
[   13.615438]  ? __pfx_kthread+0x10/0x10
[   13.615474]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.615508]  ? calculate_sigpending+0x7b/0xa0
[   13.615541]  ? __pfx_kthread+0x10/0x10
[   13.615574]  ret_from_fork+0x116/0x1d0
[   13.615604]  ? __pfx_kthread+0x10/0x10
[   13.615634]  ret_from_fork_asm+0x1a/0x30
[   13.615683]  </TASK>
[   13.615702] 
[   13.628028] Allocated by task 176:
[   13.628351]  kasan_save_stack+0x45/0x70
[   13.628671]  kasan_save_track+0x18/0x40
[   13.629180]  kasan_save_alloc_info+0x3b/0x50
[   13.629416]  __kasan_krealloc+0x190/0x1f0
[   13.629564]  krealloc_noprof+0xf3/0x340
[   13.629721]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.630045]  krealloc_less_oob+0x1c/0x30
[   13.630273]  kunit_try_run_case+0x1a5/0x480
[   13.630498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.631207]  kthread+0x337/0x6f0
[   13.631573]  ret_from_fork+0x116/0x1d0
[   13.631747]  ret_from_fork_asm+0x1a/0x30
[   13.632061] 
[   13.632895] The buggy address belongs to the object at ffff888100ab3600
[   13.632895]  which belongs to the cache kmalloc-256 of size 256
[   13.633345] The buggy address is located 0 bytes to the right of
[   13.633345]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.633949] 
[   13.634122] The buggy address belongs to the physical page:
[   13.634472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.634782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.635177] flags: 0x200000000000040(head|node=0|zone=2)
[   13.636258] page_type: f5(slab)
[   13.636660] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.637362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.637800] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.638261] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.638541] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.638947] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.639168] page dumped because: kasan: bad access detected
[   13.639353] 
[   13.639519] Memory state around the buggy address:
[   13.639995]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.640208]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.641373] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.642010]                                               ^
[   13.642567]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.642838]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.643050] ==================================================================
[   13.830916] ==================================================================
[   13.831430] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.831988] Write of size 1 at addr ffff88810298e0c9 by task kunit_try_catch/180
[   13.832400] 
[   13.832576] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.832639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.832652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.832676] Call Trace:
[   13.832692]  <TASK>
[   13.832714]  dump_stack_lvl+0x73/0xb0
[   13.832765]  print_report+0xd1/0x650
[   13.832811]  ? __virt_addr_valid+0x1db/0x2d0
[   13.832858]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.832904]  ? kasan_addr_to_slab+0x11/0xa0
[   13.832940]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.832977]  kasan_report+0x141/0x180
[   13.833000]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.833028]  __asan_report_store1_noabort+0x1b/0x30
[   13.833048]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.833073]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.833096]  ? finish_task_switch.isra.0+0x153/0x700
[   13.833120]  ? __switch_to+0x47/0xf50
[   13.833147]  ? __schedule+0x10cc/0x2b60
[   13.833170]  ? __pfx_read_tsc+0x10/0x10
[   13.833196]  krealloc_large_less_oob+0x1c/0x30
[   13.833218]  kunit_try_run_case+0x1a5/0x480
[   13.833897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.833940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.833976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.834014]  ? __kthread_parkme+0x82/0x180
[   13.834054]  ? preempt_count_sub+0x50/0x80
[   13.834099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.834137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.834171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.834195]  kthread+0x337/0x6f0
[   13.834214]  ? trace_preempt_on+0x20/0xc0
[   13.834265]  ? __pfx_kthread+0x10/0x10
[   13.834286]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.834306]  ? calculate_sigpending+0x7b/0xa0
[   13.834330]  ? __pfx_kthread+0x10/0x10
[   13.834365]  ret_from_fork+0x116/0x1d0
[   13.834385]  ? __pfx_kthread+0x10/0x10
[   13.834406]  ret_from_fork_asm+0x1a/0x30
[   13.834439]  </TASK>
[   13.834453] 
[   13.845684] The buggy address belongs to the physical page:
[   13.846079] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.846758] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.847254] flags: 0x200000000000040(head|node=0|zone=2)
[   13.847649] page_type: f8(unknown)
[   13.847869] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.848442] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.848657] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.849157] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.849646] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.850076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.850511] page dumped because: kasan: bad access detected
[   13.850869] 
[   13.850991] Memory state around the buggy address:
[   13.851212]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.851704]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.852354] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.852666]                                               ^
[   13.852935]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.853463]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.853728] ==================================================================